Assignment Requirements You have been working as a technology associate in the i
ID: 3756571 • Letter: A
Question
Assignment Requirements
You have been working as a technology associate in the information systems department at Corporation Techs for more than two months now. Corporation Techs’ information technology (IT) department is setting up a new network in a remote office for an engineering firm. The network requires several groups: Project Management, Engineering, Drafting, and Architecture. The office is being set up near the project site and therefore, is separate from the main office. Further, several key employees will need access to the main office and remote office computer services. A network security and Virtual Private Network (VPN) plan is needed to connect it all together.
The network should segment for the four major groups with VPN access allowed by specific remote workers into each group.
Tasks
Develop a network security plan, basic topology, and VPN plan for this remote office. The security plan should keep the main office and its digital assets safe in case of a failure at the remote office.
Required Resources
Assignment Template:
(YOU MUST USE THIS TEMPLATE TO GET FULL CREDIT)
Submission Requirements
Format: Microsoft Word
Font: Arial, Size 12, Double-Space
Citation Style: APA
Length: 3–4 pages
Spelling and Grammar count
Self-Assessment Checklist
I identified at least four different ways to protect digital assets with a
defense-in-depth approach.
I explained at least three methods to protect corporate digital assets from the potential threats the host-to-gateway VPN would introduce.
I explained the overall network topology.
Week 6: (RS4) Assignment 6: Remote Access Security Plan and Documentation
(YourName)
Assignment Requirements
You have been working as a technology associate in the information systems department at Corporation Techs for more than two months now. Corporation Techs’ information technology (IT) department is setting up a new network in a remote office for an engineering firm. The network requires several groups: Project Management, Engineering, Drafting, and Architecture. The office is being set up near the project site and therefore, is separate from the main office. Further, several key employees will need access to the main office and remote office computer services. A network security and Virtual Private Network (VPN) plan is needed to connect it all together.
The network should segment for the four major groups with VPN access allowed by specific remote workers into each group.
Tasks
Develop a network security plan, basic topology, and VPN plan for this remote office. The security plan should keep the main office and its digital assets safe in case of a failure at the remote office.
Describe the Network Topology to connect the Remote Office as shown above to the Corporate Office:
Identify at least four different ways to protect digital assets with a Defense-in-Depth approach:
Defense 1:
Defense 2:
Defense 3:
Defense 4:
List at least three methods to protect corporate digital assets from the potential threats the host-to-gateway VPN would introduce.
Method 1:
Method 2:
Method 3:
Method 4:
Explanation / Answer
The new network design should very well identify possible security threats and appropriate countermeasures to address these threats.
Listed in brief are a few of the threats that should be identified and addressed :
i) Leakage of information : In this type of threat, an node in the virtual network may disclose private or sensitive information to members of other virtual networks through ARP table poisoning. In other words by spoofing the IP address of the node that is able to send messages to virtual network .
ii) Eavesdropping/Sniffing : This is a very common threat in any networking environment where the network packet meant to be forwarded to one node may be sent to another node allowing unwanted sniffing into information.
iii) Identity theft: Here fraud entities may inject malicious messages in a vitual network leading to others believing that the message came from a trusted source.
iv) Registry entry theft : Virtual machines hold entry/log of operations performed by each host in the network and these get lost during rollback procedures. This also increases the chances of operations perfomed by malicious hackers to be lost.
v) Replay attacks : old control messages are resent over a network with an intent of corrupting data plane of the source domain
Below are some of the countermeasures to tackle these network thefts :
i) A framework should be advised to secure netwroking among groups of virtual machines in order to ascertain isolation , confidentiality and correct information flow control in networks. this can be achieved by using Trusted Virtual Domains .
ii) Cryptography : Routing information is encrypted when sent from a host to another and the receiver is able to decrypt using a key shared between reciever and sender.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.