Sign In
Not register? Register Now!
You are here: HomeEssayIT & Computer Science
Pages:
8 pages/≈2200 words
Sources:
3 Sources
Level:
MLA
Subject:
IT & Computer Science
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 39.95
Topic:

Design a Secure Computer Network (Essay Sample)

Instructions:

This was a three part paper. i was required to design a secure computer network. i was then supposed to identify the components used in the network and the role that each . the final part was identifying How the overall network design protects the organization from both internal and external attacks.

source..
Content:

The Design a Secure Computer Network


Network Infrastructure Diagram
Image 1. An Idraw illustration of the devices in the network infrastructure.
Components Used in the Network
Web Proxy
Proxy servers function as a firewall and web filter, provide shared network connections and cache data to speed up common requests. Having a proxy server in the network keeps users and the internal network protected from unwanted network requests. A typical web proxy accepts clients’ connections and makes decisions of whether the clients have the permission to access the requested resources. This server helps in the prevention of cyber attackers.
Make/ Vendor’s name

Whoer

Model

Proxy-Seller

IP Address Assigned

10.1.1.1930

Basic Network Configuration

Default configurations

Operating System

Windows 10 OS

Security Features

Balancing internet traffic to prevent crashing
Securing internet activities by controlling access
Saving on bandwidth by caching files and compressing incoming traffic.

Network Speed and Data Capacity

100 MBPS

Vendor Support

Available

Uptime Requirements

24/7 availability

Organizational Requirements and Expectations

100% availability

Budget

$270/ month

Elements to be Addressed for Network Testing and Planning

Before installing the web proxy, the hardware requirements for the job have to be considered. Depending on the networks’ size, the operating systems have to be taken into account.

Continuous Data monitoring

Yes

Bandwidth

Unlimited

Specific Software/Tools

Compatible with Windows 10.

Table 1: Configuration settings for a proxy server within the network
Email Proxy
An email proxy server will be a stand-alone machine located before an actual email server. The proxy used in the network can be customized to become a virus scanner, filter file sizes, filter spam and block certain types of files. The email proxy removes the load resources from the actual mail server, which can then sit behind the firewall, protected on the network. Similarly, the server prevents large scale end user migration to the mail server.
Configurations
Virus scanning is available through ClamAv. This is an open source project, hence no user fees or licenses will be required.
Mail Server
The mail server in the network acts as a virtual post office. The server will store incoming mail for distribution to local and remote users, as well as sending out outgoing messages. The application also receives incoming email from local and remote senders before forwarding the messages for delivery.
Configurations
Under the server settings, specify the following information: Server Name: smtp.gmail.com
Port: 465(SSL)/555 (TLS)
Sender email address
Test email address
Email type: SMTP/ SMTPS
Authentication Server
This server provides a network service that applications use to authenticate credentials such as passwords and usernames with their users. The device is used in the network to access control. This additional security features allows for the safe storage of usernames, passwords and accounts linked to all the computers within the system network.
Make/ Vendor’s name

HID Global

Model

SecurID Authentication

IP Address Assigned

10.1.1.1930

Basic Network Configuration

System configuration

Operating System

Windows 10 OS

Security Features and Administrative Controls

The authentification server does not have administrative controls. Once installed, the server is used to verify credentials when another server needs access to the network.

Network Speed and Data Capacity

100 MBPS

Vendor Support

Available

Uptime Requirements

99.5% availability

Organizational Requirements and Expectations

100% availability

Budget

$150

Elements to be Addressed for Network Testing and Planning

Prior to installing the servers in the network infrastructure, the size and security scope of the network infrastructure should be evaluated.

Continuous Data monitoring

Yes

Bandwidth

150 MBPS- 900 MBPS

Specific Software/Tools

Compatible with Windows 10.

Firewalls
A firewall was incorporated into the network because it offers protection against external cyber-attacks by shielding the network from malicious traffic. A firewall is also needed to prevent malicious software from accessing the network via the internet. A network firewall forms a barrier between a trusted system network and the external network, allowing specific IP addresses.
Make/ Vendor’s name

Cisco

Model

Cisco ASA 5500-X

IP Address Assigned

No IP address assigned. Under normal circumstances, a software firewall is not assigned an IP address.

Basic Network Configuration

System configuration

Operating System

Windows 10 OS

Security Features and Administrative Controls

1 The firewall installed in the network blocks and alerts the network administrator about all unauthorized inbound and outbound connections attempts.
2 If the organization allows for remote working, the employees should be able to gain access to the network and complete their work.
3 The installed firewall ought to have built-in security infrastructures such as antivirus and spam protection.
4 The administrator can temporarily disable the network firewall.
5 Installing the firewall sorts the traffic depending on the priority.

Network Speed and Data Capacity

100 MBPS

Vendor Support

Available

Uptime Requirements

99.5% availability

Organizational Requirements and Expectations

100% availability

Budget

$1500-$4000

Elements to be Addressed for Network Testing and Planning

Prior to installing a firewall in the network infrastructure, the size and security scope of the network infrastructure should be evaluated.

Continuous Data monitoring

Yes

Bandwidth

150 MBPS- 900 MBPS

Specific Software/Tools

Compatible with Windows 10.



Table 5. Basic configurations for the firewall used in the network
The Network Hub
This device will connect multiple computer networking devices in the network. The hub will act as a repeater, amplifying signals that deteriorate after traveling for long distances over connecting cables (Minoli et al.). It is the simplest device in this network because it connects LAN components with identical protocols. As long as the settings have been configured to prepare for the formatting of the incoming data, the hub can be used for both digital and analog data.
Make / Vendor’s name

Zero Productions Inc.

Model

TP-Link TL-SF1008D 8-Port 100 MBPS

IP address Assigned

192.168.1.120. The default manufacturer’s IP address will be used in this case.

Basic Network Configuration

LAN

Operating system

A network operating system (NOS). The software program controls other software and hardware running on the network.

Vendor Support

Not available

Table 1. Basic information and configurations for the hub used in the network.
Security Features
1 The hub copies the data to all the connected links.
2 All the data received through one port is divided and sent to all the other ports.
3 Inbound attacks against the connected devices and outbound attacks via the connected devices.
4 To secure communication over the network, a built-in TLS is used.
5 To prevent the possibility of a network breach, t...

Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • Methods of Hacking and the Damages they Cause
    Description: Hackers can access many hacking techniques, tools, and technical know-how when they target people or organizations. Fight fire with fire if you want to keep yourself and your family safe. You'll be able to spot weaknesses and thwart attackers in their tracks by being knowledgeable about the most popular...
    4 pages/≈1100 words| 6 Sources | MLA | IT & Computer Science | Essay |
  • Enterprise Resource Planning
    Description: Organizations use Enterprise Resource Planning (EPR) to manage day-to-day business activities. Cloud computing is a type of azure technology for enterprises to share, manage and store services via the internet (Jain and Sharma). In cloud technology, different services such as servers, applications...
    1 page/≈275 words| 2 Sources | MLA | IT & Computer Science | Essay |
  • What HTML and CSS Are and What They Are Used For
    Description: HTML (HyperText Markup Language) is the standard language used to write web pages and other documents designed for display on a web browser. HTML describes the content and organization of a web page using diverse elements, which are delineated with tags (for example, tells the browser that the title displayed...
    1 page/≈275 words| 2 Sources | MLA | IT & Computer Science | Essay |
Need a Custom Essay Written?
First time 15% Discount!