2020051902165720200516071824g627_network_security_planning_2 x20200519021614cis_532_assignment_22 x20200519021607cis_532_assignment_12 x
powerpoint slides
each element one slide so i need like 14-15 slides
In this assignment you are to submit the Network Design Executive PowerPoint Presentation for the term paper.
This is a persuasive Executive PowerPoint presentation of up to 15 slides that you will present to the Executive Committee of Fiction Corporation.
The PowerPoint must include the following in accordance with Chapter 14 of the text:
1. Title page
2. Executive summary
3. Project goal
4. Project scope
5. Design requirements:
a. Business goals
b. Technical goals
c. User communities and data stores
d. Network applications
6. Current state of the network
7. Logical design
8. Physical design
9. Results of network design testing
10. Implementation plan with a project schedule
11. Project budget with a return on investment calculation
Your assignment must follow these formatting requirements:
- Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
- Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
- Include charts or diagrams created in Excel, Visio, MS Project, or one of their equivalents such as OpenOffice, Dia, and Open Project. The completed diagrams / charts must be imported into the Word document before the paper is submitted.
The specific course learning outcomes associated with this assignment are:
- Develop a comprehensive network design document.
- Use technology and information resources to research issues in network architecture and analysis.
- Write clearly and concisely about network architecture and analysis using proper writing mechanics and technical style conventions.
Here are assignments 1, 2 and 3. As far as the book chapter 14 goes it just explains what each thing is.
Running Head: NETWORK SECURITY PLANNING – SAFE 1
NETWORK SECURITY PLANNING – SAFE 2
Network Security Planning – SAFE
Name
Institution Affiliation
Date
Introduction
Network security is very important in any organization. Attackers are always ready to cause harm to vulnerable networks. Threats such as ransomware, worms, phasing, botnets, and computer viruses are very common today. According to Balan, Otto, Minasian, and Aryal (2017), most companies have incurred huge losses through cyber-attacks. The most challenging thing in modern computer security is that attackers have advanced their skills and keeps on inventing new and more complicated threats. Due to this, it has become a challenge for most organizations to withstand emerging attacks using traditional security measures. Therefore, there is a need for a security solution that is comprehensive, threat-focused, and credible. CISCO SAFE reference architecture provides all the needs that modern organizations need to secure their network.
CISCO SAFE Reference Architecture
The CISCO SAFE reference architecture is a modern way of securing businesses from both the existing and upcoming threats. It organizes security capabilities in the organization to come up with blueprints. The designs of SAFE architecture combine security capabilities with the flow of the business to ensure that the network is secure in all network levels (Savold, Dagher, Frazier, & McCallam, 2017). The SAFE reference architecture is organized into places in network (PIN) or modules, which include Branch, Campus, Cloud, Internet edge, WAN, and Data Center. Security capabilities implemented in these PINS provides organizations with protection for the threats posed by new threats posed by the evolving media and technologies.
The branch module is the most targeted part of the network architecture because it connects users to the organization via a remote connection. This is where threats like insider threats occur. CISCO SAFE Branch ensures that the branch is secure by preventing unauthorized access and protecting the endpoints. WAN edge interconnect branches in different locations. CISCO SAFE WAN edge ensures that WAN is protected from denial of service attacks to ensure consistent business flow. CISCO SAFE data centers and SAFE internet edge also ensures that data storage and internet connectivity are resilient and available because they can affect business processes if they are down or attacked.
Limitations of CISCO SAFE Reference Architecture
CISCO SAFE architecture has the following limitations. First, it is dependent on devices from CISCO (Fernandez, Monge, & Hashizume, 2016). This means that it is impossible to implement CISCO SAFE architecture on the network effectively without first purchasing CISCO devices. Since CISCO SAFE architecture is implemented in modules, all modules must be uniform in terms of the device used to avoid incompatibility. For example, network devices from Huawei, cannot be used in some of the CISCO SAFE architecture modules. This limits the flexibility of CISCO SAFE architecture.
The second limitation of CISCO SAFE architecture is that organizations cannot implement it without redesigning the whole network. According to Savold, Dagher, Frazier, and McCallam (2017), CISCO SAFE architecture is the arrangement of existing security devices and capabilities in a way that improves the overall security. This means that it is not single software or hardware that can be installed on the existing network. Therefore, the organization must incur extra costs to buy devices such as Cisco Security Agents (CSA) and firewalls that are compatible with the SAFE architecture and pay the experts. This makes it hard for small and medium organizations to implement the CISCO SAFE despite the existing security challenges.
Conclusion
In conclusion, network security has become a challenge in the modern world because of more advanced threats due to evolving technology and media. Today, Organizations are in need of security solutions that can provide a means for securing the whole network. That is why CISCO SAFE reference architecture has benefited most organizations by allowing security to be implemented in all network levels. SAFE architecture has allowed businesses to improve productivity by allowing employees to work safely without threats, such as the denial of service attacks. Also, the organization’s branches are interconnected securely, thus facilitating organizational growth.
References
Balan, S., Otto, J., Minasian, E., & Aryal, A. (2017). Data analysis of cybercrimes in businesses. Information Technology and Management Science, 20(1), 64-68.
Fernandez, E. B., Monge, R., & Hashizume, K. (2016). Building a security reference architecture for cloud systems. Requirements Engineering, 21(2), 225-249.
Savold, R., Dagher, N., Frazier, P., & McCallam, D. (2017, June). Architecting cyber defense: a survey of the leading cyber reference architectures and frameworks. In 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud) (pp. 127-138). IEEE.
Running head: DESIGNING A NETWORK TOPOLOGY 1
DESIGNING A NETWORK TOPOLOGY 2
Assignment 2: Designing a Network Topology
Bennie Carter
CIS 532: Network Architecture and Analysis
John Dorociak
Monday, May 4, 2020
Depict a graphical topological network design for the 20 employees (Academy, 2014).
Figure 1: Graphical topological network design for the 20 employees
Depict a graphical topological network design for the 200 employees (Cisco, 2011).
Figure 2: Graphical topological network design for the 200 employees
Figure 3: Network Tiers
Depict a graphical model of network topology for future development to 400 employees.
Figure 4: Graphical model of network topology for future development to 400 employees
Figure 5: Client, Access and Data Components
Executive Summary
As companies grow and expand their capacities, it is key that security in the networking is incorporated as the network expands allowing for backup servers. The first image displays the pictorial view of the 20 employees in the organization. They are connected to the network using a group switch or a router for the Bring Your Own Devices [BYOD] (Redmon, 2014). Business goes on in the company in the presence of a server and firewall filtering the internet traffic. The current topology which is considered flat, incorporated Pc’s and Peer to Peer Servers connection connected using ADSL internet line connectivity making the access very restricted. The switch has allowed workers to keep the growing employees connected. The current design that was upgraded to accommodate the 200 employees supported the installation of essential services to maintain and keep the network secure. Active Directory with DNS, Sign-on, file sharing and DHCP replaces the initial flat topology (Academy, 2014).
(Cisco, 2011) claims that an organization’s growth of between 200 and 1000 users is called a medium-size network. A three-tier network model is proposed to counter this high number of employees. It increases the performance of the network at all times, keep the network safe by employing a VPN to enhance security at all times. Working stations are linked with the Access Layer Stackable switches making it cheap to redeploy the existing switches. They will uplink a Distribution layer switch that joins to a dual-core layer redundant switch structure and a touch of mesh topology. For the backups, all buildings will serve as a storage for each building linked using a Virtual local area network that employs a failover services technology called MPLS and Active Directory DFS synch for files, data source failover of web server, management of content and database are always accessible. Part mesh model offer recovery from disaster and no downtime.
References
Academy, C. N. (2014). Hierarchical Network. Cisco Networking Academy Connecting Networks Companion Guide: Hierarchical Network Design, https://www.ciscopress.com/articles/article.asp?p=2202410&seqNum=4.
Cisco. (2011). Redundancy and Fail-Over. Retrieved from Service Control Engine (SCE) Software Configuration Guide, Rel. 3.1,: https://www.cisco.com/en/US/products/ps6134/products_configuration_guide_chapter09186a0080849904.html#wp1047706
Redmon, K. (2014). Cisco bring your own device (BYOD) networking. Cisco Press,.
Runninghead: CAPABILITIES PROPOSAL 1
CAPABILITIES PROPOSAL 2
Assignment 1: Capabilities Proposal
Bennie Carter
CIS 532: Network Architecture and Analysis
John Dorociak
Monday, April 20, 2020
Prepare an opening statement that specifies your organization’s capabilities to manage a deployment of this size
Antotech consulting firm began operations in 2004. We are ready to aid in the complexities of network analysis, upgrades, assessments, and processes for company mergers. We have the experience in merging companies, including Verizon and Vodafone, Spectrum and Bright House, as well as Tech Data with Avnet. Antotech Consulting is prepared in all technical, legal, and financial aspects of the process. Most importantly, we have the resources, licenses, and strategies to implement and complete a merger. We employ individuals who leverage in the assessment and consolidation of IT services.
1. Antotech Consulting Company employs individuals that will be leveraged in the assessment and merger of IT services:
1. We centered on three resources with F5 certifications for load balancing, traffic management, and app security which include; (F5-CA certifications) F5 Certified BIG-IP Administrator (F5 -CA), F5 Certified Technology Specialist (F5 -CTS), and F5 Certified Solutions expert (F5-CSE)
2. Main focus include resources which provide Palo Alto certifications for firewall and cloud (GlobalProtect and PCNSA certifications) PCCSA (Palo Alto Network Certified Cybersecurity Associate), PCNSA (Paolo Alto Network Security Administrator), and PCNSE (Paolo Alto Certified Network Security Engineer)
3. We also ensure resources and attained experience engineer with Cisco network certifications such as CCENT (Cisco Certified Entry Network Technician) CCNP (Cisco Certified Network Professional) R/S, CCNA (Cisco Certified Network Associate), and CCIE (Cisco Certified Network Expert).
4. Our consulting firm also employs resources with Cisco WLAN certification experts such as CCNP-W
5. Two engineers with Cisco CCIE R/S certification
6. Four experienced contractors with Cisco data center certifications (CCNP)
7. Five resources and experienced professionals in Cisco collaboration certifications (CCNP-collaboration).
8. Two engineers with Citrix certifications (CCE-N)
9. Multiple contractors and one experience employee with WAN certifications.
10. And experience employees with Microsoft certifications (MCSE)
2. Antotech Consulting is highly experienced in merging of company network resources
1. Antotech Consulting has conducted seven IT mergers of Fortune 500 companies over the past five years
2. Antotech Consulting has done network analysis of fifteen companies over the past ten years.
3. Antotech Consulting has provided an analysis of firewall
4. Antotech Consulting is highly experienced in using Cisco Stealth watch Enterprise, allowing administrative staff to facilitate a smooth and seamless merger process through the usage of Google Cloud and Microsoft Azure.
5. Antotech Consulting contacts for references are available upon request are; Office 813-808-7178 and email antotech.Consuslting@antotech.com
Graphically depict and effectively promote your company’s structured development and services using Visio or its alternative open-source software
Below is a visual breakdown of the company’s structure development and services to effectively illustrate Antotech Consulting’s capabilities on completed the network implementation for the merge.
1. Image one has a business strategy.
2. The second image has the network Implementation strategy
Explain what the client can expect from your services, including past efforts of this size
Antotech Consulting clients may expect efficiency, quality, and urgency with the implementation process. Productivity is imperative since we ensure that installation of systems and services and completed from day one. Our resources and partnership offer a quality of applications, equipment, and technical expertise on the desired services. Strayer Consulting has professional engineers who are trained and experienced to handle a vastly complex network and provide ways to recycle and satisfy and integrate multiple networks into one robust system. Antotech Consulting would help plan the process from both the business and technical perspectives. After assessing an organizational approach to how to handle the merge starting from executives board, stakeholders’ insights, and financial institution and benefits. Then the company would process on implementing the technical aspect of the network migration and combining both domains into one where all security, users, equipment, network infrastructure, and all systems that impact the new company’s acquisition.
· Antotech Consulting is positioned to provide outstanding products and services for merger analysis through the following:
1) Thoroughly analyze existing network topologies and network functions from the core, distribution and access layers.
2) Carefully assess the process of merging network organizations.
3) Manage the entire turnkey merger process, from stakeholder meetings to knowledge transfer.
References
Albrecht, K., & Albrecht, K. (2019). The only thing that matters: Bringing the power of the customer into the center of your business. New York: HarperBusiness.
Mancuso, J. (1983). How to prepare and present a business plan. Englewood Cliffs, NJ: Prentice-Hall.
Oyewole, B. (2018). Business Plan Guideline for Small and Medium Scale Enterprises.