Configuration management
Part 1
Before designing a network, it is necessary to understand the components of the network and how they relate to each other.
Create an appendix providing a 50-100-word summary for each of the following topics to be used in your Business Continuity Plan.
Defense in depth
Air gap
DMZs
Proxy servers
Composition and security
Cascading/Segmentation
Emergent properties
Dependencies
TCB subsets
Transport layer security
BGP
OSPF
MPLS
Configuration management
DHCP
VPN
VLAN
SIEM
Part 2
Cybersecurity professionals must be able to reduce the vulnerability of an organization’s network by designing a secure network.
Create a secure network architecture design for a fictional company:
Design a corporate infrastructure diagram in Visio or another network mapping tool (this deliverable must be readable by your professor; Cisco Packet Tracer is not acceptable). Your network diagram must include a minimum of 2 routers, 2 firewalls, 4 switches, 1 IDS, 1 IPS, a proxy server, an email server, a DHCP server, a DMZ, and finally 5 separate departments utilizing network segmentation with a minimum of 25 clients per department. You must also include an air gapped system for your R&D department to utilize.
Using your network diagram as a guide, create a research department consisting of 5 clients (Windows 7, Windows Server, Ubuntu Linux, and 2 other unique systems of your choice).
Develop the intellectual tools to explore and understand advance network concepts and protocols. Select 2-3 intellectual tools (e.g., Suricata, pfSense) and manipulate them to work together to create a framework and include them in your secure network design.
Explain all components and how they interact with each other within the secure network design you created.
Describe and discuss the security issues and implications of advanced and novel networks and protocols. Ensure your discussion applies to both current and new network technologies.