University : Bond University UniLearnO is not sponsored or endorsed by this college or university.
Subject Code : ICTNWK502
Country : Australia
Assignment Task:

Scenario:

You are employed by Spy on Technologies, a global business that manufactures weapons and military technology and equipment.  You work in the cybersecurity division as a network engineer. Your role is to assist with the planning and implementation of security measures and general network infrastructure.
Company profile:

Spy on Technologies is a global security and aerospace company that employs about 120,000 people worldwide and is principally engaged in the research, design, development, manufacture, integration, and sustainment of advanced technology systems, products, and services. The Corporation's sales from continuing operations are $46.5 billion P/A.

The company's primary business is in supplying military equipment to Governments around the world.

Company's Security Statement:

Cyber Security attacks continue to increase in frequency and sophistication for the Aerospace and Defense industry.  Adversaries are targeting anyone who possesses the sensitive information they seek including the government, prime contractors, and suppliers.  It is imperative that our suppliers understand what's at stake and recognize our shared role in protecting sensitive information and intellectual property.   A single mistake or breach could have enormous consequences for our customers, our business, the Aerospace & Defense Industry, and national security.

The Spy on Technologies Cyber Security Alliance combines the strengths of market-leading companies' solutions and integrates their best practices, hardware, software and tools within the NexGen Cyber Innovation and Technology Center. The Alliance Companies include APC by Schneider Electric, ArcSight, CA, Cisco, Citrix, CyberPoint, Dell, EMC Corporation and its RSA Security Division, FireEye, HP, Intel, Juniper Networks, McAfee, Microsoft, NetApp, Radware, RedHat, Splunk, Symantec, Trustwave, Verizon and VMware.

IT Services:

Spy on Technologies uses the following server technologies:

1.Web servers for the company intranet and Web applications.  This is accessed by remote workers.
2.Mail servers - Used by internal and external staff
3.Unified Communications servers

Security Requirements:

Much of Spy on Technologies business dealings involve top-secret military projects with governments around the world.  It is imperative that the details of these projects remain confidential. The following security measures are required:

1. The security perimeter must prevent all unauthorized access to company data.
2. All WAN links must be encrypted and secured.
3. All electronic communication within the company and with third parties must be encrypted and digitally signed.
4. Measures must be put in place to protect against DOS, DDOS, viruses, and all other cybersecurity threats.
5. The solution must be fault-tolerant by eliminating single points of failure

Question 1

a. Would you describe Spy on Technologies security requirements as high, medium, or low? Why?
b. What types of security measures would you use to address each of the security requirements listed?

Question 2

Design the firewall configuration. Ref: How to Design a Secure DMZ
Your design should include the following:

1. The name of each security zone you will create

2.The inter-zone policy objectives including

a. Traffic allowed into the zone
b. Traffic allowed between the zones
c. Other security measures to be implemented in the policy

3.Method of securing traffic from site to site

4.Method of securing traffic to and from the public internet

Question 3

Write the Juniper SRX configuration required to implement all the functionality described in your answer above. You may refer to the SRX lab configurations. You will need to provide your IP addressing scheme as a separate table.

Question 4

Design failover redundancy for the firewall so that a stateful failover of processes and services will occur in the event of system or hardware failure.   Provide a diagram of your design and a description of how failover will be achieved in the event of a failure.

Question 5

Provide a typical failover redundancy configuration for a Juniper SRX firewall.

Question 6

Provide a typical site to site VPN configuration for a Juniper SRX firewall.

Question 7

Is the network traffic traversing the IPSEC VPN encrypted using symmetric or asymmetric encryption? Explain the difference between these 2 methods. Compare 3 algorithms that could be used to encrypt the IPSEC VPN traffic.  List the tests you will perform to verify that your security measures and VPN are functioning as expected.

Question 8

You want to encrypt email communications between all company staff and business associates.  What program could you use to do this? What are the advantages of this program? What type of encryption would be used? What encryption algorithms could be used?

Question 9

You want to ensure the integrity of email and other digital communication.  How can this be achieved? What algorithms could be used?

Question 10

What authentication processes could you use to verify the identity of the person from who you are receiving email and other digital communication and to verify your identity to people you are sending communications to?  What algorithms could be used?

Question 11

Evaluate the following providers of digital certificates and create a comparison table.  The table should compare the cost and advantages of the certificate services offered by each.

  • Thawte
  • Go, Daddy
  • Comodo
  • GlobalSign
  • GeoTrust
  • Symantec

 

Question 12

Provide a brief summary of Kerberos and NTLM Authentication. Describe the benefits of Kerberos Authentication.

Question 13

Provide a brief summary of Biometrics for Authentication. Describe the benefits of using Biometrics for Authentication. List 3 devices you could use to provide Biometric Authentication?

Question 14

Explain the concept of digital certificates and how they work including:
The relationship between user certificates and root certificates and the function of root certificates

  • The role of Certificate Authorities
  • The role of Registration Authorities
  • The function of a digital certificate repository

 

Question 15

What are the factors that contribute to encryption strength?

Question 16

You are reviewing help desk records and discover that emails to some recipients are not able to be encrypted while emails to other recipients are. What is the cause of this and how could it be resolved?

Question 17

Explain what a replay attack is and describe 2 methods of protection.

Question 18

Describe 5 security threats that can be caused by issues within the organisation. Ref: https://www.zdnet.com/article/the-top-five-internal-security-threats/

Question 19

Explain the difference between WEP, WPA and WPA2.

Question 20

Explain authentication, authorization, and accounting (AAA). Your explanation should include the functions of a RADIUS server and its role in the resource accounting process.

Question 21

Describe the function and operation of both IPSEC and MPLS VPN’s.  Compare these 2 technologies in terms of their ability to provide QoS, guaranteed bandwidth, and changing security requirements like the need for secure voice or video.

Question 22

Describe and compare CHAP and PAP authentication protocols.

Question 23

Write your proposal to Spy on Technologies.


This ICTNWK502 IT Assignment has been solved by our IT Experts on UniLearnO. Our Assignment Writing Experts are efficient to provide a fresh solution to this question. We are serving more than 10000+ Students in Australia, UK & US by helping them to score HD in their academics. Our experts are well trained to follow all marking rubrics & referencing style.

Be it a used or new solution, the quality of the work submitted by our assignment experts remains unhampered. You may continue to expect the same or even better quality with the used and new assignment solution files respectively. There’s one thing to be noticed that you could choose one between the two and acquire an HD either way. You could choose a new assignment solution file to get yourself an exclusive, plagiarism (with free Turnitin file), expert quality assignment or order an old solution file that was considered worthy of the highest distinction.

  • Uploaded By : Alex Cerry
  • Posted on : January 14th, 2019
  • Downloads : 215

Whatsapp Tap to ChatGet instant assistance