a. Traffic generated by the hosts: clients, servers and backup devices.

For this part you are required to design and implement a secure information and network infrastructure that ensures high availability, reliability, scalability, performance and security to support CC services. This requires [1] the redesign of the network to meet the current and future demands; [2] the delivery of a comprehensive network security plan; and [3] Security technology implementation and proof of concept.
The following is a breakdown of the tasks for part A.
Network Redesign
1. Network redesign. In this redesign, the IP address allocation should use the CIDR format (x.y.z.t/n).
Networks and Information Security Case study - Copyright © Edilson Arenas - CQUniversity
2. Each design should be justified in terms of traffic, reliability, performance, availability, scalability and security. To do this you need to make a number of assumptions (discuss this with your mentor / facilitator / teacher). For example, assume that a great number of College services operate 24/7. Other services are to operate from 6:00am to 8:00pm daily, Monday to Friday. Other aspects to take into account are user’s behaviour, applications, bandwidth requirements and the like.
Specifically for this redesign, take into account the following:
a. Traffic generated by the hosts: clients, servers and backup devices.
b. Appropriateness of WAN links to support current traffic and forecasted growth.
c. Appropriateness of WANs (Frame Relay). Are there better WAN protocols to use?
d. Appropriateness of wired LANs and Wireless LANs to support future growth.
e. Would you use VPNs? Why?
f. The specifications of networking devices including routers and switches at each site or location (wired and wireless)
g. IP address allocation of each network and main network devices
h. Sub-netting to separate traffic including IP address allocation
i. Firewalls positioning and strategy. Would you use separate packet filtering and routing?
j. Proxy servers
k. DMZ configuration
l. Firewalls Access Control Lists
m. Network diagram of the logical topology and allocation of devices; and IP addresses for the main network devices
n. Provision data encryption to secure data travelling between internal and external networks

Price: £ 360

100% Plagiarism Free & Custom Written, Tailored to your instructions

Leave your Comments

Can't read the image? click here to refresh