Rocky Mountain Corporation (RMC) has relocated to a new building that was previously wired and set up for a local area network (LAN). The company implemented a 50-user client/server-based wireless network, using WPA in which all printers, folders, and other resources are shared; everyone has access to everything and there is no security outside of the defaults that were in place when the system was set up.
You have been hired to secure the RMC network and ensure that the company has a properly designed network that allows for future growth (500 users in 12 months) and for the highest levels of security to protect against internal and external attacks. RMC has scheduled a meeting with its key executives and you in order to provide you with any additional information you may need.
Instructions: In an 8- to 10-page proposal, address the following three sections and their action items to provide a comprehensive secure environment:
Section 1: Topology (type of network) and Network Devices: RMC
needs to set up a network; it requires clarification regarding the
type of network (or topology) in order to properly configure the
connections among all PCs within the organization. The company is
looking for guidance regarding the type of network devices that
will connect devices to the local area network (LAN).
The company asks that you explain what internal and external
networking components are required (explain each and justify why
you chose the network devices you did).
Provide a cryptography method that will ensure vital data is
encrypted.
Provide an explanation of what network protocols will be used on
the LAN and why.
Ensure that the network has the capacity to: Connect all users to
company resources (e.g. printers, scanners, and other items);
Provide file sharing options; Manage these resources in a central
location; Allow for internal users to access the internet; and,
Allow external users and vendors to access the LAN remotely.
Your proposal should include budgetary cost estimates for the
chosen topology.
Section 2: IP Infrastructure: RMC has asked that you provide
details regarding an IP structure (which includes static, DHCP—or
the possibility of both—and proper IP class assignment), which is
mindful of the company's expectation of continued growth.
Provide a remote access plan to ensure that users who access the
network remotely do so in a secure and efficient manner.
Section 3: Security: Basic security has been in place and now
the company would like you to make this a more secure facility in
hopes of protecting against internal and external security
threats.
Generate a plan to provide secure access control methods for all
internal-user access including a viable password policy, which
includes complexity, duration, and history requirements. Provide a
thorough plan to protect the network from malware and various types
of malicious attacks.
Rocky Mountain Corporation (RMC) has relocated to a new building that was previously wired and set...
OPTION #1: Assist in creating a Proposal: ......... XYZ Corporation XYZ Corporation is a small organization of roughly 20 to 30 employees working in a simple office space using basic peer-to-peer type networking in which all employees keep their data on their own PCs and each has his or her own devices (i.e., printers, scanners, and other peripherals). In the last few months, XYZ developed a revolutionary widget that will change technology as we know it. The company received a...
You are given the following "informal firewall policy" details to be implemented using the firewall topology illustrated in slide # 22 (Chapter 9) Present the rules for the external and internal firewalll in a table format. a) Email may be sent using SMTP in both directions through the firewall, but it must be relayed via the DMZ mail gateway. External email must be destined for the DMZ mail server. b) Users inside may retrieve their e-mail from the DMZ mail...
Figure 1 LAN Subnet: 192.168.40.0124 LAN Switch Internet External Firewall Internal Firewall DMZ Subnet: 192.168.10.0/24 LAN devices Web Server running on port 80 IDS (Snort VM) Remote Access Server (Nginx VM) (OpenVPN) Overview Medium to large organisations typically consist of services that are accessed/consumed from external parties for various purposes. As such, a DMZ is a suitable solution to segregate such services from internal networkis). The network diagram provided (Figure 1) illustrates the IT environment of a medium organisation, which...
The new Chief Technology Officer (CTO) is seeking recommendations for network monitoring services for the local intranet. The CTO would like the capability to monitor all traffic to and from the gateway, as well as the capability to block certain content. Which of the following recommendations would meet the needs of the organization? A. Recommend setup of IP filtering on both the internal and external interfaces of the gateway router. B. Recommend installation of a firewall on the internal interface...
Overview: Now that you’re super knowledgeable about security, let's put your newfound know-how to the test. You may find yourself in a tech role someday, where you need to design and influence a culture of security within an organization. This project is your opportunity to practice these important skillsets. Assignment: In this project, you’ll create a security infrastructure design document for a fictional organization. The security services and tools you describe in the document must be able to meet the...
Question 2 (20 marks) – Improving network design Jim is impressed by your report and asks you to write a proposal to improve the network, although his budget is limited he tells you that if you can justify your design choices you may be able to purchase some more equipment. You will need to provide a new network design diagram in PowerPoint format, thankfully Jim has included a couple of slides with various network equipment elements that you can use...
(PLEASE TYPE THE ANSWER TO THIS QUESTION OUT AND NOT WRITE IT ON A NOTE PD OR WHITE BOARD) Overview: Now that you’re super knowledgeable about security, let's put your newfound know-how to the test. You may find yourself in a tech role someday, where you need to design and influence a culture of security within an organization. This project is your opportunity to practice these important skillsets. Assignment: In this project, you’ll create a security infrastructure design document for...
Scenaric im runs a small consulting firm, Soylent Co, with 30 employees spread between accounts, human resources, administration, and engineering. Jim's son, Tony, knows a bit about computers and so Jim has asked him to upgrade the company network. You went to high school with Tony. You receive a panicked phone call from Tony telling you that he has spent the last two days trying to find why his father's newly upgraded network is having significant stability problems. You've agreed...
You work for EGS Testing Solutions; your company is involved in testing related to access control systems. A large, private fitness club contacted your company because their Web server was hacked. The fitness club has a corporate office with 50 workstations, 4 application servers, 2 e-mail servers, 2 Web servers, and 129 franchisees with 10 workstations and about 3,500 members at each location. Except for the equipment at the franchisees’ locations, all other equipment resides at the central headquarters. The...
***I only need the High Level Project Plan (Time to Implement)****** You have recently been hired by a new Japanese accounting firm, headquarter in Tokyo, as the director ofInformation Systems and Telecommunications. Your assignment is to assist security posture of the firm anddevelop a security structure for this new company. Write your recommendations and reasons to the firm’s CEO. The firm has 600 employees in Tokyo, 50 in Houston, and is planning to open two branch offices in India andCalifornia....