COM4010 Introduction to Computer Systems and Security Assignment Sample

Secure network design using Cisco Packet Tracer: Star topology, router passwords, ACLs, VLANs, OSI/TCP/IP security layers & threat mitigation strategies.

  •  
  •  
  •  
  • Type Assignment
  • Downloads561
  • Pages22
  • Words5414

1. Introduction - COM4010 Introduction to Computer Systems and Security

Future Project (FP) is a mid-size company that deals with customers’ sensitive information. For students seeking help writing assignments on network security implementation, this FP case study demonstrates practical solutions. When handling such an organization, there is a need to ensure that the network has been fortified and protected against any form of cyber attack. Lately, FP suffered a small-scale data leak implying that there are weaknesses in the organization’s network that needs to be addressed. This resulted in unauthorized access into the customers’ information and potential threat to the operations of FP.

Thus, FP must upgrade its network security standards to avoid further risks of cyber threats in the future. Two important areas within networks that are critical to managing the protection of data as well as controlling access and enhance performance is Network Security. The functionalities such as router security measures, the firewalls (ACLs), VLANs, and security policies will improve the general network integrity and confidentiality.

This paper covers the description of the network security needed in FP as follows:

How to prevent single points of failure in a network while aiming at attaining a good design for network topology that is both secure and scalable.

One needs to admit that ensuring router security has its measures like passwords and encryption.

Implementing IP Access List for permission or banning of certain IP address.

As a segmentation method in a network, VLANs are effective in the reduction of security threats.

A comparison of the OSI and the TCP/IP models in the use of securing the network communication.

The above listed best practices in network security will ensure FP acquires effective and efficient network protection for their operations and customers information from acts of cybercrime.

2. Overview of Network Topology and Security Measures

2.1 Network Topology Design

Network topology refers to the arrangement and organization of a network that is used for describing the flow of data and connectivity of the various devices in the system (Lei, 2023). In choosing the type of topology for the new LAN configuration that FP is to establish, Star Topology has been adopted since it is scalable, reliable, secure, and easy to diagnose when a certain segment is faulty.

Justification for Star Topology

Scalability

New devices can be added to this system without a conflict of interest with other devices connected to the same system.

Also, it guarantees future growth as FP expands its business to other areas.

Reliability

In the case of failure in one device, the others become non-affected.

One of the key advantages is that it reduces the business downtime to a great extent and maintains its smooth operations.

Security

It also makes the process of firewall implementation and handling of access rights much easier with central control.

Decreases the probabilities of improper and intruder’s access to information and the likelihood of hacker attacks.

Performance Optimization

It helps in saving much time and traffic since there is an efficient routing of network.

It greatly reduces cases of collisions of packets in the network hence improving its efficiency in relaying data and information.

This makes Star Topology to be a perfect solution to FP as it offers it a secure (Zubair and Taqi, 2024), reliable and high performance network that can greatly support it in its operations and protect its data.

2.2 Security Threats in Future Project (FP)

Network threats are likely to affect FP’s secret information, damage its IT and remain an ever-present threat to the firm’s operations (Xi, 2020). However, the following are three tremendous security threats that FP encounters, followed by their suggested measures:

Unauthorized Access

Threat:

This is because weak authentications could permit hacker to get into the network.

Customer information can be accessed and viewed by wrong hands this is because it is not safe from invasion.

Solution:

Do not allow weak passwords on any accounts and use stringent measures such as use of MFA.

Implement the access control lists (ACLS) so that unauthorised users should not access any resource or information in the network.

Implement the concept of RBAC to constrain the rights of the users so that they cannot perform certain actions or access specific locations within the network.

Malware & Phishing Attacks

Threat:

Cyber criminals use Trojans, viruses, worms and send email automobiles with the aim of cyber phishing.

Also, employees may download files from the internet and access them on the network hence posing a threat to the company’s security.

Solution:

Use firewalls and IDS to avoid any threat that may be produced by hackers.

To protect emails from being attacked by phishing, the company should employ email security filters for this purpose.

Educate employees on measures to take in cases where they receive any phishing and Malware attacks.

Denial-of-Service (DoS) Attacks

Threat:

It involves overwhelming the network with too much traffic and limiting the usage of services offered in the process.

Due to possible changes in business flow, as well as the employees’ interactions with the customers, these changes can happen.

Solution:

To achieve this objective of protecting your system against such traffic, you have to configure your firewall and ACL.

The following should be done to avoid this situation: Employ traffic analysis tools that critically assess traffic in an aim to note several elements of DoS attempts.

There are two options associated with load balancing to balance the network traffic across the different available subsites.

If FP deploys ACLs, VLAN segregation, and intelligent security polices, it can minimize the cases of hacking and other security threats within its network.

3. Implementation of Network Security in Cisco Packet Tracer

3.1 Network Device Configuration

To protect a network, one has to start with a proper arrangement of the system hardware. The Future Project (FP) network topology comprises of two routers Cisco 2901, two switches Cisco 2960 and two PCs where testing and implementation were performed (Pavlidis, 2020). These are set in Cisco Packet Tracer to increase performance, security, network and accessibility.

Task 1: Setting Up a Basic Network Topology

Setting the Network Topology

Figure 1: Setting the Network Topology

3.1.1 Device Selection and Justification

  1. Routers (Cisco 2901)

Facilitates packet forwarding between networks.

Has Access Control Lists (ACLs) for limiting the access to the libraries.

Having introduced the role of firewalls, it means that networks security is achieved through this program.

Task 3: Configuring Routers

Router 1 Configuration

Figure 2: Router 1 Configuration

Router 2 Configuration

Figure 3 : Router 2 Configuration

  1. Switches (Cisco 2960)

Enables LAN communication between devices.

Supports VLAN segmentation to enhance security.

Manages network traffic efficiently to reduce congestion.

  1. PCs (for testing and implementation)

Task 2: Assigning IP Addresses and Subnet Masks

Pc1 IP address configuration

Figure 4: Pc1 IP address configuration

Pc2 IP address configuration

Figure 5: Pc2 IP address configuration

Actively use end-users’ devices for the connection tests.

Ping and ACL are two types of security validations which should be run.

This remains mainly because of the network layout that allows proper communication of the devices while at the same time maintaining high security against cyber criminals.

3.2 Securing Routers with Passwords

Routers therefore play a central role in matters to do with security of a network (Lei, 2020). It also becomes possible for an attacker to access configuration of the router and amend or change routing tables and thus interconnectivity mechanism would be paralyzed.

Task 4: Enabling Routing Between Networks

Configuring Static Routing on Router1

Figure 6 : Configuring Static Routing on Router1

Configuring Static Routing on Router2

Figure 7 : Configuring Static Routing on Router2

Testing Network Connectivity

Figure 8 : Testing Network Connectivity

3.2.1 Why Password Security is Important?

Prevents Unauthorized Access:

Enhances the security by preventing the routers from being forced by unauthorized personnel.

Protects Routing Information:

Ensures sensitive configurations remain unaltered.

Encrypts Passwords:

With no encryption used, passwords are held as plain text passwords hence can easily be easily accessed and misused.

3.2.2 Router Security Best Practices

  1. Enable Password → Used especially for the EXEC mode to achieve an improved network security.
  2. Console and VTY Line Passwords → Restrict direct physical and remote access.
  3. Service Password Encryption → This is aimed at preventing incidence of passwords been stored in plain text format in a database.

This ensures that there is secure password on routers in the FP thus minimizing the chances of intruder to access and alter the network configurations.

3.3 Implementing Access Control Lists (ACLs)

Specifically, Access Control Lists (ACLs) are actually firewalls that dictate which devices and users may or may not enter the network (Frank, 2020). Their major importance is to control traffic, improve security status and prevent access to some valuable information.

Configuring Access Control List (ACL) for Router 1

Figure: Configuring Access Control List (ACL) for Router 1

Configuring Access Control List (ACL) for Router 2

Configuring Access Control List (ACL) for Router 2

3.3.1 Why Are ACLs Necessary?

Block Unauthorized Devices:

Secures computer systems against hacker and unauthorized worker invasion to sensitive computer systems.

Reduce Malware & Cyber Threats:

It prevents the diseases from infecting other equipments within the network since infected equipments are blocked from the network.

Control Network Traffic Flow:

Creates a mechanism that only allows the legitimate users or the specified system services access to the resources.

3.3.2 Impact of ACLs

  1. The unauthorized devices are not allowed to talk with each other hence it forbids unauthorized access.
  2.  The result of the conducted work is the preservation of customer information from toxic employees.
  3. This prevents firewall- like security from being bypassed in the network.

Thus, ACLs have made it possible for FP to achieve two significant goals ofmaking access to certain systems rare while permitting only allowed network traffic only.

3.4 VLAN and IP Addressing

VLANs continue to be physical interfaces of the ongoing building that segregates devices into several network sections making them rather secure and less crowded.

3.4.1 Why VLANs?

Enhances Security

Restricts access between the different departments as to avoid access to information that they are not supposed to access.

Reduces Network Congestion

Reduces the number of broadcasts hence optimizes the traffic in the network.

Improves Management

The security policy can be implemented to the network by controlling the VLANs assigned to different administrators.

3.4.2 VLAN Segmentation in FP Network

Department A (192.168.1.0/24) → Internal Staff Only

Department B (192.168.2.0/24) → Guest Network

The VLAN offers protection to ensure that FP data is not intermingled with other networks lower on the security scale in order to avoid leaking of confidential information.

3.5 Testing and Troubleshooting

Once routers, ACLs, VLANs were configured , final test was done and the network was tested and all irregularities were corrected.

3.5.1 Testing Methods

  1. Ping Tests

Mainly used in checking the connectivity on the network between the various devices.

Determines whether ACLs are denying or permitting the traffic that is supposed to be allowed.

  1. Show IP Route

Displays active routes within the network.

This defines the proper pathways that should be followed by data.

  1. Packet Tracer Simulation

Tests firewall and ACL configurations.

It finds the weak points when the testing is done before the use of the product in real life situations.

3.5.2 Troubleshooting Approach

Checking ACL Rules

This will make sure only the particular devices are allowed to send and receive the signal.

Verifying VLAN Settings

Ensures that traffic is properly separated on the basis of its nature and the department it belongs to.

In this way, FP managed to strengthen its network through extensive testing, provided the highest level of security to its organization, and guarantee IT reliability in case of adverse scenarios.

MAC Address Filtering and Configuration Verification

Enabling MAC Address Filtering for Switch 1

Figure: Enabling MAC Address Filtering for Switch 1

Enabling MAC Address Filtering for Switch 2

Figure: Enabling MAC Address Filtering for Switch 2

MAC Address Filtering allows a limited number of only authorized devices to access the network, with the result of unauthorized access disallowed. It provides increased security and control on the devices.

Verifying setup, configuration command operations like show running-config and show ip route assure correct routing and security settings are in effect. Ping checks affirm successful exchange of information.

4. Application of OSI and TCP/IP Models in Network Security

4.1 OSI Model in Future Project Network

OSI stands for Open Systems Interconnection and it is a framework with seven layers designed to describe how data is transmitted between networks (Považan, n.d.) . It offers a wide scale of recommendations to implement security at different stages of networking hierarchy (Jimenez et al., 2021). In OSI model, each layer is described best security measures that should be implemented for effective protection of the network system, thus beneficial in Future Project (FP).

4.1.1 OSI Model and Security Implementation

Layer

Security Measure

Application (Layer 7)

Use firewalls & encryption (TLS/SSL) to protect applications from cyber threats.

Presentation (Layer 6)

Implement data encryption to ensure that transmitted information remains confidential.

Session (Layer 5)

Use session timeouts to prevent unauthorized access after prolonged inactivity.

Transport (Layer 4)

Secure TCP/UDP traffic with Transport Layer Security (TLS) and port filtering.

Network (Layer 3)

Implement firewalls & ACLs to restrict traffic from unauthorized sources.

Data Link (Layer 2)

Use MAC filtering & VLANs to segment traffic and prevent unauthorized access.

Physical (Layer 1)

Secure physical access to network devices to prevent unauthorized tampering.

4.1.2 OSI Model in FP Network Security Implementation

Application Layer Security (Layer 7)

The Application Layer is always involved with the users and applications such as the browser application and mail application and cloud application. (Lei et al., 2020)In the case of security measures in FP’s networks, firewalls are adopted while TLS/SSL for proper encryption.

 Presentation Layer Security (Layer 6)

This layer will simply manage the formatting of the data that is to be transmitted. This layer entails security of the pertinent data from the customer by encryption, to prevent it from being intercepted by unauthorized individuals (Santos et al., 2023). AES and SSL/TLS are used in FP for security purposes to ensure confidentiality of information.

Session Layer Security (Layer 5)

This layer focuses on controlling the session between devices connected in a network. session control has also been incorporated in the means thereof to prevent remote login and authentication processes if a session is idle.

Transport Layer Security (Layer 4)

The Transport Layer is concerned with the logical point-to-point data transfer and the maintaining the integrity of data during transfer (Gentile et al., 2024). FP has employed the Transport Layer Security (TLS) and Secure Socket Layer (SSL) as its protocols for the data transfer (Abood et al., 2024). Also, a number of technology barriers are used to block the access of TCP/UDP ports to avoid the direct running of unauthorized network services.

Network Layer Security (Layer 3)

The functions of the Network Layer are routing and forwarding of packets. FP also employs firewalls and Attempt Control List to control the flow of traffic inbound and outbound (Garvik, Lindås and Bø Svendsen, 2023). The ACL restrictions prevent unauthorized IP addresses from accessing the network leaving the gadget’s connection accessible just to authorized devices.

 Data Link Layer Security (Layer 2)

The data link layer is responsible for transmitting the data and also check whether the data has reached the intended device without errors (Uddin and Kumar, 2023). MAC address filtering and VLAN segmentation are used by FP to protect this layer from non-authorized access to the data traffic.

Physical Layer Security (Layer 1)

At the fanny of the model is the Physical layer which focuses on ironware credentials in an entanglement Ramprasath and Seethalakshmi, 2021 . FP had limited real real encounter finished constrictive measures such as; locked estimator servers, biometric credentials clearance,' CCTV among others to declaration unauthorized approach to live structures.

When each layer in the OSI model is secured,' it is voltage to protect an organization’s networks and its data as practiced by FP.

4.2 TCP/IP Model and Routing

The Transmission Control Protocol/Internet Protocol TCP/IP model is the basis of cyberspace communication, ensuring fix data transmittance over networks. It is a four layer model,' each with well defined credentials requirements (Krishna et al.,' 2023). In FP’s network, TCP/IP credentials measures was implemented to preserve unauthorized access, protect data,' and check unquestionable connectivity.

4.2.1 TCP/IP Model and Security Implementation

Application Layer Security

The Application Layer in TCP/IP is in some way equal to OSI’s top three layers, the Application layer, the Presentation layer and the Session layer. This site utilizes commercialized measures such as Secure Sockets Layer SSL and Transport Layer Security TLS to preserve the unauthorized approach to customers’ information. Firewalls was used in estimator systems to declaration or eliminated approach to undesired transaction in web applications.

Transport Layer Security

The fourthly layer of TCP/IP model is the Transport Layer, which provides end to end communications and error control. To fix this layer as well as FP uses TLS, SSL, and TCP/UDP port filtering to deny the effectiveness threats approach to the layer. Intrusion Detection Systems IDS that works at the bear level and could observation some irregularities in TCP traffic.

Internet Layer Security

Internet Layer is the layer that handles an organization’s destination and its routing.

This layer is protected under firewalls, intrusion prevention systems (IPS) as well as IP address control list (ACL) to filter out illegitimate network addresses.

NAT is employed so that an attacker cannot discover internal IPs since they cannot be accessed from the internet side.

Network Access Layer Security

The Presentation, Communication, and Management Layer is an optional layer; and the Network Access Layer is equal to OSI’s Data Link and Physical Layers and is accountable for secure network connections.

FP had Standard VPN as a mode of access for a secure remote connection.

The MAC filtering and VLAN Form of work prevent unauthorized devices from connecting to the network.

4.2.2 Routing Security in FP Network

As a security measure in FP’s network to enhance flow of data; Routing Security is used. These include:

Access Control Lists (ACLs)

Performs the tasks of filtering the traffic that enters and exits the network.

Restricts employee access to only internal-local IPs and any restricted ones defined by the business.

Firewall Implementation

Secures the external interfaces by filtering on the boundary routers, and thus prevent attacks from outside this layer.

Intrusion Prevention Systems (IPS)

He further noted that the proposed system is capable of detecting and preventing any activity before it infiltrates the network.

Network Address Translation (NAT)

Hides internal IP addresses so that the external invasive party will not identify the network devices.

VPN Implementation

Helps keep the remote employees as well as other entities connected in a way that is protected from intrusion.

4.2.3 Importance of Secure Routing

Prevents Man-in-the-Middle (MITM) Attacks

This makes it impossible for the attackers to breech into the communication line and get hold of sensitive information due to encryption.

Ensures Data Integrity and Confidentiality

Both OSPF and EIGRP have been encoded with certain measures to ensure security during transmission of data.

Reduces Cyber Threats

In particular, the measures that have been taken by FP in controlling cyber threats include firewalls, ACLs, VPNs so as to minimize the disruptions of the business.

4.3 Comparison of OSI and TCP/IP Models in Network Security

Feature

OSI Model

TCP/IP Model

Number of Layers

7 Layers

4 Layers

Security Implementation

Security is applied at each layer separately

Security is integrated across fewer layers

Application Security

Uses firewalls, encryption, and session management

Implements TLS, SSL, and VPN security

Transport Layer Security

Encrypts TCP/UDP traffic

Uses TCP/UDP security to prevent unauthorized access

Internet Layer Security

Uses firewalls and ACLs for IP security

Uses firewalls, IPS, and NAT to protect routing

Network Access Layer Security

Uses VLANs and MAC filtering

Implements VPNs and secure wireless communication

The OSI and TCP/IP models will act as useful tools for applying reliable security measures in the network that is used in FP (Anwar, Abdullah and Pastore, 2021). Implementing encryptions, firewalls, access control lists (ACLs), virtual private networks (VPNs), and intrusion detection systems (IDS) in both models contribute to developing the strong safety and productivity of networks for FP.

COM4010 Introduction to Computer Systems and Security Assignment Sample
Liked This Sample? Hire Me Now
Maria Evans
Maria Evans 3.5 reviews 6 Years | PhD

With each layer of communication being secured, FP ensures customers’ data and information security from cyber criminals; and provides a secure, flexible, efficient, customer-oriented networking system.

5. Security Policies and Risk Mitigation Strategies

5.1 Acceptable Use Policy (AUP)

Describes the appropriate employee conduct and behavior in the context of the Internet and BYOD policies.

This is due to the restriction of the web accesses that are deemed to be suspicious with its aim of blocking phishing attacks.

5.2 Access Control Policy

Limits administrative privileges to authorized personnel.

Uses RBAC to control flows for access restriction.

5.3 Incident Response Plan

Step 1: Detect security breach.

Step 2: Limit and quarantine the spread of the virus to the affected systems.

Step three thus involves wiping out the threat and patching up the holes:

The fourth step is to restore the lost data and entice regular operations back into life.

Post-Incident Analysis An effective response to a security threat must follow an analytical procedure designed to require post-incident analysis to prevent future security breach.

6. Conclusion

This paper has highlighted network security measures of Future Project (FP) including routers, access control list, virtual local area networks and OSI/TCP. This way of working guarantees that FP’s network is protected against all cyber threats and operates at a high level.

Key Takeaways:

That is why router password protection is used to ensure that other people do not connect to the system.

Access Control Lists (ACLs) help a lot in the process of denying access to the network traffic which is not required.

It also makes the organisation of the networks much easier because VLAN segmentation enhances the efficiency of networks.

Since OSI and TCP/IP models are important in the implementation of a network, the two are essentials in the defense of a network setting.

Future Recommendations:

Implement Intrusion Detection Systems (IDS).

Provide virtual private network facility for computer networking over the internet.

Conduct the security audit exercise frequently so that weaknesses in the security system are easily identified.

Such measures can give very good results as FP will be able to uphold data security, networks and business continuity in the future.

Reference List

Journals

  • Abood, M.S., Wang, H., Virdee, B.S., He, D., Fathy, M., Yusuf, A.A., Jamal, O., Elwi, T.A., Alibakhshikenari, M., Kouhalvandi, L. and Ahmad, A., 2024. Improved 5G network slicing for enhanced QoS against attack in SDN environment using deep learning. IET Communications, 18(13), pp.759-777.
  • Anwar, R.W., Abdullah, T. and Pastore, F., 2021. Firewall best practices for securing smart healthcare environment: A review. Applied Sciences, 11(19), p.9183.
  • Frank, M., 2020. Securing Smart Homes with OpenFlow: Feasibility, Implementation, and Performance (Master's thesis, Science).
  • Garvik, M.L., Lindås, S. and Bø Svendsen, F., 2023. Authentication with the use of MAC and it’s security challenges (Bachelor's thesis, NTNU).
  • Gentile, A.F., Macrì, D., Carnì, D.L., Greco, E. and Lamonaca, F., 2024. A Performance Analysis of Security Protocols for Distributed Measurement Systems Based on Internet of Things with Constrained Hardware and Open Source Infrastructures. Sensors, 24(9), p.2781.
  • Jimenez, M.B., Fernandez, D., Rivadeneira, J.E., Bellido, L. and Cardenas, A., 2021. A survey of the main security issues and solutions for the SDN architecture. IEEE Access, 9, pp.122016-122038.
  • Kankaanpää, J., 2024. On-premises Data Center Load Balancer Service Delivery Model Based on Infrastructure as.
  • Krishnan, P., Jain, K., Aldweesh, A., Prabu, P. and Buyya, R., 2023. OpenStackDP: a scalable network security framework for SDN-based OpenStack cloud infrastructure. Journal of Cloud Computing, 12(1), p.26.
  • Lei, Y., 2020. Towards Better Kernel and Network Monitoring of Software Actions (Doctoral dissertation, Worcester Polytechnic Institute,).
  • Lei, Y., 2023. Building Infrastructure Support for Organizational Security: An Approach to Network (Doctoral dissertation, North Carolina State University).
  • Lei, Y., Lanson, J.P., Kaldawy, R.M., Estrada, J. and Shue, C.A., 2020, October. Can Host-Based SDNs Rival the Traffic Engineering Abilities of Switch-Based SDNs?. In 2020 11th International Conference on Network of the Future (NoF) (pp. 91-99). IEEE.
  • Pavlidis, A., 2020. Automated monitoring and security services in federated software-defined network infrastructures.
  • Považan, M., BRND UNIVERSITY DF TECHNOLOGY.
  • Ramprasath, J. and Seethalakshmi, V., 2021. Mitigation of malicious flooding in software defined networks using dynamic access control list. Wireless Personal Communications, 121(1), pp.107-125.
  • Santos, L., Gonçalves, R., Rabadao, C. and Martins, J., 2023. A flow-based intrusion detection framework for internet of things networks. Cluster Computing, pp.1-21.
  • Uddin, R. and Kumar, S.A., 2023. SDN-based federated learning approach for satellite-IoT framework to enhance data security and privacy in space communication. IEEE Journal of Radio Frequency Identification, 7, pp.424-440.
  • Xi, Y., 2020. Implementing application centric infrastructure to build a scalable secure data center.
  • Zubair, A. and Taqi, N.B., 2024. Design, implement, and evaluate the performance of an IPsec inspired security framework for HIP-VPLS environments.

Recently Downloaded Samples by Customers

Personnel Resourcing and Development Assignment Sample

Introduction - Personnel Resourcing and Development Let Rapid Assignment Help simplify your academic challenges with...View and Download

Impact of COVID-19 on IT Employees & Remote Work Assignment sample

Introduction: Global Pandemic And Workplace Management Get free samples written by our Top-Notch subject experts for taking...View and Download

HNU300 Management and Leadership in Care Delivery Assignment Sample

Introduction: Leadership and Management in Practice Leadership and management refers to the skills and processes that are...View and Download

Credit Card Fraud Detection In Shopping Malls Assignment Sample

Chapter 1: Introduction Get free samples written by our Top-Notch subject experts for taking online Assignment Helper...View and Download

MGBBT2PPM Principles of Operations Management Assignment Sample

Introduction Struggling with commercial law tasks? Get Assignment Help Online for expert guidance, accurate legal analysis, and...View and Download

Research For Strategic Development Assignment Sample

Introduction to Research For Strategic Development Assignment Task 2 – Carry Out the Research Using Different...View and Download

Get 55% Off on Black Friday - Limited Time Academic Offer