Chat with us, powered by LiveChat BOLTON HEALTH SERVICE SECURE NETWORK DESIGN | Writedemy

BOLTON HEALTH SERVICE SECURE NETWORK DESIGN

BOLTON HEALTH SERVICE SECURE NETWORK DESIGN

LO1: Perform a risk assessment for a given network security scenario and design a defensive strategy to address the

risks that you have identified.

LO2: Devise a firewall security policy and implement it using appropriate hardware and/or software.

Assignment Brief Introduction
The Internet has changed the approaches and attack vectors used by criminals in a massive way. The requirements for a

criminal to geographically close to their target is no longer a requirement. Attackers can probe and gain access to any

unprotected network from the comfort of their local internet café; no physical presence, no violence simply following

a logical processes and careful analysis of the information retrieved from a probed network is sufficient for the

criminal to obtain sensitive data such as credit card and deeply personal details. Therefore the design and development

of a secure network that provides a defence in depth strategy is paramount in todays business environment.
Assignment Brief and Overview of Research Scope

You are required to design and document a secure network for a medium sized doctors office that includes the

development of a shell script that includes all of the configuration elements for a Linux based iptables based firewall.
For this written assignment you are expected to research and develop two areas of network security. This assignment will

provided you with a deep yet rounded understanding of the approaches required to protect networks from outside attack

without restricting use for the authorised users of the network.
The assignment will consist of at least a minimum of three thousand words (excluding appendices, bibliography and

contents page) and will require independent research covering the following two aspects of risk assessment for the

design of a secure network that takes a defensive strategy to address the risks that you have identified and devise a

firewall security policy and implement it using appropriate hardware and/or software.
1. Risk Assessment and Secure Network Design: Under take a risk assessment to determine services, protocols, connection

directions, security classifications for data, access control, overall network security and Host and server security.

Design the secure network contrasting technologies and techniques to define the best strategy to mitigate the attack

vectors identified based upon the protocols and risk analysis. This will include a detailed network diagram outlining

ingress and egress points and full topology diagram that provides a defence in depth strategy.
2. Devise the firewall policy: Provide detailed instructions for the configuration of the firewall and rational for the

rules applied based upon the identified network services highlighted from the risk analysis as identified in part one.

This must be submitted as a shell script with detailed information on each of the rules that have been identified and

how this related to the information security strategy and the defence in depth strategy

For both areas you will need to consider and research contemporaneous security practices for network design and

deployment. Furthermore you will need to provide comparisons and justify your approaches for the topological design,

deployment of technologies and why you have chosen the strategies and technologies. It may well be worth researching to

see if there are existing practices within the NHS for this sort of development.

Please use the papers provided in the Case Study lectures on Moodle 2 to help you understand the topic and how to write

at the required academic level. This is a piece of applied research and should be documented as such.

Case Study area of research.
Bolton Health Service medium sized medical practice.

The assignment will consider the environment of a medium sized doctors office and surgical practice. There will be a

number of assumptions that can be made in terms of the requirements of the services such as internal servers and

external connection requirements, protocols and services that are used will be standard ports for those services. For

example, SSH prot 22, DNS port 53, SMTP port 25, https port 80 etc etc. There is also some specialist equipment for

medical imaging an example of one can be found here

https://www.philips.co.uk/healthcare-product/HC781342/ingenia-30t-mr-system that contains some basic specifications.

Assumptions can also be made about this equipment and how the data is stored and transmitted assume a standard network

protocol appropriate to the task is used.

Consider Information Security: This is a prerequisite exercise for the main element of the assignment brief.

Understanding an organizations data is the first step to securing their network. Data will have different

confidentiality and reliability requirements depending on whether it is medical, personal or general. Use the titles of

medical, personal and general as the classifications of the data and consider how each class is to be handled in the

context of the access permissions for the various roles in the organization. For example a Doctor would need to see all

medical and personal information where as a receptionist would only require to personal.
Planning The Network through risk analysis (1): Network security requires: 1) Identifying the services, protocols/ports,

connections, software and hardware technologies used within the network, and 2) allocating services to virtual or

physical computers, based on their Criticality/Sensitivity classification and role-based access control. This is all

undertaken through the process of risk analysis.
In this case study of the doctors office you must complete research in order to undertake risk analysis to determine an

appropriate design of a secure network for the required services including appropriate controls to securely protect the

data. The first step would be to determine which network services are allowed to enter and leave the network, and in

which directions connections normally originate and identify potential attack vectors that could be exploited based upon

Application Level protocols and transport and addressing protocols. The second step considers which applications can be

stored together on physical or virtual machines, based on access control (who can access what) and the Criticality

classification. Based on the Criticality classification, you will then define the required controls for each

service/host and technology used. The design and implementation of the network and technology needs will be based upon

the risk analysis you have identified and based upon the services that are required for this busy doctors surgery and

must to protect the organizations data, hosts and LANs from unauthorised access from the Internet, inside and wireless

networks.
Finally, you are required to develop a topological diagram that has a colour code the different systems according to

their level of security. Please use the floor plan of the office to help with the topological diagram
Figure 1: Floor Plan for Bolton Health Service.

Devise the Firewall Policy Network Security Research Element 2: If you are to protect the network, you must be able to

define and develop the rules for the firewalls that are placed throughout the network. These rules must be written as a

BASH script that can be used on the Linux based firewall. Additionally there MUST be a chapter in the main body of the

research paper that discusses the rules you have implemented, why you have implemented them and why they are appropriate

for the services and protocols you have identified from the risk assessment undertaken in research element 1.

Understanding protocols is essential to recognizing attack traffic, attack vectors as well as how attacks can be

manifested at different levels of the TCP/IP stack and programming a firewall is a key skill required for todays

security set. For example, you may need to consider which ports should remain open in and in which direction do

connections normally occur? Sometimes this is not easily known, and some research will need to be taken.
This very technical exercise and each of the practical sessions that have taken place will help you with the development

of the rules. It is expected that you will test your rules to ensure that they work.

Secondary Research Level HE6 It is expected that the Reference List will contain between fifteen to twenty sources. As

a MINIMUM the Reference List should include four refereed academic journals and four academic books.

Marking Guide Assignment

Content 25%

• Structure of report is appropriate to the topic.
• Summary skills in evidence e.g. to select evidence and examples.
• Section included on findings, with sub-headings.
• Conclusion section included, addressing the question in the title.
• Excessive detail moved to one or more appendices.
• Clear knowledge of network security technologies, strategies and approaches .

Report Writing 25%

• Essential sections present: title, introduction/abstract, contents, findings, conclusions, references, and possibly

one or more appendices (following David Rudds guidelines in Cite Me Im Yours available from:

https://www.bolton.ac.uk/library/LibraryPublications/StudySkills/Harvard07.pdf).

• Well written, generally following UK conventions for spelling, grammar and punctuation.
• Well-presented overall, including use of spacing, and consistency in use of fonts and sizes for headings and text.
• Use of graphical elements e.g. tables, pictures etc. where appropriate.
• Homogeneous, not simply a collection of individual submissions.
• Total number of words as a minimum 3000

Research Process and Referencing 25%

• Section included on research objectives, initial ideas, how and why changed, (if at all), final sequence of topics.

i.e. was there a research strategy, and did it help you to draw conclusions?
• Section included on evaluation and comparisons of techniques and technologies. Consider where did you get your best

information? Did you consciously use a variety of sources? What method did you adopt for recording sources?
• Any direct quotes clearly identified as such, and the source stated.
• Correct lay out of a Bibliography
• Correct documentation of sources. E.g. using the Harvard method to link to the list of references.

Individual Contribution to the problem domain 25%

Your individual ideas brought about through research, argument and synthesis of management methodologies. You should let

your individual thoughts based upon sound academic argument shine through.

Additional Marking information:

First class: This piece of work shows evidence of wider research with reference to a number of differing academic

viewpoints. The report has recognised relevantly and discussed in detail, all the required external environmental

factors which affect the management operation of mega events. Several reasoned and logical arguments have been developed

well and supported by a wide range of appropriately researched literature. Reference to two or more academic models is

clear, relevant and informative. Presentation is of a high professional standard, and in the appropriate technical

report style. The high number of appropriate sources has been referenced accurately and to a high standard.

Second class: A clear and informative piece of work with evidence of wider research and discussion. The report has

correctly recognised and discussed, all the required external environmental factors which affect the management

operation of mega events. Some reasoned arguments have been developed and supported by a good number of sources.

Reference to two academic models is clear. Presentation is of a good standard, in the appropriate report style. A good

number of appropriate sources have been referenced well, with most complying with the Harvard style.

Third class: A reasonable attempt has been made at researching the essay but greater in depth discussion and academic

debate is required. The report has recognised the external environmental factors which affect the security of the

network, however mostly the discussion is superficial and lacking in any depth. Reference to two academic models has

been attempted. Presentation of the report is limited, and only the minimum of 5 sources has been provided, with at

least one academic text and two academic journals included.

 

Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.

Do you need an answer to this or any other questions?

About Writedemy

We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.

How It Works

To make an Order you only need to click on “Order Now” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Are there Discounts?

All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.

Hire a tutor today CLICK HERE to make your first order