CYB_310_7-2_Project_Three_Submission_Joshua_Minnick

docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

310

Subject

Information Systems

Date

Apr 3, 2024

Type

docx

Pages

5

Uploaded by CommodoreWombatMaster597

Report
7 – 2 Project Three Submission: Restructuring Status Report Joshua Minnick Information Technology Department, Southern New Hampshire University CYB-310 Network Defense Professor Kevin Kenna February 25, 2024
I. Network Reconfiguration Network Diagram II. Traffic Flow Configuration ServerRouter Configuration
CoreRouter Configuration Firewall Rules to Control Traffic for Port 80 (HTTP) and Port 443 (HTTPS) III. Organizational Security Strategy Restructuring the network in this way has greatly improved the security posture of the organization in multiple ways. The segmentation of the network using multiple routers and switches increases the ability to route traffic properly and contain data within each segment, so it is not accessible without proper authorization. The configuration of
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
the firewall rules greatly increases the security posture by requiring all web traffic be funneled to the web server. This means no data can be sent out to the web or brought into the network from the web, without first traveling through the web server where rules can be implemented for further restriction of users and devices that can utilize internet services. This also allows for logging of all web traffic, which can be monitored and evaluated should any concerns arise. Confidentiality is increased through this restructuring because of the increase in security measures. The segmentation of the network allows for greater restriction of each segment’s data, increasing the security of that data. The firewall rules restrict access to the internet to the web server which increases the difficulty for anyone attempting to access confidential information without proper authorizations. The integrity of the network has increased because data will be protected from unauthorized access through the firewall rules and segmentation processes. If data is inaccessible to unauthorized access, it can be trusted with a greater level of integrity because logs can be maintained to show the users and devices that have accessed the data and what processes were used to access and/or manipulate the data. Availability has increased because the restructuring removed firewalls within the network, but created stronger defenses where the internal network meets access to the internet. In network security, less can sometimes be more when discussing items like firewalls. Redundancy is helpful, but each time packets must be inspected and cleared for travel through a firewall, the time it takes for this data to make it to the intended destination increases. Because this restructuring removed some redundancies but created
strict rules regarding internet traffic, the availability of data within the network is vastly improved while still allowing internet traffic to be properly filtered and monitored.