exercise in the implementatio

  1. Using the virtual environment created and modified in Topics 1 and 2. On your primary domain controller (e.g., ITT430-ASB1), conduct the following procedures outlined in the “ITT-430: IPSec & DNSSEC Implementation Instructions.”
  2. Enable IPsec and DNSSEC to enhance the protection of the domain. Note: IPsec is a security protocol that provides network-based authentication and confidentially between servers via a set of standards, while DNSSEC is a set of extensions that provide integrity to the DNS server to aid in the deterring attackers from hijacking the DNS process.
  3. After completing the above procedures, attach the appropriate screenshots into a single MS Word document and complete the following tasks.

Using the above enterprise architecture scenario, which consists of different components (e.g., servers, clients, databases) with information that has various temporal and distribution constraints, networks, multiple sites, and trusted and untrusted clients, write a 500- to 750-word summary, making sure to:

  1. Describe the appropriate cryptographic tools/algorithms/protocols that can be applied at various locations throughout that architecture in order to achieve a variety of goals.
  2. Define the purpose of IPsec (including the various modes, IKE, ESP vs AH, Windows firewall integration, and IPv6) and DNSSEC (relationship to PKI, DNS Zones, and trust anchors).
  3. Briefly describe what you accomplished from the procedures supplied, and how these protocols enhance the security of servers. Provide references to recent articles (less than a year old) that demonstrate the use and benefits of an organization that has implemented IPsec and DNSSEC.
  4. Describe the management challenges/tradeoffs associated with implementing various security controls and protocols in an enterprise network.
  5. Include the required screenshots as outlined in the implementation instructions.

While APA style is not required for the body of this assignment, solid academic writing is expected, and documentation of sources should be presented using APA formatting guidelines, which can be found in the APA Style Guide, located in the Student Success Center.

This assignment uses a rubric. Review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are required to submit this assignment to LopesWrite. Refer to the LopesWrite Technical Support articles for assistance.

Benchmark Information

This benchmark assignment assesses the following programmatic competencies:

B.S. Cybersecurity

2.4 Discuss issues of network management and propose possible solutions.

3.3 Apply security principles and practices to the environment, hardware, software, and human aspects of a system.

6.3 Explain which cryptographic protocols, tools, and techniques are appropriate for a given situation (M7, M8, M9, O3, O5, O13, O15)

6.5 Examine logical access controls to data processing systems, e.g., passwords, smartcards, tokens, biometrics, cryptography.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized