This project provides you an opportunity to solve a comprehensive problem in firewall and VPN implementation at various levels. You will play the role of an employee participating in the network security update planning process in a specific business situation.
Project Part 1: Network Survey
Project Part 2: Network Design
Final Project: Network Security Plan
Attaching Document for more information
Project: Network Design and Plan Purpose This project provides you an opportunity to solve a comprehensive problem in firewall and VPN implementation at various levels. You will play the role of an employee participating in the network security update planning process in a specific business situation. Required Source Information and Tools Web References: Links to Web references in this Instructor Guide and related materials are subject to change without prior notice. These links were last verified on May 7, 2013. The following tools and resources will be needed to complete this project: ▪ A Web browser and access to the Internet to perform research for the project ▪ Access to the NetWitness Investigator application ▪ Packet trace files, vulnerability scans, and associated reports (provided by your instructor) o general_comm.pcap o encrypted_comm.pcap o nmap_scan.xml o topology_fisheye_chart.pdf o nessus_report.html Learning Objectives and Outcomes ▪ You will be able to apply core competencies learned throughout the course to a single project. ▪ You will be able to analyze and apply knowledge of firewalls, VPNs, network diagrams, and defense measures. ▪ You will be able to demonstrate logical reasoning and decision-making skills. Deliverables The project is divided into two smaller assignments and one major assignment. Details for each deliverable can be found in this document. Refer to the course Syllabus for submission dates. ▪ Project Part 1: Network Survey ▪ Project Part 2: Network Design ▪ Final Project: Network Security Plan © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Page 1 Project: Network Design and Plan Project Part 1: Network Survey Introduction Network defenses rely first on understanding the current configuration of hosts, services, and protocols in use within the organization. Before it is possible to plan to change anything, you must first understand what is present and where it is located within the network. The initial phase of any network security realignment process involves identifying existing resources. Scenario You have been working as a technology associate in the information systems department at Corporation Techs. The Corporation Techs’ management is concerned that they are losing business to a competitor whose bids are too accurately just under the bids offered by Corporation Techs––by an exact amount. A security firm was contracted to conduct a review of Corporation Techs' systems, identifying unauthorized access to the Web server as a potential source of compromise due to the shared reporting and public Web site functions.