Assessment Description This assignment will provide an exercise in implementing

April 5, 2024

Assessment Description
This assignment will provide an exercise in implementing DNSSEC and IPsec used in today’s corporate infrastructures. DNSSEC and IPsec are important security technologies that address different aspects of network security. DNSSEC enhances the security of DNS resolutions, while IPsec secures IP communications at the network layer, providing confidentiality, data integrity, authentication, and VPN support. Implementing these technologies helps organizations protect their network infrastructure, data, and communications from various security threats.
Part 1:
Using Azure Lab: On DC, conduct the following procedures outlined in the “DNSSEC and IPsec Implementation Guide.”
Enable DNSSEC and IPsec to enhance the protection of the domain and include screenshots.
Note: IPsec is a security protocol that provides network-based authentication and confidentially between servers via a set of standards, while DNSSEC is a set of extensions that provide integrity to the DNS server to aid in deterring attackers from hijacking the DNS process.
Part 2:
After completing the above procedures, attach the appropriate screenshots into a single Word document and complete the following tasks. Using the above enterprise architecture scenario, which consists of different components (e.g., servers, clients, databases) with information that has various temporal and distribution constraints, networks, multiple sites, and trusted and untrusted clients, create a 250-500-word summary. Address the following:
Describe how you would implement tools and strategies to ensure network security.
Define the purpose of IPsec (including the various modes, IKE, ESP vs. AH, Windows firewall integration, and IPv6) and DNSSEC (relationship to PKI, DNS Zones, and trust anchors).
Briefly describe what was accomplished with the procedures supplied and how these security protocols enhance the security of servers and ensure confidentiality, integrity, and availability of data.
Describe the management challenges/tradeoffs of implementing various security controls and protocols in an enterprise network.
While APA style is not required for the body of this assignment, solid academic writing is expected, and documentation of sources should be presented using APA formatting guidelines.

Are you struggling with this assignment?

Our team of qualified writers will write an original paper for you. Good grades guaranteed! Complete paper delivered to straight to your email.

GET HELP WITH YOUR PAPER