Discuss the results of the gvm scan


Problem

Part I

Design a secure architecture for a fictional company.

View "Creating a Windows 11 VM in VirtualBox," within the Video Playlist: Technology Implementation of Security Solutions, located in Class Resources.

Design a corporate infrastructure diagram in Visio or another network mapping tool (this deliverable must be readable by your professor; Cisco Packet Tracer is not acceptable). Your network diagram must include a minimum of 2 routers, 2 firewalls, 4 switches, 1 IDS, 1 IPS, a proxy server, an email server, a DHCP server, a DMZ, and finally, 5 separate departments utilizing network segmentation with a minimum of 25 clients per department. You must also include an air gapped system for your R&D department to utilize.

Perform the following tasks to complete the VirtualBox infrastructure:

i. Create a Windows 11 VM and join it to the domain.
ii. Create a VM using an operating system of your choice that has not been created yet. It could be a different version of Windows or Linux. It is not necessary to join this VM to the domain.
iii. In a Microsoft Word document, supply screenshots demonstrating the successful creation of both VMs.

Develop the intellectual tools to explore and understand advance network concepts and protocols. Using your Kali Linux VM, perform a GVM Full and Fast vulnerability scan of your entire VirtualBox infrastructure.

Within the same Word document above, select 2-3 intellectual tools (e.g., Suricata, pfSense, Snort, etc.) and demonstrate how they work together to create a framework. Make sure to include them in your secure network design. Do not use Suricata, pfSense, or Snort for this part of the assignment.

The deliverables for Part 1 will include the corporate infrastructure diagram, a GVM Scan Report, and the Word document described above.

Part II

Create a 5 to 7 minutes screencast addressing the following:

i. Explain all components and how they interact with each other within the secure network design created.

ii. Discuss the results of the GVM scan.

iii. Describe and discuss the security issues and implications of advanced and novel networks and protocols. Ensure your discussion applies to both current and new network technologies.

Request for Solution File

Ask an Expert for Answer!!
Computer Network Security: Discuss the results of the gvm scan
Reference No:- TGS03340348

Expected delivery within 24 Hours