Comprehensive and Secure Solution In order to design and construct a well-secured network, many features must be taken into consideration, such as the topology and placement of hosts within the network, the selection of hardware and software technologies, and the successful arrangement of each component. I will discuss securing a LAN from the viewpoint of the network architect considering two main areas: the network topology which comprises the physical and logical design of the network; and securing the routers and switches which connect segments and hosts to form the network.
Initial Assumptions and Challenges
Finding some of the best practices and examining some of the security issues found in small to medium sized networks is a
…show more content…
Topology and Architecture
Topology is the arrangement of the various elements (links, nodes, etc.) of a computer network. Essentially, it is the structure of a network and may be depicted physically or logically. On the physical side, a network needs provide distribution to the offices or buildings where the users are located.
In laying out the logical topology we need to consider the arrangement of devices on the network. The way data is moved across the network may include which groups of users and devices should be grouped alongside which parts of the network are trusted. The diagram below lays out the proposed network design. The design includes one router connected to the internet, a core router, a firewall, an intranet switch, three workgroup switches, multiple workstations, and servers. If the business wanted to consider more advanced management of the network from an IT perspective we propose adding a few management workstations and servers as well as setting up a management VLAN (virtual LAN). The management VLAN will operate on a separate VLAN from the regular user traffic.
Security
A hacker looks for poorly configured network devices. Common vulnerabilities include information gathering, sniffing, spoofing, and denial of service. As you see in our diagram, we propose to implement several points of protection,
In this modern day and age of computing, networks are a huge part of IT. It is important now more than ever that data sent over any network, whether it be a LAN (Local Area Network) or WAN (Wide Area Network; The Internet) is kept safe, private (when required) and uninterrupted in
A network that will aid a new workstation for connecting with one another is known as hardware. When a business makes use of both routers and also firewall, the business is actually guaranteed safety involving both wireless and also cabled communities that are utilized in the business. Hardware would work in any business in the retaining on the businesses multilevel secure information. From the software package element I most certainly will decide on AVG Anti-virus protection software package. That software package along with firewall is often a sure way of defending a company. Routers when employed along with components include the ideal protection components desired if your business has to improve the
Organizations should develop a security policy for the wireless LAN infrastructure prior to the implementation stage. In order to have a strong security policy,
There are multiple aspects of security in this network, which I have tried to implement as much as possible. This is where the CIA triangle comes into play, confidentiality, rules and limits to access information; Integrity, making sure the data is accurate and trustworthy; Availability, having reliable access to the information. I am going to talk about each aspect in a list format and explain how it’s used in my network. One thing that will be performed on all network devices is system updates and patches. They will happen on a monthly basis, on a weekend when the networks are not being used.
Security is almost certainly the most difficult aspect of a network to perfect. It is important to have the correct procedures and components in place to make certain network security is being accounted for and addressed on any given network. The journal, “Future Generation Computer Systems” elaborates on this necessity for an information system. “Future Generation Computer Systems”, this component of a network is discussed thoroughly. “Essentially securing an Information System (IS), involves identifying unique threats and challenges which need to be addressed by implementing the appropriate countermeasures” (Dimitrios Zissis, Dimitrios Lekkas, 2012). This was achieved through configuring access lists as well as CHAP configuration on the routers connecting to the edge
contains the case narrative, related figures, and a set of questions and problems. These do not have one unique solution. There are too many alternatives when dealing with LANs, WANs, MANs, BNs, and the Internet, so a reallife network design and development problem can have several workable answers.
Provides multi layered security: Security starts from physical layer from protecting against ARP Cache, intruders, vandals and thieves. Physical security is provided based on the needs, maintenance
In today’s society, it is commonplace for one to be electronically “connected”, by using devices like computers, mobile smartphones, gaming devices, tablets or laptops. Typically there is some type of network, which enables us to be connected, such as a Wide Area Network (WAN), a Local Area Network (LAN) or even a Home Area Network (HAN). A WAN is the most expansive type of network commonly used, which can cover large geographical areas, usually by amalgamating multiple LANs. The most frequently used WAN is the internet, which many of us connect to daily. A smaller type of network is a LAN, most often used in the workplace to connect computers and devices in the same office or building, so users can collaborate and efficiently share resources.
Miller Inc. which is in the business of providing data collection and analytics services relies majorly on network security to keep its competitive advantage. This is because the customers that rely on the company's system trust that since there are sufficient security measures that have been ensured, they can store their data securely. Each of the functional models of the system should have sufficient security measures to ensure that complete security of the whole system architecture is achieved. The three functional modules are the backend module, services or operation module and customer access module. The major relationship between infrastructure and security comes in the role they play to ensure that the end user gets the data that they need when they need it and in the best way possible. Therefore for the three modules, there is a need to balance security with the right infrastructure.
For each device, a set of tables is required. These will assist with design and development activities and used when configuring switches and routers. A separate table should be created for each router and switch.
Network security has changed significantly over the past years. There is more and more data to monitor and analyze in order to detect the activity of your data and systems. Securing a network has many variables. Password authentication, network access, patches, anti-virus protection, intrusion detection, firewall and network monitoring tools are just a few of the things you can do to protect yourself.
Network topologies are an important part of the network. Without the proper topology, the network may not meet the needs of the organization. The layout of a network is referred to as the topology. How nodes in a network are connected to each other and communicate is determined by the topology. There are three basic topologies with several typical variations, or combinations. A description of four topologies follows.
Computer network topology is an extension of basic topology. In this discipline we examine the configuration of computer system elements and their interconnections of network lattice. Physical network topology deals with the hardware components associated with the computer system including workstations, servers, remote terminals and the cabling associated with them. Logical network topology deals with representation of data flow between nodes which can be dynamically reconfigured once the selected network equipment such as router is available.
Abstract: Topologies remain an important part of network design theory. We can’t probably a computer network without understanding the difference between a bus design and a star design,tree.ring design topologies gives us a better understanding of important networking concepts and their advantages/disadvantages are discussed below
The purpose of this project is to design a WAN (wide area network) using a Cisco Packet Tracer simulation. The Step by step instructions included in this project are designed to help provide an inside view of how to design any type of network using the Cisco Packet Tracer network simulation software. In addition i will also be looking at other software’s that are similar to the Cisco Packet Tracer and analyse the strengths and weaknesses of the software. I will also be looking into the types of network devices needed to design a WAN. Finally, I into the types of network architecture, network topologies and security management suitable for my design network project.