Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

ITNAA Q 3 . 3 Project 1 MediCare Solutions SecurityDuring the implementation of the internal network infrastructure at MediCare Solutions, a security breach occurred due

ITNAA Q 3.3 Project 1 MediCare Solutions SecurityDuring the implementation of the internal network infrastructure at MediCare Solutions, a security breach occurred due to unauthorized access gained through a compromised user account in the Client Services (CS) department. The attacker, using sophisticated social engineering tactics, acquired login credentials of an employee with administrative privileges, breaching the CS network segment.The attacker moved laterally across the LAN, exploiting vulnerabilities in network switches and weak access controls between departmental segments, compromising sensitive data in the Medical Operations & Radiology Services (MORS) and Patient Records Management (PRM) departments.The network security team detected the intrusion using monitoring tools, initiating incident response protocols. They isolated compromised segments, conducted forensic analysis, and enhanced access controls to prevent future breaches.You are tasked with Implementing the following on the network you designed in Question 1 above3.1 Port Address Translation (PAT) and Access Control Lists (ACLs):Implement PAT to translate private IP addresses to a single public IP for outbound internet access and configure ACLs to control inbound/outbound traffic based on security policies. (10 Marks)3.2 Switchport Security on Server Switch:Configure switchport security to limit the number of MAC addresses allowed per switchport, preventing unauthorized devices from connecting to the network. (10 Marks)3.3 DHCP Snooping:Enable DHCP snooping to mitigate rogue DHCP server attacks by monitoring and filtering DHCP messages, allowing only authorized DHCP servers to allocate IP addresses. (10 Marks)3.4 Dynamic ARP Inspection:Implement Dynamic ARP Inspection to prevent ARP spoofing attacks by validating ARP packets and discarding malicious or unauthorized ARP packets. (10 Marks)

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Oracle Database 11g SQL

Authors: Jason Price

1st Edition

0071498508, 978-0071498500

More Books

Students also viewed these Databases questions

Question

2. How should this be dealt with by the organisation?

Answered: 1 week ago

Question

explain what is meant by the term fair dismissal

Answered: 1 week ago