High-quality and authentic content
on every custom paper

  • All papers written from scratch
  • We hire professional writers only
  • Original and creative work
  • Timely delivery guaranteed
  • Variety of disciplines, topics, and deadlines
  • 100% confidentiality guarantee

Order Now

Network Segmentation Activity

Objective
This assignment requires the students to analyze the network diagram for Pureland Wastewater and make specific recommendations to improve network security per requirements below.
Instructions for assignment
1. Read your text: Establishing Secure enclaves
Textbook:

Industrial Network Security, 2nd Edition by Joel Thomas Langill and Eric D. Knapp- Chapter 9

2. Refer to the document titled PureLand Network Diagram.pdf in the Pureland Case Study section of Blackboard. (YOU JUST NEED TO FILL IN THREE TABLES WITH WORD ACCORDING to THAT CHAPTER ABOUT This assignment requires you to analyze the network diagram for Pureland
Wastewater and make specific recommendations to improve network
security. Specifically, you must design zones and conduits as described in Chapter-9 of your text, establishing zones and conduits). This is your starting point, and it has some deficiencies in its design that impact the cybersecurity for Pureland Wastewater. Your job is to use the concepts of establishing secure enclaves to improve the cybersecurity of Pureland’s network.
3. Define at least 3 enclaves within the Pureland network and fill in the following table defining these enclaves and how they will be monitored in the future state.

Enclave #1 Name:
Enclave Characteristic Description Comments
Functional group
Criticality of devices
Data flow in/out
Perimeter Security Devices recommended
Data monitored within enclave
Methods used to monitor enclave

Enclave #2 Name:
Enclave Characteristic Description Comments
Functional group
Criticality of devices
Data flow in/out
Perimeter Security Devices recommended
Data monitored within enclave
Methods used to monitor enclave

Enclave #3 Name:
Enclave Characteristic Description Comments
Functional group
Criticality of devices
Data flow in/out
Perimeter Security Devices recommended
Data monitored within enclave
Methods used to monitor enclave

Category: Essays

We are here to help!

We have many custom Writing services, have a look at these below to find out more. View our Writting Samples View Client Testimonials Place your Order Now

Custom Written Work


Guaranteed on Time


Get The Grade You ordered