NETWORK DESIGN PROJECT

Assume that you are designing a network architecture for a complex enterprise with a
diverse application, user community, and end-user device mix. This enterprise has
exposure to the Internet in addition to providing remote access for employees to internal
sites via a Virtual Private Network (VPN).

  1. Choose a specialty topic from Module 7: Week 7 (Cellular Security, Cloud Security,
    Optical Wireless Security, RFID Security, Industrial Security, Bluetooth Security, or
    Internet of Things (IOT) Security). Sample references are included in Blackboard. Note
    that any other topic besides these must be approved in advance by the instructor.
  2. Create a network diagram for the fictitious Liberty Beverages Corporation using any
    diagramming tool you wish (e.g., Visio, MS Paint, application at http://www.draw.io) for
    the diagram– but be sure to paste a standard image (e.g., JPG, PNG) of it in the final
    report. Include at least the following elements:
    a. Remote devices used by employees and vendors
    b. Demilitarized Zone (DMZ) facing externally
    c. Firewall(s)
    d. IDS/IPS solution
    e. SIEM
    f. Components integrated from chosen specialty topic
  3. Describe and define the following security threats with at least a paragraph each. Also
    describe what makes each vulnerability a threat and impact to the business.
    a. Denial of Service (DOS) and Distributed Denial of Service (DDOS) attacks
    b. Worms, virus, Trojan horses, and other malware.
    c. Man-in-the-middle (MITM) attacks
    d. Rootkit injections
    e. Misconfiguration of remote mobile devices
  4. Document how five (5) or more components and measures in the network architecture, as
    well as host-based measures, address the security threats from the previous step. The
    components could be a combination of software or hardware in nature – such as firewalls,

IDS/IPS, routers, switches, anti-virus/malware software, full-disk encryption (FDE) and
encryption in transit, remote device management software, etc.

  1. Describe in three (3) or more paragraphs the specific security threats regarding the
    specialty topic you chose. These are in addition to those from step 4.
  2. Describe in three (3) or more paragraphs the security controls (and their rationale for
    inclusion) that you will implement to mitigate against the security threats of the chosen
    specialty.
  3. Beyond the network design, what additional procedural/governance measures do you
    recommend to address security concerns (e.g., training, procedures, policies)? Describe in
    two (2) or more paragraphs at least one measure.
  4. Describe in one or more paragraphs how biblical principles come to bear with your
    proposed design and approach. Include specific scriptural references.
    Outputs

find the cost of your paper

Sample Answer

 

 

Liberty Beverages Corporation Network Architecture and Security Analysis

1. Network Design Overview:

This document outlines the network architecture for Liberty Beverages Corporation, a complex enterprise with diverse applications, users, and devices. The network incorporates remote access for employees, internet exposure, and security measures to mitigate potential threats.

Full Answer Section

 

 

 

2. Chosen Specialty Topic: IoT Security

Considering Liberty Beverages’ operations likely involve connected devices (e.g., smart sensors in warehouses, delivery vehicles with tracking systems), IoT Security is chosen as the specialty topic. This section will focus on securing these devices within the network.

3. Network Diagram:

4. Security Threats:

a. Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) attacks:

  • Description: DoS attacks flood a network with traffic, overwhelming resources and preventing legitimate users from accessing services. DDoS attacks involve multiple compromised devices attacking simultaneously.
  • Threat: DoS/DDoS attacks can disrupt operations, cause financial losses, damage reputation, and impact employee productivity.
  • Impact on Liberty Beverages: DoS/DDoS attacks could disrupt online sales, production processes, and communication, leading to significant financial losses and customer dissatisfaction.

b. Worms, viruses, Trojan horses, and other malware:

  • Description: Malware is malicious software designed to harm systems, steal data, or disrupt operations. Worms self-replicate, viruses spread through infected files, Trojan horses disguise themselves as legitimate programs, and other malware types have various functionalities.
  • Threat: Malware can steal sensitive data (e.g., customer information, trade secrets), corrupt files, disrupt operations, and compromise systems for further attacks.
  • Impact on Liberty Beverages: Malware could compromise customer data, intellectual property, and financial information, leading to legal issues, reputational damage, and financial losses.

5. IoT Security Components:

  • Device Management: Implement a centralized platform to manage, provision, and update IoT devices securely.
  • Network Segmentation: Isolate IoT devices from other network segments to limit their attack surface.
  • Strong Authentication: Use strong passwords, multi-factor authentication, and device certificates for secure access.
  • Vulnerability Management: Regularly patch and update firmware on IoT devices to address vulnerabilities.
  • Network Monitoring: Monitor IoT device activity for suspicious behavior and potential threats.

6. Conclusion:

This document presents a network design for Liberty Beverages Corporation with security considerations for remote access, internet exposure, and IoT devices. Implementing robust security measures like those outlined is crucial to protect the network from various threats and ensure smooth business operations.

This question has been answered.

Get Answer