LO1: Perform a risk assessment for a given network security scenario and design a defensive strategy to address the risks that you have identified.
LO2: Devise a firewall security policy and implement it using appropriate hardware and/or software.
Assignment Brief Introduction
The Internet has changed the approaches and attack vectors used by criminals in a massive way. The requirements for a criminal to geographically close to their target is no longer a requirement. Attackers can probe and gain access to any unprotected network from the comfort of their local internet café; no physical presence, no violence – simply following a logical processes and careful analysis of the information retrieved from a probed network is sufficient for the criminal to obtain sensitive data such as credit card and deeply personal details. Therefore the design and development of a secure network that provides a defence in depth strategy is paramount in today’s business environment.
Assignment Brief and Overview of Research Scope
You are required to design and document a secure network for a medium sized doctor’s office that includes the development of a shell script that includes all of the configuration elements for a Linux based iptables based firewall.
For this written assignment you are expected to research and develop two areas of network security. This assignment will provided you with a deep yet rounded understanding of the approaches required to protect networks from outside attack without restricting use for the authorised users of the network.
The assignment will consist of at least a minimum of three thousand words (excluding appendices, bibliography and contents page) and will require independent research covering the following two aspects of risk assessment for the design of a secure network that takes a defensive strategy to address the risks that you have identified and devise a firewall security policy and implement it using appropriate hardware and/or software.
1. Risk Assessment and Secure Network Design: Under take a risk assessment to determine services, protocols, connection directions, security classifications for data, access control, overall network security and Host and server security. Design the secure network contrasting technologies and techniques to define the best strategy to mitigate the attack vectors identified based upon the protocols and risk analysis. This will include a detailed network diagram outlining ingress and egress points and full topology diagram that provides a defence in depth strategy.
2. Devise the firewall policy: Provide detailed instructions for the configuration of the firewall and rational for the rules applied based upon the identified network services highlighted from the risk analysis as identified in part one. This must be submitted as a shell script with detailed information on each of the rules that have been identified and how this related to the information security strategy and the defence in depth strategy
For both areas you will need to consider and research contemporaneous security practices for network design and deployment. Furthermore you will need to provide comparisons and justify your approaches for the topological design, deployment of technologies and why you have chosen the strategies and technologies. It may well be worth researching to see if there are existing practices within the NHS for this sort of development.
Please use the papers provided in the Case Study lectures on Moodle 2 to help you understand the topic and how to write at the required academic level. This is a piece of applied research and should be documented as such.
PLACE THIS ORDER OR A SIMILAR ORDER WITH BLACK BOARD MASTERS TODAY AND GET AN AMAZING DISCOUNT
The post LO1: Perform a risk assessment for a given network security scenario and design a defensive strategy to address the risks that you have identified. appeared first on Wise Papers.