Uploaded by George Gitonga

network infrastructure

advertisement
1
Running head: NETWORK INFRSTRUCTURE AND SECURITY
Network security protocol and infrastructure
A WAP2 access protocol will be used because it is more secure than the previous WEP
and WAP protocols. The WAP protocol is an updated security protocol version that provides the
WIFI network with security updates against the security issues experienced when using the WEP
wireless equivalence privacy. The updated WAP2 protocol is made up of 802.1X authentications
and the temporal key integrated components, which are the primary security components. WAP2
dynamically configures clients to use the 802.1X protocol when they are at the Wi-Fi network
range. The Wi-Fi access points then challenge the client computer to provide the identification
credentials. The identification credentials are then shared with the Remote Authentication DialIn User service, which then conducts an authentication process (Adkins et al,2019). The client
computer is then prompted to send the correct authentication credentials by the server that is
tasked with the authentication process. The authentication server decides whether to validate or
not to validate depending on the verification credentials sent by the client computer. Depending
on the correctness of the information, the authentication server can either allow or deny the client
permission to access the network. If the client is validated and permitted access to the network,
the access points can then allow information or traffic to flow through the client. The 802.1
protocol is therefore suitable for the organization's networks because it provides the network
with a secure authentication and verification procedure and more secure connection. Networks
EAP protocol that is used in the WPA 802.1X protocol is essential for data encryption.
2
Running head: NETWORK INFRSTRUCTURE AND SECURITY
Physical and logical planned network topographical layout
The networks logical topographic layout pertains to the logical features of the network.
The logical features consist of the network devices as they appear to the user. The logical
network consists of the IP addresses scheme, the host computers, and other network devices like
the routing tables and as they appear to the user. The logical network is made up of multiple
networks but appears as a single network entity to the user. The networks physical topographical
layout consists of the actual networks physical locations and other interconnected devices that
are used in the network. The physical and logical network design helps the network designer to
identify areas that have potential vulnerabilities.
3
Running head: NETWORK INFRSTRUCTURE AND SECURITY
Logical
4
Running head: NETWORK INFRSTRUCTURE AND SECURITY
Illustrate the possible placement of servers, including access paths to the Internet,
intrusion detection systems (IDS), and firewalls. Note: Facility limitations, workstations,
databases, printers, routers, switches, bridges, and access points should be considered in
the illustration.
The above design illustrates how the Internet is interconnected with the router, how it
relates to the firewall, the client computers, servers, hubs, and the access points. The security of
the network considers the network topology, the configuration protocols and the placement of the
host computers with the network. In addition, every component must be carefully configured, and
the hardware and technologies chosen must be able to handle possible vulnerabilities. As
illustrated in the diagrams above, switches and hubs are used to connect all the workstations. The
broadband filter is essential for the organization to allow the network users to use the telephone
via the network and as well access the Internet simultaneously. The network switch allows for the
connection of two or more hosts to allow traffic flow and data sharing from one or more processors
within the same network. The network printer provides the capabilities to the network users to
print materials from more than one location in the network to a central point. The printer will be
connected through the Ethernet cable and also through the Wi-Fi access point. The file servers in
the network are connected to the central hubs. Traffic flows through the file servers as client
computers communicate through the central point to share data packets and files. The hubs used
in the network provides a central point where the network can be managed, where the admin can
troubleshoot the network and essential functionality of passing information from one computer to
another. The router in the network will be configured to act as a residential gateway. This is
because the network will use a dynamic host configuration network to allow automatic Internet
Protocol address configuration.
5
Running head: NETWORK INFRSTRUCTURE AND SECURITY
Create and describe a comprehensive security policy for this data-collection
company
Availability policy. The availability security principle ensures that the users can access the
network without the denial of service whenever they wish. The network must at all times have a
configured firewall to prevent people with malicious intent from intruding and protect the system
from denial of service. During network updates, the company information technology department
and the human resource department will identify the critical information resources that are needed
to ensure that the organization's critical operations continue as usual. The information technology
department shall also identify sensitive information systems that need to be protected to ensure its
availability.
Confidentiality policy. Confidentiality refers to the ability of the system to ensure data
privacy and information security for the users and prevent data from being accessed without the
right authorization. The confidentiality policy defines three steps that would respectively ensure
that; the system is protected, the security problem or intrusion is detected, the problem is contained
and that measures to contain the problem are defined, the security problem is completely eradicated
and that the system recovers from a confidentiality breach issue. Necessary steps shall be taken to
kick the user out of the network in case he or she violates the policy.
Integrity policy. The integrity of computer security ensures that data is unchanged and is
presented in the correct manner. Integrity seeks to ensure that data is not manipulated by deleting,
changing, or adding incorrect information. The information technology team or department must
ensure at all times that there is a real-time monitoring and that unauthorized operations are
detected, halted, and reported. The information system department shall ensure that there is a log
file for all the activities within the network and that any change log is kept for future references.
6
Running head: NETWORK INFRSTRUCTURE AND SECURITY
They shall ensure that there is an anti-malware or antivirus that will prevent possible intrusion or
illegal manipulation of data.
Ethical aspects related to employee behavior, contractors, password usage, and
access to networked resources and information.
All the employees who use the system must be informed on the importance of ensuring
that the system is secure and that there is a need to protect any sensitive information before the
organizations decide to grant them access to the system. The employee must not be responsible for
attempting to prove suspected network weakness as it would be interpreted by the organization as
hacking or system misuse. The employees must also endeavor to report any incidences to the
organization's information technology department immediately. The employees must be held
accountable for understanding, ascertaining, and ensuring compliance with the regulations and
policies pertaining to passwords and how they access the organizations network and information
resources (Biskup, & Bonatti, 2018). The employees and contractors should never share their
passwords with any unauthorized persons. The illegal access to the organizations network
information systems and network access without the proper authorization will lead to disciplinary
measures taken against the employees.
References
Adkins, D., Lakshminarayanan, K., Perrig, A., & Stoica, I. (2019). Towards a more functional
and secure network infrastructure.
7
Running head: NETWORK INFRSTRUCTURE AND SECURITY
Biskup, J., & Bonatti, P. (2018). Controlled query evaluation for enforcing confidentiality in
complete information systems. International Journal of Information Security, 3(1), 1427.
Download