Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Assignment Requirements You have been working as a technology associate in the i

ID: 3756571 • Letter: A

Question

Assignment Requirements

You have been working as a technology associate in the information systems department at Corporation Techs for more than two months now. Corporation Techs’ information technology (IT) department is setting up a new network in a remote office for an engineering firm. The network requires several groups: Project Management, Engineering, Drafting, and Architecture. The office is being set up near the project site and therefore, is separate from the main office. Further, several key employees will need access to the main office and remote office computer services. A network security and Virtual Private Network (VPN) plan is needed to connect it all together.

The network should segment for the four major groups with VPN access allowed by specific remote workers into each group.

Tasks

Develop a network security plan, basic topology, and VPN plan for this remote office. The security plan should keep the main office and its digital assets safe in case of a failure at the remote office.

Required Resources

Assignment Template:

(YOU MUST USE THIS TEMPLATE TO GET FULL CREDIT)

Submission Requirements

Format: Microsoft Word

Font: Arial, Size 12, Double-Space

Citation Style: APA

Length: 3–4 pages

Spelling and Grammar count

Self-Assessment Checklist

I identified at least four different ways to protect digital assets with a
defense-in-depth approach.

I explained at least three methods to protect corporate digital assets from the potential threats the host-to-gateway VPN would introduce.

I explained the overall network topology.

Week 6: (RS4) Assignment 6: Remote Access Security Plan and Documentation

(YourName)

Assignment Requirements

You have been working as a technology associate in the information systems department at Corporation Techs for more than two months now. Corporation Techs’ information technology (IT) department is setting up a new network in a remote office for an engineering firm. The network requires several groups: Project Management, Engineering, Drafting, and Architecture. The office is being set up near the project site and therefore, is separate from the main office. Further, several key employees will need access to the main office and remote office computer services. A network security and Virtual Private Network (VPN) plan is needed to connect it all together.

The network should segment for the four major groups with VPN access allowed by specific remote workers into each group.

Tasks

Develop a network security plan, basic topology, and VPN plan for this remote office. The security plan should keep the main office and its digital assets safe in case of a failure at the remote office.

Describe the Network Topology to connect the Remote Office as shown above to the Corporate Office:

Identify at least four different ways to protect digital assets with a Defense-in-Depth approach:

Defense 1:

Defense 2:

Defense 3:

Defense 4:

List at least three methods to protect corporate digital assets from the potential threats the host-to-gateway VPN would introduce.

Method 1:

Method 2:

Method 3:

Method 4:

Explanation / Answer

The new network design should very well identify possible security threats and appropriate countermeasures to address these threats.

Listed in brief are a few of the threats that should be identified and addressed :

i) Leakage of information : In this type of threat, an node in the virtual network may disclose private or sensitive information to members of other virtual networks through ARP table poisoning. In other words by spoofing the IP address of the node that is able to send messages to virtual network .

ii) Eavesdropping/Sniffing : This is a very common threat in any networking environment where the network packet meant to be forwarded to one node may be sent to another node allowing unwanted sniffing into information.

iii) Identity theft: Here fraud entities may inject malicious messages in a vitual network leading to others believing that the message came from a trusted source.

iv) Registry entry theft : Virtual machines hold entry/log of operations performed by each host in the network and these get lost during rollback procedures. This also increases the chances of operations perfomed by malicious hackers to be lost.

v) Replay attacks : old control messages are resent over a network with an intent of corrupting data plane of the source domain

Below are some of the countermeasures to tackle these network thefts :

i) A framework should be advised to secure netwroking among groups of virtual machines in order to ascertain isolation , confidentiality and correct information flow control in networks. this can be achieved by using Trusted Virtual Domains .

ii) Cryptography : Routing information is encrypted when sent from a host to another and the receiver is able to decrypt using a key shared between reciever and sender.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote