Question: Network Mapping Draw an enterprise network schematic. If feasible, use a diagram that depicts a similar building or scenario that you used in Lab 2.
Network Mapping
Draw an enterprise network schematic. If feasible, use a diagram that depicts a similar building or scenario that you used in Lab 2.
Indicate the logical placement of nodes and connections, to include
Hosts (computers, printers, servers)
Network equipment (hubs, switches, routers, modems)
Security hardware (IDS, IDPS, EDR, NGFW, VPN)
Capability for secure remote access
Capability for wireless
Threat Modelling
Explain how the network is vulnerable to threats.
Required to use the STRIDE model to identify a threat for each threat identified in STRIDE.
If it helps you, consider using STRIDE diagramming to define these threats
Risk Mitigation
Identify Risk associated with the Threat (Use the 6 Threats of STRIDE from your Threat Modeling)
State Mitigation Solution that will reduce the risks associated with each Threat. Solutions would include a combination of these areas: People (i.e. SETA), Process, Technology (i.e. NGFW, IDS, IDPS, Endpoint Security, EDR).
Explain how the Mitigation Solution will reduce the Risk.
Security Protocols
Describe the purpose of IPSec.
Describe the protocols in IPSec.
Wireless Security
Explain which wireless security feature offers the best defense for wireless network.
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
