|
Task 1: Understanding Networking Structures (LO1) and Apply Characteristics of Digital System Components, Implementing Security Controls (LO2)
Scenario Context: MediSys Technologies is expanding its operations and requires a robust and efficient network design. The network must include separate subnets for different hospital departments: Medical Staff, Administrative Staff, Patients` Wi-Fi, and Diagnostics Department. The design must ensure secure communication between subnets while maintaining logical segmentation and efficient routing.
Requirements:
1.Describe the structure and layers of the OSI and TCP/IP models, highlighting the key differences and similarities.
2.Outline network issues, such as packet loss and latency, and describe mechanisms like error detection and correction that can mitigate them.
3.Design a network architecture with at least four subnets and assign appropriate IP address ranges.
For higher grade, Illustrate the relationship between applications, protocols, ports, services and devices within the OSI and TCP/IP and evaluate the suitability of different networking protocols and models for specific scenarios, taking security considerations
Submission Guidelines: Prepare a report (approximately 1500 words) covering the requirements above. Use diagrams and simulation snapshots to illustrate your points.
Task 2: Apply Characteristics of Digital System Components, Implementing Security Controls (LO2)
For task 2, you should refer to task 1 Scenario Context,
Requirements:
1.Identify common network components (e.g., switches, routers, firewalls) and their functions.
2.Plan and implement routing between the subnets (Note: Here you can define your own example of controlled access of traffics)
3.Configure static or dynamic routing to facilitate communication between subnets.
4.Use a simulation tool such as Cisco Packet Tracer or GNS3 to implement and demonstrate the functionality of the network.
5.Apply Access Control Lists (ACLs) to restrict access between subnets according to hospital security policies.
6.Provide a network diagram illustrating the architecture, showing routers, switches, and connections.
7.Include a table of IP address ranges and subnet masks for each subnet.
8.Document the routing configuration and explain your approach to implementing routing protocols (e.g., RIP, OSPF, EIGRP).
9.Test and demonstrate the network design through simulations, ensuring:
- Successful data transmission between subnets where allowed.
- Blocked traffic as per ACL rules.
For higher grade, you should propose a comprehensive security plan addressing advanced threats, using frameworks like NIST or ISO 27001. Outline mitigation techniques for identified vulnerabilities (e.g., DDoS, man-in-the-middle attacks, etc.). Also justify your choice of components and security controls in the plan.
Submission Guidelines: You should provide network diagram and a written report (1,500 words). Include screenshots or evidence of network simulation testing (e.g., in Cisco Packet Tracer).
Task 3: Apply the Concepts of Cryptography (LO3)
Scenario Context: MediSys must guarantee the confidentiality of patient and hospital data using advanced encryption.
Requirements:
- Describe symmetric and asymmetric encryption principles and hashing.
- Design a basic encryption scheme using Python or similar, focusing on protecting MediSys sensitive data.
- Develop a key management plan addressing key rotation, secure storage, and archival.
For a higher grade, you should compare encryption algorithms like AES, RSA, and SHA-256, discussing their strengths and weaknesses in task 3.1. Also analyse trade-offs between encryption strength, performance, and usability.
Submission Guidelines: Submit your encryption code and a reflective commentary (approximately 1,000 words). Include recommendations for future enhancements to the encryption system.
|