Question:
Discuss About The Series Stackable Manage Switched Data Sheet?
Main scope of this project is to create the secure network design for B2B solutions. The B2B solutions is medium sized organization. It interests to create the secure network design. The B2B solutions has the six building such as finance office, Information technology office, research office, sales office, transport office and head office. Each office contains the workstations. The Finance offices has the 50 work stations, sales office has the 25 work stations, transport office has the 50 workstations, head office has 50 work stations and information technology office has the 250 workstations. These buildings are connected with the routers and each building has the single subnet. The proposed network design for B2B solutions is provides the productivity and security of the network. It uses the cisco products to reduce the maintenance and operational costs. The Network security threats will be analysed. The network design hardware and software components are will be addressed. The proposed network design will be ensuring the confidentiality, integrity, availability and Authorization of the network.
The Network security threats are classified into two types such as passive threats and active threats. The Network security threats diagram is shown in below [1].
The passive threats re referred to as eavesdropping dropping and it involves the attempted by an attacker to obtain the information relating to communication by using the traffic analysis and release of message content method. The Release of message contents are used to transferred the file may contain the confidential and sensitive information. It prevents the opponent from data or message transmission. The traffic analysis is a kind of attack done on encrypted messages. The active threats are involving the data stream modification and false stream creation by using the masquerade, replay, message modification and denial of service techniques. The Denial of services attack takes place when the network availability to a resource is blocked by an attacker. It disruption of an entire network by disabling the network [2]. The proposed network design provides the secure network by using the firewalls. The firewalls provide the security and productivity of the network. The Firewalls is used to blocking the unauthorised access to prevent the sensitive information’s.
The Network design software requirements are shown in below.
Operating system |
windows |
Memory |
2 GB RAM |
Hard Drive |
2.2 GB |
The Hardware requirements are shown in below [3].
Cisco Routers |
Cisco 800 Series Routers |
Cisco Switches |
Cisco Small Business 500 Series Switch |
Cisco Access Point |
Cisco 300 Series Access Points |
Cisco Firewall |
Cisco ASA 5506-X with Fire POWER Services |
Cisco Core switch |
Cisco Nexus 7000 Series Switches |
Specification of network devices is shown in below.
Cisco Routers – cisco 800 Series routers
The B2B solution network infrastructure is shown in below.
The B2B solutions network infrastructure consists of six building such as Finance office, sales office, head office, information office, research office and transport office. The Six building totally contains the 500 work stations. These are connected with the routers. The router connecting the core switch to connect the six building through cisco switches. The cisco products are providing the secure and scalability of the network for B2B solutions. The Proposed network design is used to provide the secure communication between the employees and organization team. It maintains network availability and usability [8]. The Proposed network design has the flexibility and availability of the network to delivers the secure network for entire organizations. The secure network design is decrease the operational and maintenance costs. Because the proposed network design does not require the maintenance costs to maintain the network. The cisco products are reduced the operational costs. The six building are securely communicated with each other’s [9]
The network design ensures the confidentiality, integrity, availability and authorization by using the cryptographic algorithms. the cryptography plays a major role in network security. The network security goals are based on confidentiality, integrity, availability and authorization. these are designed to act as guide for information security policies [10].
The confidentiality is protecting the information from the disclosure to unauthorised users. The confidentially protecting the information by encrypting the information. the encryption ensures the only the right peoples can be read the information. It provides the security for the sensitive information [11].
The integrity is used to protecting the information from being modified by unauthorized users. the cryptography plays a major role in ensuring the data integrity. The to protect the integrity by using the various methods includes hashing the data and comparing the hash messages.
The availability is used to protect and ensures the information that authorised users are able to access the information when needed. It does not allow the unauthorised users accessing the information. It denying the access to information has become a very common attack. To ensure the data availability by backup the information’s. It provides the security and productivity. It reduces the down time [12].
Authorization
The authorization is used to allow an authorised users only accessing the information. The cryptography algorithms also provide the authorization of the users. It first authenticates the users, after provides the accessing permission. The Cryptography authorization is used to provide the security from attackers.
Conclusion
B2B solutions current network does not have the security. The B2B organization team interested to create the secure network design. The network design has the six building such as finance office, transport office, research office, sales office, head office and information technology office. Overall B2B network infrastructure has the 500 workstations. These building are connected with the routers. The router connecting each building by using the core switch. The six buildings are communicated with each other. The proposed network design provides the secure network design by using firewalls. The firewall is used to provides the productivity and security for the network. It blocking the unauthorised users. The network security threats are identified and discussed. The hardware and software requirements are identified and discussed in detail. The Justification of confidentiality, availability, integrity and authorization is done by using the cryptographic algorithms.
References
[1]J. Kurose and K. Ross, Computer networking. .
[2]NETworking. [Hong Kong]: Regional NET Coordinating Team, NET Section, CDI, EDB, 2013.
[3]J. Wang, Broadband wireless communications. [Place of publication not identified]: Springer-Verlag New York, 2013.
[4]P. Services, C. Switches and D. Sheets, “Cisco 500 Series Stackable Managed Switches Data Sheet”, Cisco, 2017. [Online]. Available: https://www.cisco.com/c/en/us/products/collateral/switches/small-business-500-series-stackable-managed-switches/c78-695646_data_sheet.html. [Accessed: 27- Sep- 2017].
[5]P. Services, B. Routers, C. Routers and D. Sheets, “Cisco 2900 Series Integrated Services Routers Data Sheet”, Cisco, 2017. [Online]. Available: https://www.cisco.com/c/en/us/products/collateral/routers/2900-series-integrated-services-routers-isr/data_sheet_c78_553896.html. [Accessed: 27- Sep- 2017].
[6]P. Services, C. Access, C. Series and D. Sheets, “Cisco Edge 300 Series Data Sheet”, Cisco, 2017. [Online]. Available: https://www.cisco.com/c/en/us/products/collateral/switches/edge-300-series/data_sheet_c78-694183.html. [Accessed: 27- Sep- 2017].
[7]P. Services, C. Services and D. Sheets, “Cisco ASA with FirePOWER Services Data Sheet”, Cisco, 2017. [Online]. Available: https://www.cisco.com/c/en/us/products/collateral/security/asa-5500-series-next-generation-firewalls/datasheet-c78-733916.html. [Accessed: 27- Sep- 2017].
[8]P. Support, C. Switches and I. Guides, “Cisco Nexus 7000 Series Site Preparation Guide – Technical Specifications [Cisco Nexus 7000 Series Switches]”, Cisco, 2017. [Online]. Available: https://www.cisco.com/c/en/us/td/docs/switches/datacenter/hw/nexus7000/site_prep/guide/nexus7k_siteprep_book/siteprep_tech_specs.html. [Accessed: 27- Sep- 2017].
[9]”Network Security – What is Network Security Threats?”, Ecomputernotes.com, 2017. [Online]. Available: https://ecomputernotes.com/computernetworkingnotes/security/network-security-threats. [Accessed: 27- Sep- 2017].
[10]”Firewalls and Internet Security – The Internet Protocol Journal – Volume 2, No. 2″, Cisco, 2017. [Online]. Available: https://www.cisco.com/c/en/us/about/press/internet-protocol-journal/back-issues/table-contents-1/ipj-archive/article09186a00800c85ae.html. [Accessed: 27- Sep- 2017].
[11]”Goals of Security Confidentiality, Integrity, and Availability”, ExamCollection, 2017. [Online]. Available: https://www.examcollection.com/certification-training/security-plus-goals-of-security-confidentiality-integrity-availability.html. [Accessed: 27- Sep- 2017].
[12]T. Chia, “Confidentiality, Integrity, Availability: The three components of the CIA Triad « Stack Exchange Security Blog”, Security.blogoverflow.com, 2017. [Online]. Available: https://security.blogoverflow.com/2012/08/confidentiality-integrity-availability-the-three-components-of-the-cia-triad/. [Accessed: 27- Sep- 2017].
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download