Assessment Description Cybersecurity professionals must be able to reduce the vulnerability of an organization’s network by designing a secure network. Part 2 Create a 6– to 8-minute screencast addres

We can write your essays! Let our essay writing experts help you get that A in your next essay. Place your order today, and you will enjoy it. No plagiarism.

Order a Similar Paper Order a Different Paper

Assessment Description

Cybersecurity professionals must be able to reduce the vulnerability of an organization’s network by designing a secure network.

Part 2

Create a 6– to 8-minute screencast addressing the following:

  1. Explain all components and how they interact with each other within the secure network design created.
  2. Discuss the results of the GVM scan.
  3. Describe and discuss the security issues and implications of advanced and novel networks and protocols. Ensure your discussion applies to both current and new network technologies.

Use an online video platform such as Loom, YouTube, or Vimeo to upload your completed video.

Remember that video and audio quality are important and should be taken into consideration. Ensure your video is filmed with sufficient lighting and that the volume is adequate for viewers to hear. Intonation, expression, proper speech, and professional attire are expected.

In addition, make sure to integrate a variety of visuals to support the presentation.

You will be graded on your ability to provide:

  1. Detailed and cited content (to include a brief introduction and a reference section containing at least 2 resources)
  2. A comprehensive and consistent focus throughout the presentation
  3. Effective communication in your awareness of the audience
  4. Professionalism

Your final submission should include all the deliverables from Part 1 along with the Part 2 video link. Place the video link in the Word document from Part 1. Ensure that others can access and view the link to your video prior to submitting it.

Retain a copy of this assignment for the Business Continuity Plan, which will be finalized and submitted in either CYB-690 or ITT-660, depending on your major.

While APA style is not required for the body of this assignment, solid academic writing is expected, and documentation of sources should be presented using APA formatting guidelines, which can be found in the APA Style Guide, located in the Student Success Center.

This assignment uses a rubric. Review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are not required to submit this assignment to LopesWrite.

Assessment Description Cybersecurity professionals must be able to reduce the vulnerability of an organization’s network by designing a secure network. Part 2 Create a 6– to 8-minute screencast addres
Cybersecurity Student Name Institution Due Date Cybersecurity Part 1 Part 2 A router is a networking device that forwards data packets between computer networks. A router is connected to at least two networks, commonly referred to as the WAN (wide area network) and the LAN (local area network). A router connects these two networks and allows for communication between them. A router uses a process known as routing to determine where to send data packets. Routing determines the best path for a data packet to take from one network to another (Safarpour, 2021). A router uses a routing table to make this determination. The routing table is a database containing information about the various routes a router can take. Routers are commonly used to connect a LAN to the Internet and a WAN to LAN. The router is connected to the LAN and the Internet in this case. The router then uses the routing table to determine the best path for data packets to take from the LAN to the Internet, other LAN, or from WAN to LAN. A firewall is a piece of network security equipment that keeps an eye on and manages incoming and outgoing network traffic in accordance with pre-established security rules. Typically, a firewall creates a barrier between a reliable internal network and an unreliable external network, such as the Internet (Wang, 2021). Firewalls may be made up of both software and physical components. All devices on a network are secured by hardware firewalls, which are commonly mounted on a network router. Individual computers often have software firewalls installed, and those firewalls only provide protection for that one computer. Firewalls use a variety of methods, including packet filtering, application gateways, and proxy servers, to manage traffic. Packet filtering inspects and evaluates each packet that passes through the firewall and decides whether to allow or block the packet based on a set of rules (Safarpour, 2021). The application gateway inspects and evaluates traffic at the application layer and allows or blocks traffic based on application-specific rules. The proxy server intercepts traffic and forwards it to the appropriate destination while also hiding the true IP address of the devices on the network. Firewalls can provide a high level of security for a computer network. However, they can also impede network traffic if not configured properly. It is important to consult with a network security expert when configuring a Network System. A switch is a component of a computer network system that connects different segments of the network. Switches can connect different networks, such as Ethernet and Token Rings. They can also connect different segments of the same network. Switches can be either physical or virtual. On the other hand, an IDS is a network system component responsible for detecting and responding to intrusions (Wang, 2021). It monitors network traffic and looks for suspicious activity that may indicate an attack. The IDS can block the attacker or notify the system administrator if an attack is detected. An IPS is a network security appliance that inspects traffic flowing in and out of a network to detect and block malicious activity. It is typically deployed as an inline security device between a network’s perimeter firewall and internal router to protect the network from external threats. IPS devices use various detection methods to identify malicious traffic, including signature-based detection, heuristic-based, and anomaly-based detection. A computer that serves as a middleman between a client computer and a server is called a proxy server. It enables customers to connect informally to other network services. A proxy server is employed to obfuscate network limitations, manage resource access, and safeguard user privacy. It blocks all Internet requests to add more security, filtering, and other functions (Wang, 2021). A dedicated computer or a piece of software running on a computer can operate as a proxy server. All of your Internet traffic will pass through the proxy server once you set up your PC to use one. The traffic will subsequently be forwarded by the proxy server to the proper location. Proxy servers can offer a number of features, such as: – Security: Proxy servers can provide a high level of security. They can be configured to allow or deny access to specific websites or IP addresses. – Filtering: Proxy servers can be used to filter content. For example, a proxy server can be configured to block access to websites that contain inappropriate content. – Caching: Proxy servers can cache frequently requested websites. This can improve performance since the proxy server does not need to fetch the content from the website each time it is requested. – Anonymity: Proxy servers can be used to surf the web anonymously. This is useful if you want to keep your identity hidden when browsing the web. – Logging: Proxy servers can log all traffic passing through them. This can be useful for monitoring and troubleshooting purposes. An email server is a computer system that stores and manages email messages. Email servers work with email clients, which are used to access and send email messages. Email servers can be either on-premises or hosted in the cloud. On-premises email servers are typically deployed within an organization’s internal network. The organization’s IT department usually manages these email servers. On the other hand, Hosted email servers are managed by a third-party provider and are typically accessed via the internet. Email servers are responsible for receiving, storing, and forwarding email messages. They use a variety of protocols, such as POP3, IMAP, and SMTP, to communicate with email clients. Email servers typically also offer web-based access to email, which allows users to access their email messages from any internet-connected device. Email servers are an important component of a network system because they provide a way for users to communicate with each other via email. Email servers can send and receive important business and personal communications. A DHCP server is a computer configured to automatically provide network configuration information to other devices on a network. The DHCP server can be configured to provide a range of IP addresses, default gateway information, and DNS server information to devices that request it (Wang, 2021). The DHCP server can also be configured to provide other information, such as the location of a network file server or a printer. A DMZ, or demilitarized zone, is a part of a network system designed to be a buffer between an internal, trusted network and an external, untrusted network. The DMZ typically contains servers that provide services to the external network, such as a website or email server (Wang, 2021). The DMZ is designed to allow these servers to be accessible to the outside world while keeping the rest of the internal network safe from attack. One way to think of a DMZ is as a “safe zone” between two networks. By placing servers in the DMZ, they are isolated from the rest of the internal network and are less likely to be affected by attacks or other problems that might occur on the external network (Safarpour, 2021). This isolation can also help to protect the rest of the internal network from being compromised if the DMZ is breached. A DMZ can be created using hardware or software, or a combination of both. When using hardware, a DMZ is typically created using a separate router or firewall to segment the internal and external networks. When using software, a DMZ can be created by configuring the security settings on a server to allow only specific traffic to flow to and from the DMZ. The DMZ is an important part of a network security strategy and can help to protect internal network resources from being compromised by external threats. The results of a GVM scan on a computer network system can help network administrators understand the potential vulnerabilities of their systems and take steps to mitigate them. Additionally, the results can create awareness among users and help them make more informed decisions about their interactions with the system. The security issues and implications of advanced and novel networks and protocols are numerous. First, there is the issue of data security (Wang, 2021). With the advent of the Internet of Things, more and more devices are connected and sharing data. This data is often sensitive, personal information that can be used to exploit individuals if it falls into the wrong hands. There is also the issue of network security. As more devices are connected to the network, there are more opportunities for attackers to gain access to the network and wreak havoc. Advanced and novel networks and protocols often have more security vulnerabilities than older, more established ones. Finally, there is the issue of privacy. With the increased connectivity of devices comes the increased ability for companies and other organizations to track and collect individual data (Safarpour, 2021). This data can be used to profile individuals and target them with ads and other content. Privacy concerns will only become more prevalent as the Internet of Things grows. References Safarpour Kanafi, F. (2021). Cyber-security of Cyber-Physical Systems (CPS) (Master’s thesis, UiT Norges arktiske universitet). Wang, S. P. (2021). Communication, TCP/IP, and Internet. In Computer Architecture and Organization (pp. 243-292). Springer, Singapore.

Everyone needs a little help with academic work from time to time. Hire the best essay writing professionals working for us today!

Get a 15% discount for your first order

Order a Similar Paper Order a Different Paper