Posted: June 26th, 2022

BN203 Network Security

Question:

As a Network Security Architect at B2B Solutions, you will be leading a team that includes several Network Administrators.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

B2B solutions, a medium-sized company, is expanding its operations.

To accommodate the company’s various departments, six locations were purchased in Melbourne.

Your task is to create a secure network that connects six locations.

You must ensure confidentiality and web-based filtering are in place for data to flow across networks.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Role-based access control is another requirement.

A router should be installed in each building so that the network can span six buildings.

Each building will be expected to have its own subnet.

The company expects to have approximately 500 workstations across all sites, with the following numbers:

Finance Office – 100 Workstations

Transport Office – 50 Workstations

Research Office – 25 Workstations

Sales Office – 25 Workstations

Information technology – 250 Workstations

Head Office – 50 Workstations

Write a report about a secure network plan that includes the following:

For the above scenario, draw a complete network diagram.

Include a block diagram for each SITE.

What security risks could a network face if it isn’t secure?

Note all assumptions made in the creation of a secure network.

Hardware requirements for your project include the name of security network devices along with their manufacturer, model, and type of cables.

You should also list the cryptographic standards that your network devices can use to protect you.

Use cryptographic algorithms to explain how the proposed secure network design will ensure confidentiality, integrity and authentication.

Answer:

Introduction

This report provides information on the network design and implementation of B2B solutions.

I am the Network Security Architect. I was also given the responsibility of designing the company’s network.

The company wants to implement a subnet solution within its network. This would allow the network to be divided into six divisions, and improve security and authentication.

This report contains information on the company’s network design and the sub-networking required to connect it into various divisions.

This report contains information about network design. It also includes a discussion on the network design.

This report also provides information about the network and hardware requirements that will be used to build the network for the company.

Requirements for Networks

B2B companies are looking to increase security in their network. Therefore, the company’s network structure is to be transmitted.

The company provided details about the network they plan to use for their offices and different departments.

It is necessary to sub-net the network into six different sub nets.

The company has six departments: the finance office and transport office.

As the network designer, I have been provided with additional information by the company.

The company plans to install approximately 500 workstations within their network.

These criteria should be followed when laying out the network.

Finance Office – 100 Workstations

Transport Office – 50 Workstations

Research Office – 25 Workstations

Sales Office – 25 Workstations

Information technology – 250 Workstations

Head Office – 50 Workstations

Company is also planning to establish a sub-network system that is fully secured both logically as well as by using encryption techniques. This will ensure that the company can maintain proper authentication.

Description of the Security Network

The above network solution is broken down into six sub networks.

Below is information about the subnetting technique used on the physical network. Also, the logical calculation of the network is shown.

Major Network 10.0.0.0/22

Available IP addresses in major networks: 1022

500 IP addresses are required

564 IP addresses available in subnets allocated

Around 56% of the available major network address space are used.

Around 89% of subnetted address space is used.

Name of the Subnet

Size is important

Allocate Size

Address

Mask

Assignable range

Broadcast

This configuration would be used to sub-nett the network.

Network Risks

Implementing a network in an organization can pose many risks.

These are the most common risks within a network:

Data Breach: There are many types of data breaches that can happen within a network.

The network can be the site of data theft.

It is possible to tamper with the data in the network.

The organization’s data can also be leaked.

Employee theft: An employee can also leak data within an organization.

If the attackers gain access to the network, they can easily acquire the data of the company and give it to them.

Weak Access Control: An attacker could gain easy access to the network’s network through weak access controls. They can also perform man in the middle attacks to steal sensitive data from it. This would make the security of the network less secure.

Privilege misuse: Different levels of authentication would be used within the network, and different staff members would be granted different privileges.

This would allow staff within the organization to abuse these opportunities.

Before designing the network, additional assumptions were made to account for all risks and requirements.

The network would use the subnet 10.0.0.0/21.

Additional systems can also be installed within the network, so the possibility of installing additional machines was also considered.

The Network Requirements

The Cisco SPA122 Small Business ATA and Router is used to implement the network.

These routers are made by Cisco.

Each router costs approximately $1000.

The CAT5 cables can also be used to connect to the router.

Additional switches are required to distribute the network between the six departments as well as within each department.

These switches are available at a cost of around $150 each and can be used within the network using D-Link 24 port switches.

Justification of the Network Design

The company’s instructions and requirements are followed when designing the network.

This design provides a high level of security and allows for the division of the network into six distinct areas.

This network design will allow for authentication options for all systems. It also helps to prevent any external intrusions to the network system.

These sub-divisions would be part of the network as shown below:

Information Technology – 10.0.0.0/24 255.255.255.0 10.0.0.1 10.0.0.254 11.0.0.255

Finance Office – 10.0.1.0/25 255.255.255.128 10.0.1.1- 10.0.1.126 10.0.1.127

Head Office – 10.0.1.128/26 255.255.255.192 10.0.1.129 10.0.1.190 10.0.1.191

Transport Office- 10.0.1.192/26 255.255.255.192 10.0.1.193 100.1.254 10.0.1.255

Research Office – 10.0.2.0/27 255.255.255.224 10.0.2.1 10.0.2.31

The firewalls are also installed in the network to protect the network’s security and the data packets within it.

The network also includes encryption and decryption methods.

The 3 DES encryption system encrypts the network.

Conclusion

It can be concluded that network security is vital.

Our main concern is about the B2B company. They are looking to create a subnetwork.

I am the Network Security Architect. I was also given the responsibility of designing the company’s network.

This report contains information about the company’s network design and the sub-networking required to connect it into various divisions.

This report contains information about the network design as well as a brief discussion on the network design.

This report also provides information about the network and hardware requirements that will be used to build the network for the company.

Image Cryptography Using RSA Algorithm for Network Security.

International Journal of Computer Science & Engineering Technology 5(9).

2014, Sumbaly, R. and Bhatia P.

Framework for wireless network security with quantum cryptography.

Gill, M., and Kakkar A.G. (2016)

Joshi, M.R.

Cryptography and network security.

Kapoor V. and Yadav R. (2016)

International Journal of Computer Applications Volume 0975-8887)

Kumar, A. and Bose S., 2017.

Network security and cryptography.

Pearson Education India.

Manshaei M.H.. Zhu Q.. Alpcan T., Baciar T. and Hubaux J.P.

Game theory meets privacy and network security.

ACM Computing Surveys, 45(3), p.25.

W. Stallings and M.P. Tahiliani (2014)

Vol. 6: Cryptography and network security principles and practice (Vol.

Van Tilborg H.C. and Jajodia S.

Encyclopedia of security and cryptography.

Springer Science & Business Media.

Expert paper writers are just a few clicks away

Place an order in 3 easy steps. Takes less than 5 mins.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00
error: Content is protected !!
Open chat
1
Order through WhatsApp!
affordablepaperwritings.com
Hello!
You Can Now Place your Order through WhatsApp
 

 

Order your essay today and save 30% with the discount code DISCOUNTS2022