Challenges in data and network security


Course Learning Outcomes:

The following learning outcomes will be assessed by this assignment:

A) Develop an in-depth understanding of fundamental concepts and challenges in data and network security

B) Demonstrate concepts related to basic cryptography

C) Critically evaluate threats to data and network security; design and implement security solutions using networking IOS

Introduction:

You are an independent consultant, part of the consultancy firm responsible for designing and implementing secure VoIP systems. Your main task is to implement a dedicated open source VoIP system with direct links to the mailbox of users using Asterisk IP-PBX in a series of Block Tasks. You should be able to design and implement secure VoIP calls in a local area network with appropriate dial plans in a fully virtualized environment. Your VoIP system should allow seamless integration with a unified communication (UC) system that allows unified email and desktop services.

Assignment Tasks:

Your work must be presented in the form of a Project Report and be no longer than 3000words (excl. references, figures, tables and appendices) plus a facing page that includes the executive summary. This should be typed on A4 paper and use a font size Arial 11 single spacing. For completeness, you may if you wish include additional material in an appendix but this will not contribute to the marks.

Portfolio Task(s):

Block A: Architecture and Communication

1. Configure a Linux server with Asterisk IP-PBX fully installed and configured with an appropriate logical addressing scheme. Your Linux server must be an authoritative DNS server for a domain of your choice.

2. Create a dial plan to serve up to 150 different extensions with at least two (2) soft phones attached and configured into your environment.

3. Design and implement a Postfix MTA in such a way that all voicemail from extensions it is forwarded to users' mailboxes.

4. Configuring appropriate IAX trunks to demonstrate connectivity between two different Asterisk servers.

Block B: Secure Operations and Service Delivery

5. Fully demonstrate at least three (3) attacks against your VoIP system with evidence on their sophistication and impact. At least one of these attacks should demonstrate pivoting against users' mailboxes.

6. Design and implement a comprehensive security policy for your VoIP system and clearly articulate adequate security controls against the attacks demonstrated in the previous step. Evidence must be provided on how the controls implemented can mitigate the attacks demonstrated.

7. Implement a comprehensive Network-based Intrusion Detection and Prevention system (NIDS) and test its efficiency in your VoIP deployment.

Block C: Research & Development

8. Deploy at least two (2) strong authentication mechanisms for your user agents (UA). You should be able to discuss critically the efficacy of those mechanisms into your VoIP environment and the cryptographic overhead produced as part of their deployment.

9. Encrypt VoIP traffic using standardized security protocols for the media part of the call. Critically discuss strengths and limitations of the protocol(s) selected with evidence on their efficacy in your environment.

10. With references to the public domain, critically discuss how cyber resilience can be achieved in unified communications. Identify the levels of UC reliability and redundancy companies must take to assure critical mission processes from the integration and adaptation of UC in traditional IT infrastructures.

Report Structure:

1. Executive Summary

2. Block A: Architecture and Communication

2.1 Asterisk design and Implementation

2.2 Dial Plan Implementation and Testing

2.3 Postfix MTA implementation and Testing

2.4 Configuration and demonstration of IAX trunk(s)

3. Block B: Secure Operations and Service Delivery

3.1 Attack demonstration and impact

3.2 Holistic security policy and controls

3.3 NIDS implementation and testing

4. Research & Development

4.1 Authentication mechanisms and Cryptographic overhead

4.2 VoIP media encryption: Implementation & Testing

4.3 Overview of Cyber resilience in UC: State-of-the-art

5. Conclusion and Future Work

All our professional tutors are capable enough to write a custom-made assignment paper as per the requirements of the students at a very affordable price. By availing our Network Security Assignment Help service, a number of students get benefited and acquire better grades than before.

Tags: Network Security Assignment Help, Network Security Homework Help, Network Security Coursework, Network Security Solved Assignments, Cryptography Assignment Help, Cryptography Homework Help, Networking IOS Assignment Help, Networking IOS Homework Help, VoIP Deployment Assignment Help, VoIP Deployment Homework Help, Cyber Resilience Assignment Help, Cyber Resilience Homework Help

Attachment:- Network Security.rar

Request for Solution File

Ask an Expert for Answer!!
Computer Network Security: Challenges in data and network security
Reference No:- TGS03033191

Expected delivery within 24 Hours