Design a Secure Computer Network (Essay Sample)
This was a three part paper. i was required to design a secure computer network. i was then supposed to identify the components used in the network and the role that each . the final part was identifying How the overall network design protects the organization from both internal and external attacks.
source..The Design a Secure Computer Network
Network Infrastructure Diagram
Image 1. An Idraw illustration of the devices in the network infrastructure.
Components Used in the Network
Web Proxy
Proxy servers function as a firewall and web filter, provide shared network connections and cache data to speed up common requests. Having a proxy server in the network keeps users and the internal network protected from unwanted network requests. A typical web proxy accepts clients’ connections and makes decisions of whether the clients have the permission to access the requested resources. This server helps in the prevention of cyber attackers.
Make/ Vendor’s name
Whoer
Model
Proxy-Seller
IP Address Assigned
10.1.1.1930
Basic Network Configuration
Default configurations
Operating System
Windows 10 OS
Security Features
Balancing internet traffic to prevent crashing
Securing internet activities by controlling access
Saving on bandwidth by caching files and compressing incoming traffic.
Network Speed and Data Capacity
100 MBPS
Vendor Support
Available
Uptime Requirements
24/7 availability
Organizational Requirements and Expectations
100% availability
Budget
$270/ month
Elements to be Addressed for Network Testing and Planning
Before installing the web proxy, the hardware requirements for the job have to be considered. Depending on the networks’ size, the operating systems have to be taken into account.
Continuous Data monitoring
Yes
Bandwidth
Unlimited
Specific Software/Tools
Compatible with Windows 10.
Table 1: Configuration settings for a proxy server within the network
Email Proxy
An email proxy server will be a stand-alone machine located before an actual email server. The proxy used in the network can be customized to become a virus scanner, filter file sizes, filter spam and block certain types of files. The email proxy removes the load resources from the actual mail server, which can then sit behind the firewall, protected on the network. Similarly, the server prevents large scale end user migration to the mail server.
Configurations
Virus scanning is available through ClamAv. This is an open source project, hence no user fees or licenses will be required.
Mail Server
The mail server in the network acts as a virtual post office. The server will store incoming mail for distribution to local and remote users, as well as sending out outgoing messages. The application also receives incoming email from local and remote senders before forwarding the messages for delivery.
Configurations
Under the server settings, specify the following information: Server Name: smtp.gmail.com
Port: 465(SSL)/555 (TLS)
Sender email address
Test email address
Email type: SMTP/ SMTPS
Authentication Server
This server provides a network service that applications use to authenticate credentials such as passwords and usernames with their users. The device is used in the network to access control. This additional security features allows for the safe storage of usernames, passwords and accounts linked to all the computers within the system network.
Make/ Vendor’s name
HID Global
Model
SecurID Authentication
IP Address Assigned
10.1.1.1930
Basic Network Configuration
System configuration
Operating System
Windows 10 OS
Security Features and Administrative Controls
The authentification server does not have administrative controls. Once installed, the server is used to verify credentials when another server needs access to the network.
Network Speed and Data Capacity
100 MBPS
Vendor Support
Available
Uptime Requirements
99.5% availability
Organizational Requirements and Expectations
100% availability
Budget
$150
Elements to be Addressed for Network Testing and Planning
Prior to installing the servers in the network infrastructure, the size and security scope of the network infrastructure should be evaluated.
Continuous Data monitoring
Yes
Bandwidth
150 MBPS- 900 MBPS
Specific Software/Tools
Compatible with Windows 10.
Firewalls
A firewall was incorporated into the network because it offers protection against external cyber-attacks by shielding the network from malicious traffic. A firewall is also needed to prevent malicious software from accessing the network via the internet. A network firewall forms a barrier between a trusted system network and the external network, allowing specific IP addresses.
Make/ Vendor’s name
Cisco
Model
Cisco ASA 5500-X
IP Address Assigned
No IP address assigned. Under normal circumstances, a software firewall is not assigned an IP address.
Basic Network Configuration
System configuration
Operating System
Windows 10 OS
Security Features and Administrative Controls
1 The firewall installed in the network blocks and alerts the network administrator about all unauthorized inbound and outbound connections attempts.
2 If the organization allows for remote working, the employees should be able to gain access to the network and complete their work.
3 The installed firewall ought to have built-in security infrastructures such as antivirus and spam protection.
4 The administrator can temporarily disable the network firewall.
5 Installing the firewall sorts the traffic depending on the priority.
Network Speed and Data Capacity
100 MBPS
Vendor Support
Available
Uptime Requirements
99.5% availability
Organizational Requirements and Expectations
100% availability
Budget
$1500-$4000
Elements to be Addressed for Network Testing and Planning
Prior to installing a firewall in the network infrastructure, the size and security scope of the network infrastructure should be evaluated.
Continuous Data monitoring
Yes
Bandwidth
150 MBPS- 900 MBPS
Specific Software/Tools
Compatible with Windows 10.
Table 5. Basic configurations for the firewall used in the network
The Network Hub
This device will connect multiple computer networking devices in the network. The hub will act as a repeater, amplifying signals that deteriorate after traveling for long distances over connecting cables (Minoli et al.). It is the simplest device in this network because it connects LAN components with identical protocols. As long as the settings have been configured to prepare for the formatting of the incoming data, the hub can be used for both digital and analog data.
Make / Vendor’s name
Zero Productions Inc.
Model
TP-Link TL-SF1008D 8-Port 100 MBPS
IP address Assigned
192.168.1.120. The default manufacturer’s IP address will be used in this case.
Basic Network Configuration
LAN
Operating system
A network operating system (NOS). The software program controls other software and hardware running on the network.
Vendor Support
Not available
Table 1. Basic information and configurations for the hub used in the network.
Security Features
1 The hub copies the data to all the connected links.
2 All the data received through one port is divided and sent to all the other ports.
3 Inbound attacks against the connected devices and outbound attacks via the connected devices.
4 To secure communication over the network, a built-in TLS is used.
5 To prevent the possibility of a network breach, t...
Other Topics:
- Methods of Hacking and the Damages they CauseDescription: Hackers can access many hacking techniques, tools, and technical know-how when they target people or organizations. Fight fire with fire if you want to keep yourself and your family safe. You'll be able to spot weaknesses and thwart attackers in their tracks by being knowledgeable about the most popular...4 pages/≈1100 words| 6 Sources | MLA | IT & Computer Science | Essay |
- Enterprise Resource PlanningDescription: Organizations use Enterprise Resource Planning (EPR) to manage day-to-day business activities. Cloud computing is a type of azure technology for enterprises to share, manage and store services via the internet (Jain and Sharma). In cloud technology, different services such as servers, applications...1 page/≈275 words| 2 Sources | MLA | IT & Computer Science | Essay |
- What HTML and CSS Are and What They Are Used ForDescription: HTML (HyperText Markup Language) is the standard language used to write web pages and other documents designed for display on a web browser. HTML describes the content and organization of a web page using diverse elements, which are delineated with tags (for example, tells the browser that the title displayed...1 page/≈275 words| 2 Sources | MLA | IT & Computer Science | Essay |