Question: Network Security Management Objective: An effective approach or strategy for the security of a network connected to the internet is network segmentation. You must

Network Security Management

 

Objective: An effective approach or strategy for the security of a network connected to the internet is network segmentation. You must construct, extend, or improve the security of a network utilizing network segmentation for this assignment.

 

Task 

The network is divided into two segments, and you must place the devices in the most appropriate section while giving a reason or justification for doing so. Take into account in your design the necessities for everyday business operations, such as internet connectivity and the capacity to send and receive emails. This calls for proper routing of traffic both inside and outside the network.

 

www—Internet—Router—Firewall 1--Network Segment A (DMZ)—

 

---Firewall 2-- Network Segment B (Main Network)

 

Devices

Application Server

File Server

Database Server

DNS Server

Honeypot Server

Email Server

Time Server (Clock)

CMS Server

Certificate Server

Jump Box

User 1

User 2

Domain Controller

 Proxy Server

 Web Server

E-Commerce Server 

Archive Storage

Systems Administrator

 

Submission details


Network Segment A & B Devices and justification.


1. Server Name/Role - Reason this section is the most suitable from a security perspective. can begin with a succinct explanation of the job, its relationship to other devices on the network, and how the business activity works.


2. Server Name/Role - Identical data as before. Information should support where the device is placed.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock

Heres a breakdown of the devices and their placement in Network Segment A DMZ or Network Segment B Main Network along with justifications Network Segm... View full answer

blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Computer Network Questions!