CYB_310_7-2_Project_Three_Submission_Joshua_Minnick
docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
310
Subject
Information Systems
Date
Apr 3, 2024
Type
docx
Pages
5
Uploaded by CommodoreWombatMaster597
7 – 2 Project Three Submission: Restructuring Status Report
Joshua Minnick
Information Technology Department, Southern New Hampshire University
CYB-310 Network Defense
Professor Kevin Kenna
February 25, 2024
I. Network Reconfiguration
Network Diagram
II.
Traffic Flow Configuration
ServerRouter Configuration
CoreRouter Configuration
Firewall Rules to Control Traffic for Port 80 (HTTP) and Port 443 (HTTPS)
III.
Organizational Security Strategy
Restructuring the network in this way has greatly improved the security posture of
the organization in multiple ways. The segmentation of the network using multiple routers and switches increases the ability to route traffic properly and contain data within each segment, so it is not accessible without proper authorization. The configuration of
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
the firewall rules greatly increases the security posture by requiring all web traffic be funneled to the web server. This means no data can be sent out to the web or brought into the network from the web, without first traveling through the web server where rules can be implemented for further restriction of users and devices that can utilize internet services. This also allows for logging of all web traffic, which can be monitored and evaluated should any concerns arise.
Confidentiality is increased through this restructuring because of the increase in security measures. The segmentation of the network allows for greater restriction of each segment’s data, increasing the security of that data. The firewall rules restrict access to the internet to the web server which increases the difficulty for anyone attempting to access confidential information without proper authorizations. The integrity of the network has increased because data will be protected from unauthorized access through the firewall rules and segmentation processes. If data is inaccessible to unauthorized access, it can be trusted with a greater level of integrity because logs can be maintained to show the users and devices that have accessed the data and what processes were used to access and/or manipulate the data.
Availability has increased because the restructuring removed firewalls within the network, but created stronger defenses where the internal network meets access to the internet. In network security, less can sometimes be more when discussing items like firewalls. Redundancy is helpful, but each time packets must be inspected and cleared for
travel through a firewall, the time it takes for this data to make it to the intended destination increases. Because this restructuring removed some redundancies but created
strict rules regarding internet traffic, the availability of data within the network is vastly improved while still allowing internet traffic to be properly filtered and monitored.