Question: Lab Instructions Network Mapping Draw an enterprise network schematic. If feasible, use a diagram that depicts a similar building or scenario that you used in

Lab Instructions Network Mapping

  1. Draw an enterprise network schematic. If feasible, use a diagram that depicts a similar building or scenario that you used in Lab 2.
  2. Indicate the logical placement of nodes and connections, to include
    1. Hosts (computers, printers, servers)
    2. Network equipment (hubs, switches, routers, modems)
    3. Security hardware (IDS, IDPS, EDR, NGFW, VPN)
    4. Capability for secure remote access
    5. Capability for wireless

Threat Modeling

  1. Explain how the network is vulnerable to threats.
  2. Required to use the STRIDE model to identify a threat for each threat identified in STRIDE.

Risk Mitigation

  1. Identify Risk associated with the Threat (Use the 6 Threats of STRIDE from your Threat Modeling)
  2. State Mitigation Solution that will reduce the risks associated with each Threat. Solutions would include a combination of these areas: People (i.e. SETA), Process, Technology (i.e. NGFW, IDS, IDPS, Endpoint Security, EDR).
  3. Explain how the Mitigation Solution will reduce the Risk.

Security Protocols

  1. Describe the purpose of IPSec.
  2. Describe the protocols in IPSec.

Wireless Security

  1. Explain which wireless security feature offers the best defense for the wireless network.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Computer Network Questions!