Computer Science Question
Learning Goal: I’m working on a computer science multi-part question and need the explanation and answer to help me learn.
INTRODUCTION
In this three-part assignment, you will design a secure network infrastructure.
The specific course learning outcome associated with this assignment is:
- Plan a deployment of software and/or hardware, including implementation and testing considerations.
INSTRUCTIONS
Part 1
Use Microsoft Visio or an open-source alternative to:
- Create a network infrastructure diagram, incorporating the following devices needed for a secure corporate network, placed where they will work, and citing specific, credible sources that support the design.Note: A web search will provide multiple examples of network infrastructure diagrams.
- Web server.
- FTP server.
- VPN server.
- Authentication server.
- Anti-virus server (client-based and server-based).
- Edge firewall.
- Firewall.
- Vulnerability scanner.
- Intrusion detection system (IDS).
- Web proxy.
- Edge router.
- Core router.
- Switch.
- Distribution router.
Note: All client- and server-based devices work where a client is installed on a workstation, which has bi-directional communication with a corresponding server.
Part 2
Write a 6–10 page paper in which you:
- Determine the specific devices you will use in the network, including the following information for each device:
- Make or vendor’s name (for example, Microsoft, Redhat, Cisco, Juniper, Netgear, 3Com).
- Model (for example, Windows 7, ASA 5500, Cisco 3500, Squid).
- IP address assigned to all devices.
- Determine the basic configuration of each network device, citing specific, credible sources that support the configuration.
- Research each of the devices you chose and provide a basic configuration you would use in your network.
- Use IP addresses to describe your configuration.
- Identify the operating system.
- Highlight at least five security features and the administrative controls incorporated into each device, including devices in the network diagram.
- Explain the impact that each of your configurations has on the security of the entire network.
- Explain the elements that must be addressed for planning and testing a network, citing specific, credible sources that support your assertions and conclusions.
- Organizational requirements and expectations.
- Budget.
- Modularity for security and testing.
- Naming conventions that facilitate layering and growth.
- Determination of required network speed and data capacity.
- Vendor support.
- Determination of risk and redundancy.
- Uptime requirements.
- Continuous data monitoring for fault, failure, or security-induced changes.
- Load balancing.
- Testing for latency.
- Bandwidth.
- Throughput.
- Specific software and tools.
- Support your main points, assertions, arguments, or conclusions with at least four specific and credible academic sources synthesized into a coherent analysis of the evidence.
- Cite each source listed on your source page at least one time within your assignment.
- For help with research, writing, and citation, access thelibraryor reviewlibrary guides.
- This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.
- Write clearly and concisely in a manner that is well-organized, grammatically correct, and free of spelling, typographical, formatting, and/or punctuation errors.
Part 3
Use Microsoft Visio or an open-source alternative to:
- Update your initial diagram to create a final network diagram, incorporating at least four-fifths of the devices needed for a secure corporate network and citing specific, credible sources that support the design. Be sure to include vendor information, model information, and IP addresses. In addition, ensure that:
- VPN sessions (from a laptop) are only allowed to access the desktops in the IT department by IT department employees.
- All VPN connections from the Internet cloud into the corporate network terminate at the VPN server.
- Users from Engineering Finance and Accounting cannot communicate.
- Vulnerability scans occur daily, with all desktops scanned at least once per day.
All diagrams and charts you create for the assignment should be included in the paper.