Answer To: CSI6218 WIRELESS AND MOBILE COMPUTING SECURITY CASE STUDY: WIRELESS AND MOBILE COMPUTING SECURITY...
Akansha answered on May 02 2020
Why Network Segmentation Needed?
The phase when it required the parting of the networks or a specific equipment has touched its physical volume and the utilization of the partition is done. The network could be extended by fragmenting the LAN. It will decrease the contestation and network issues could be isolated and the security could be enhanced.
▪ Network Extension –to implement the new segments which could allows the new host onto the LAN, switches or routers could added when the network’s maximum physical capacity has been over (Tripod, n.d.).
▪ Decreasing the Congestion – with the increase of the number of workstations or devices, the requirement of the bandwidth also increases. The network administrator could segment the LAN and per network hosts could be reduced in number. There is Parallel reduction in the bandwidth usage and requirement if the communication is present in the traffic between the devices on the same segment (Tripod, n.d.).
▪ Separate network problems – the division of the network in smaller sections by the network administrator, the overflow of the issues could be decreased from one segment to another. The other challenges like Hardware and Software failure could be reduces to impact the network’s smaller portions (Tripod, n.d.).
▪ Enhanced Security – the network administer could ensure that an outside source could have the access to the internal configuration of the network by utilizing the partitions. The broadcast of the privileged packets cannot be possible throughout the network, but only on the subnet it originated from (Tripod, n.d.).
Point 2
Bradford Hospital’s Firewall Policy
PURPOSE:
In Bradford Hospital the firewalls play an essential role. They are termed as the alarm system for controlling and restricting the network services and connectivity. It has the control to place a control point if an enforcement of access control is being done. The machines those will be permitted to exchange information is determined by the connectivity. A service is referred here as way to transfer information through a firewall. Such as, services comprise of MS-Exchange Servers, Remote Access (VPN), Mail Relay Server (SMTP) web browsing (HTTP) and File Transfer Protocol (FTP). The given policy demonstrates the important rules related to the maintenance and management of the Bradford Hospital’s Firewalls. The policy is applied to all rented, owned, leased and otherwise used Firewalls in the Bradford Hospital by its employees (Texas Wesleyan Firewall Policy, 2011).
SCOPE:
Each firewalls of the Bradford Hospital network falls into the control of the policy. It includes the firewalls managed by the hospital’s employees or any third party given access in the branch office. Any permission to the departure from the policy need to be priory approved in writing by the Bradford Hospital’s Network Administrator. In certain cases, the equipment like UTM or Proxy servers could function as Firewalls when they are not recognized officially as firewalls. The role of the firewalls is played by Bradford Hospital, whether or not called as firewalls officially. Still they are to be managed under the policy rules as defined. As particular points, the process may demand the upgradation of the devices so that the devices could support the lowest functionality as defines the policy and procedures (Texas Wesleyan Firewall Policy, 2011).
REQUIREMENT SPECIFICATION:
• Documentation Required- the submission of the explanation of the network diagram on the permitted paths with protection for individual, and demonstration of qualified services is important before any firewall of Bradford Hospital gets deployed. This part needs to be submitted to the Bradford Hospital’s Network Administrator. The network administrator f the hospital will provide the permission that will allow any such paths and services. This permission will be given based on the criticality of the business reason and essentiality of the administrative path opted for and ensuring that the viable safety efforts will go along with it. The documentation will be representing the conformance of the real firewall and it will be occasionally checked and scrutinized by the security engineer. The underneath portrayed procedure will be experienced each time a progression of such way takes place.
• Default to Denial –Bradford Hospital firewalls must deter every affiliation way and organization that isn't especially permitted by this approach. This includes the supporting reports those are issued by the Network Administration division. The neglected which now embraced ways and organizations must be accounted for and taken to all system heads and all information need to be proceeded by Hospital Network Administration Department of Bradford. A stock of all entrance ways in and out of the inner systems of the Bradford Hospital must be kept up by the Network Administration Department of Bradford Hospital.
• Connections in Machines – no real-time connections should be enabled or established between two or more Bradford Hospital. To do this the Network Administration department of the Bradford Hospital should determine first that these connections are not being unduly used to jeopardise with the network’s confidentiality and security. Mostly, comparative middle structure or firewalls should be used. These criteria apply regardless of the innovative technique used, which includes microwave joins, computerised supporter line associations, link modems, remote associations, and administrations advanced system lines. The approval for any association between the in-house Braford Hospital with any external PC or system, or any service giver needs to be taken priory from the Network...