Question: Network Mapping Draw an enterprise network schematic. If feasible, use a diagram that depicts a similar building or scenario that you used in Lab 2.

Network Mapping

Draw an enterprise network schematic. If feasible, use a diagram that depicts a similar building or scenario that you used in Lab 2.

Indicate the logical placement of nodes and connections, to include

Hosts (computers, printers, servers)

Network equipment (hubs, switches, routers, modems)

Security hardware (IDS, IDPS, EDR, NGFW, VPN)

Capability for secure remote access

Capability for wireless

Threat Modelling

Explain how the network is vulnerable to threats.

Required to use the STRIDE model to identify a threat for each threat identified in STRIDE.

If it helps you, consider using STRIDE diagramming to define these threats

Risk Mitigation

Identify Risk associated with the Threat (Use the 6 Threats of STRIDE from your Threat Modeling)

State Mitigation Solution that will reduce the risks associated with each Threat. Solutions would include a combination of these areas: People (i.e. SETA), Process, Technology (i.e. NGFW, IDS, IDPS, Endpoint Security, EDR).

Explain how the Mitigation Solution will reduce the Risk.

Security Protocols

Describe the purpose of IPSec.

Describe the protocols in IPSec.

Wireless Security

Explain which wireless security feature offers the best defense for wireless network.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!