Merged Network Security

Merged Network Security

Merged Network Security

A.  Describe two current network security problems and two current infrastructure problems for each company, based on business requirements given in the scenario.

B.  Analyze the given network diagram and vulnerability scan for both companies by doing the following:

1.  Describe two existing vulnerabilities for each company.

2.  Explain the impact, risk, and likelihood associated with each described vulnerability from part B1 as it relates to each company.

C.  Create a network topology diagram with details of the proposed merged network requirements.

D.  Identify the layer for all components in the topology diagram referencing the layers of the OSI model and TCP/IP protocol stack.

E.  Explain the rationale for adding, deleting, or repurposing network components in the newly merged network topology diagram, including details of how each component addresses budgetary constraints.

F.  Explain two secure network design principles that are used in the proposed network topology diagram.

G.  Explain how the proposed merged network topology diagram addresses two regulatory compliance requirements that are relevant to the newly merged company, including the following in your explanation:

Merged Network Security

APA

Check out our Essay writing services

Merged Network Security

Identifying Security and Infrastructure Challenges

Merging networks presents both security and infrastructure issues. Common security problems include inconsistent firewall configurations and outdated intrusion detection systems. These can leave the merged network exposed to internal and external threats. Infrastructure issues might involve incompatible hardware and bandwidth limitations. These problems must be addressed early to avoid operational disruptions and ensure a unified, functional system post-merger.

Analyzing Vulnerabilities and Risk

Each company may have vulnerabilities such as unpatched operating systems and open ports on servers. These flaws expose systems to malware and unauthorized access. The risks include data breaches, downtime, and reputational damage. The likelihood increases if outdated systems or poor access controls exist. Evaluating these factors allows IT teams to prioritize fixes based on business impact.

Designing a Secure Network Topology

The new topology should balance performance and protection. It should include firewalls, segmented VLANs, load balancers, and redundant routers. Components must be mapped to OSI and TCP/IP layers—for example, switches at Layer 2 and firewalls at Layer 3. Such design ensures clear data flow, efficient routing, and secure user access across all merged departments.

Share your love