Online Class Assignment

PM FPX 5018 Assessments 4 New Marketing Strategy for Cosmo Inc.

PM FPX 5018 Assessments 4 New Marketing Strategy for Cosmo Inc.


Student Name

Capella University

PM-FPX5018 Project Management Foundations

Prof. Name

Date

Executive Summary

 

With the rapid expansion of the Internet of Things (IoT), the demand for robust Internet Protocol (IP) security has significantly increased. At present, we are utilizing IPv4 while transitioning to IPv6, which intensifies the need for enhanced security to safeguard our systems and data. IP Security (IPSec) is a suite of protocols developed by the Internet Engineering Task Force (IETF) that ensures data authentication, integrity, and confidentiality between two communication points over an IP network [CITATION Gee20 \l 1033].

Introduction

 

In this lab, the objective was to implement IPsec to secure Joe and John’s computers from potential hacker attacks. By following the steps to configure this security measure, I gained a deeper understanding of the complexity of our systems. Besides configuring switches, routers, and workstations, an essential aspect of system setup is applying security measures that prevent unauthorized access. IPsec can be applied in three security domains: virtual private networks (VPNs), application-level security, and routing security. Presently, it is most commonly used in VPNs [CITATION Tho04 \l 1033].

Scope

 

Once all the equipment is connected to the IoT, it becomes necessary to secure the system. Using Cisco Packet Tracer, I individually accessed the switches and workstations to ensure IPsec was applied to each device.

Procedure

 

In this lab, the stations were pre-configured, so the task was to implement IPsec to block remote access attempts. I had to ensure that Joe and John’s IP addresses were correctly identified and recognized by the system. After verifying this, the next step was to ping the IP addresses of both computers to confirm connectivity. Subsequently, security prompts were applied within the switch to protect Joe and John’s computers. Upon completing the security configurations, I tested whether the hacker’s system could breach the network, and the attempt was unsuccessful.

Troubleshooting

 

This lab presented a challenge as I initially struggled to understand how the systems were pre-configured. I encountered difficulties accessing Joe’s command prompt, unlike John’s, which caused some confusion. However, after some troubleshooting, I managed to resolve the errors and establish connectivity between the systems.

Conclusion

 

As the IoT evolves and we transition into an IPv6 environment, the importance of robust security measures becomes increasingly critical. Key components of IP security include Encapsulating Security Payload (ESP) and Authentication Header (AH), both of which offer enhanced security. ESP provides data integrity, encryption, authentication, and anti-replay protection, while AH offers most of these features except encryption. The system sending the packet applies appropriate encryption based on the traffic, while the receiving host checks if the packets are properly encrypted [CITATION Gee20 \l 1033]. Having encryption and security protocols in place ensures that our systems remain secure and protected from unauthorized access.

References

Geeks. (2020, April 02). IP Security. Retrieved from GeeksforGeeks: https://www.geeksforgeeks.org/ipsecurity-ipsec/

Thomas, J., & Thomas, M. (2004, January 06). How IPsec works, why we need it, and its biggest drawbacks. Retrieved from CSO: https://www.csoonline.com/article/2117067/data-protection-ipsec.html

PM FPX 5018 Assessments 4 New Marketing Strategy for Cosmo Inc.