You are required to write a 2,000 word technical report in Microsoft Word and create a packet tracer file (worth another 2,000 words) for an advertising company.

You are required to write a 2,000 word technical report in Microsoft Word and create a packet tracer file (worth another 2,000 words) for an advertising company.Submitting only one file is an incomplete assignment and will result in failure of the module.

The employees of this company receive calls from customers to purchase online services.The aim of the report is to improve the company`s current network security architecture.

The current network is flat,with no separation between users and services:

- There are two networks in operation.One network supports sales and marketing.The second network supports the rest of the business, including customer management, which contains sensitive customer information, HR, payroll and finance, and senior management data.

All users can access any of these systems on either network.Currently, each employee has two computers, each connected to a network. This needs to be changed to one computer per employee.

The LAN for the networks is connected to the Internet via a firewall and router.

All employees need access to their emails and files when working from home or out of the office.

The IT department consists of two people.

Give an overview of the network.State any assumptions, both technical and non-technical.You need to show the current network design (based on the above and your assumptions) and then highlight any areas where this network design has performance, reliability or security problems.Then produce a detailed network design of the network with associated network controls and mitigation techniques to improve the network security posture.

You are required to write a 2,000 word technical report in Microsoft Word and create a packet tracer file (worth another 2,000 words) for an advertising company.

The selected controls need to be evaluated and critiqued.The business case based on your stated assumptions and proposed solution. Some questions to consider Why were these controls chosen? How do they work? How do they benefit the network security architecture? Any associated risks that the controls may introduce. Include credible references with appropriate citations.

Please avoid writing the configuration commands in a Word file. Use this space for critical analysis and justification.

There are two networks in operation.One network supports sales and marketing.The second network supports the rest of the business, including customer management.

In addition to the word file, you must provide the designed and configured network in Cisco Packet Tracer (equivalent to 2000 words).

100% Plagiarism Free & Custom Written, Tailored to your instructions