Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Lab Instructions Network Mapping Draw an enterprise network schematic. If feasible, use a diagram that depicts a similar building or scenario that you used in

Lab Instructions Network Mapping

  1. Draw an enterprise network schematic. If feasible, use a diagram that depicts a similar building or scenario that you used in Lab 2.
  2. Indicate the logical placement of nodes and connections, to include
    1. Hosts (computers, printers, servers)
    2. Network equipment (hubs, switches, routers, modems)
    3. Security hardware (IDS, IDPS, EDR, NGFW, VPN)
    4. Capability for secure remote access
    5. Capability for wireless

Threat Modeling

  1. Explain how the network is vulnerable to threats.
  2. Required to use the STRIDE model to identify a threat for each threat identified in STRIDE.

Risk Mitigation

  1. Identify Risk associated with the Threat (Use the 6 Threats of STRIDE from your Threat Modeling)
  2. State Mitigation Solution that will reduce the risks associated with each Threat. Solutions would include a combination of these areas: People (i.e. SETA), Process, Technology (i.e. NGFW, IDS, IDPS, Endpoint Security, EDR).
  3. Explain how the Mitigation Solution will reduce the Risk.

Security Protocols

  1. Describe the purpose of IPSec.
  2. Describe the protocols in IPSec.

Wireless Security

  1. Explain which wireless security feature offers the best defense for the wireless network.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Computer Networks

Authors: Andrew S. Tanenbaum, David J. Wetherall

5th edition

132126958, 978-0132126953

More Books

Students also viewed these Computer Network questions

Question

Define critical thinking and list its seven standards.

Answered: 1 week ago

Question

If 2 5 9 - k 5 8 = 2 5 8 , what is the value of k?

Answered: 1 week ago

Question

=+2. Why might those in the no-treatment group have improved?

Answered: 1 week ago