Answer To: Prepared by: Dr. Ghassan Kbar XXXXXXXXXXModerated by: Dr Sihui (Sue) Zhou May 2019 Assessment...
Anirban answered on May 30 2021
Running head: CYBER SECURITY NETWORK DESIGN AND ASSESSMENT
CYBER SECURITY NETWORK DESIGN AND ASSESSMENT
Cyber Security Network Design and Assessment
Name of the Student:
Student ID:
Name of the University:
Table of Contents
Introduction 2
1. Security Consideration for Network Development 2
Apply security measures to secure the access of internal network 3
Apply security measures to secure the access of external network 4
Apply security measures to secure the access of perimeter network 4
Apply security measures to secure the access of guest network 5
Apply security measures to secure the access of data sent over public network 5
2. Vulnerability of the assets for branch and call centers 6
3. Content Filtering or Other Techniques 8
4. Explain the Border Device Administration and Management 9
5. Creating a Request for RFP for Penetration Testing 10
6. Access Control 10
7. Monitoring System Access and Use Policy 11
8. Researching a DDoS Attack 12
9. Network availability at the Datacenter and Business Continuity Plan 13
Conclusion 14
Introduction
The security of the network alignment is very helpful for enabling the useful for the development of the information. The security would be developed for the integration and alignment would be management for developing the continuation and management of the works. The development would be implied for enduring the development of the works and aligning the continuation of the facilities. The selected business in the study is Call center, which provides network related support to the clients (Nagurney and Shukla 2017). There are different kinds of infrastructure required with the view towards developing a call center company towards considering the overall facts and findings associated in the global business proceedings that needed to be taken into considerations. The Call focus indicates two record servers, one application server, and a database server that is associated together legitimately and slantingly. The record server on the left is associated with two workstations and the document server on the privilege is associated with a phone. The application server is associated with two servers on the privilege and left and to a switch. The Branch comprises of a record server that is associated with a workstation, phone, and to a switch that is additionally associated with a charge card peruse at the top and to a server on the privilege and to a database server at the base. The application servers are associated with the "POS Application" comprising of a lot of two servers that are associated with every one of the application servers. Every server is again associated with the "Character and Authentication System" comprising of two application servers on the privilege and two servers on the left. The two application serves on the left and right are associated with two servers. The switch at the top is associated with a specialist co-op that is additionally associated with procuring banks.
1. Security Consideration for Network Development
Furthermore, using the perspective toward identifying the primary ideas along with using particular additional methods the use of the BIT can easily analyze monetary along with operational data, toward determining weakened regions and on a similar point of time offers methods to deal with particular problems in line with the company procedures (Sanjab, Saad and Başar 2017). The established developments discovered using the implementing of information analysis using the view toward assisting various companies, in addition to creating better-informed, data-influenced choices. Additional, and identified BI functions, consists of numerous facets of information visualization, judgement assistance, incorporation along with on-line analytical application. Likewise, using the view in the direction of growing the entire methods of the most oblivious way, the entire idea of BI provides a objective of administrational functionality, that majorities in the managers linked to the international business procedures can create program data using the objectives, that adds sales objectives, productiveness steps and monetary goals on a regular basis. Consequently, the entire idea of BI characteristics toward offering the reason for demonstrating a general understanding of the present business procedures.
Apply security measures to secure the access of internal network
Subsequently, the point of including all the fundamental exercises is to address the powerless purpose of the association. This is the place the general similitudes end contrasted and the two events, for example, business examination and business insight. The entire idea of business investigation programming is the utilization of business examination and programming applies the development procedure of dissecting the recorded just as present information with the view towards gathering the prerequisites. It uses the in general measurable investigation, different sorts of information mining process alongside the way toward applying quantitative examination towards recognizing past business examination and patterns. When information has been gathered just as broke down, the idea of business knowledge examination framework utilized the information for prescient applications.
Apply security measures to secure the access of external network
Subsequently, the point of including all the fundamental exercises is to address the powerless purpose of the association. This is the place the general similitudes end contrasted and the two events, for example, business examination and business insight. The entire idea of business investigation programming is the utilization of business examination and programming applies the development procedure of dissecting the recorded just as present information with the view towards gathering the prerequisites. It uses the in general measurable investigation, different sorts of information mining process alongside the way toward applying quantitative examination towards recognizing past business examination and patterns. When information has been gathered just as broke down, the idea of business knowledge examination framework utilized the information for prescient applications.
Apply security measures to secure the access of perimeter network
Subsequently, the point of including all the fundamental exercises is to address the powerless purpose of the association. This is the place the general similitudes end contrasted and the two events, for example, business examination and business insight. The entire idea of business investigation programming is the utilization of business examination and programming applies the development procedure of dissecting the recorded just as present information with the view towards gathering the prerequisites. It uses the in general measurable investigation, different sorts of information mining process alongside the way toward applying quantitative examination towards recognizing past business examination and patterns. When information has been gathered just as broke down, the idea of business knowledge examination framework utilized the information for prescient applications.
Apply security measures to secure the access of guest network
Subsequently, the point of including all the fundamental exercises is to address the powerless purpose of the association. This is the place the general similitudes end contrasted and the two events, for example, business examination and business insight. The entire idea of business investigation programming is the utilization of business examination and programming applies the development procedure of dissecting the recorded just as present information with the view towards gathering the prerequisites. It uses the in general measurable investigation, different sorts of information mining process alongside the way toward applying quantitative examination towards recognizing past business examination and patterns. When information has been gathered just as broke down, the idea of business knowledge examination framework utilized the information for prescient applications.
Apply security measures to secure the access of data sent over public network
Subsequently, the point of including all the fundamental exercises is to address the powerless purpose of the association. This is the place the general similitudes end contrasted and the two events, for example, business examination and business insight. The entire idea of business investigation programming is the utilization of business examination and programming applies the development procedure of dissecting the recorded just as present information with the view towards gathering the prerequisites. It uses the in general measurable investigation, different sorts of information mining process alongside the way toward applying quantitative examination towards recognizing past business examination and patterns. When information has been gathered just as broke down, the idea of business knowledge examination framework utilized the information for prescient applications.
2. Vulnerability of the assets for branch and call centers
The concept of BI , and for analytics, merged the primary usefulness within the data administration procedure, that made up the entire data administration alternatives, using the view toward suggesting different types of statistical items of data combined with the core assessment in the areas of information and information using the view toward creating better upcoming...