PM FPX 5018 Assessments 4 New Marketing Strategy for Cosmo Inc.
Student Name
Capella University
PM-FPX5018 Project Management Foundations
Prof. Name
Date
Executive Summary
With the rapid expansion of the Internet of Things (IoT), the demand for robust Internet Protocol (IP) security has significantly increased. At present, we are utilizing IPv4 while transitioning to IPv6, which intensifies the need for enhanced security to safeguard our systems and data. IP Security (IPSec) is a suite of protocols developed by the Internet Engineering Task Force (IETF) that ensures data authentication, integrity, and confidentiality between two communication points over an IP network [CITATION Gee20 \l 1033].
Introduction
In this lab, the objective was to implement IPsec to secure Joe and John’s computers from potential hacker attacks. By following the steps to configure this security measure, I gained a deeper understanding of the complexity of our systems. Besides configuring switches, routers, and workstations, an essential aspect of system setup is applying security measures that prevent unauthorized access. IPsec can be applied in three security domains: virtual private networks (VPNs), application-level security, and routing security. Presently, it is most commonly used in VPNs [CITATION Tho04 \l 1033].
Scope
Once all the equipment is connected to the IoT, it becomes necessary to secure the system. Using Cisco Packet Tracer, I individually accessed the switches and workstations to ensure IPsec was applied to each device.
Procedure
In this lab, the stations were pre-configured, so the task was to implement IPsec to block remote access attempts. I had to ensure that Joe and John’s IP addresses were correctly identified and recognized by the system. After verifying this, the next step was to ping the IP addresses of both computers to confirm connectivity. Subsequently, security prompts were applied within the switch to protect Joe and John’s computers. Upon completing the security configurations, I tested whether the hacker’s system could breach the network, and the attempt was unsuccessful.
Troubleshooting
This lab presented a challenge as I initially struggled to understand how the systems were pre-configured. I encountered difficulties accessing Joe’s command prompt, unlike John’s, which caused some confusion. However, after some troubleshooting, I managed to resolve the errors and establish connectivity between the systems.
Conclusion
As the IoT evolves and we transition into an IPv6 environment, the importance of robust security measures becomes increasingly critical. Key components of IP security include Encapsulating Security Payload (ESP) and Authentication Header (AH), both of which offer enhanced security. ESP provides data integrity, encryption, authentication, and anti-replay protection, while AH offers most of these features except encryption. The system sending the packet applies appropriate encryption based on the traffic, while the receiving host checks if the packets are properly encrypted [CITATION Gee20 \l 1033]. Having encryption and security protocols in place ensures that our systems remain secure and protected from unauthorized access.
References
Geeks. (2020, April 02). IP Security. Retrieved from GeeksforGeeks: https://www.geeksforgeeks.org/ipsecurity-ipsec/
Thomas, J., & Thomas, M. (2004, January 06). How IPsec works, why we need it, and its biggest drawbacks. Retrieved from CSO: https://www.csoonline.com/article/2117067/data-protection-ipsec.html
PM FPX 5018 Assessments 4 New Marketing Strategy for Cosmo Inc.
Get Capella University Free MBA Samples
HRM FPX 5025
HRM FPX 5122
HRM FPX 5310
LEAD FPX 5210
MBA FPX 5002
LEAD FPX 5220
MBA FPX 5006
MBA FPX 5008