Network Security Plan Introduction

   

Added on  2020-04-15

27 Pages7506 Words360 Views
Network Security Plan Introduction For the development of the network security plan an analysis is made on the current networkinfrastructure of the First national university and the security measures that can beimploemneted in the design is analyzed. The network security plan is important because itenables to identify the different areas of risk associated with the network and configure thenetwork accordingly such that it meets all the requirement of the user. The network of thecamous is expanded over 10 metropoliton cities and 5 different regions. A wide area networkdesign should be created for covering the different parts of the campus. The user connected inthe network should be able to communicate with each other using the network. VPN, Firewalland other security hardware or software can be used by the organization for increasing thesecurity of the University network solution. The servers must be configured with activedirectory such that separate user account is needed for accessing the core resources of theserver installed in the network. The server must be secured against illegal access and it isrecommended to create a DMZ zone for installing the servers and secure it from physicalaccess. The slection of the security technology is important for increasing the security of thenetwork and elimination of the different vulnerabilities related with the dveelopment of theFirst national university network infrastructure. ScopeThe development of the network solution would help First National university to open newopportunities and develop the network frameework for aligning the curret buisness needs ofthe organization. The scopes of the network security project are given below:*Networks and Information Security Case study - Copyright © Edilson Arenas - CQUniversity
Network Security Plan Introduction_1
The facilities provided to the student and the staffs can be manage from a centralpoint with the development of the network infrastructure and increase the efficiencyof the network communication for the development of the network security. Different innovative technologies can be applied in the network such that the differentactivities of the network can be managed efficiently and the business process of theorganization can be re aligned for redesigning the network security and develop thenetwork security plan. Different project activities can be included such that it helps in systematicdevelopment of the network infrastructure and develop the security policy forsecuring the network elements. For the successful implementation of the networksecurity it is important to develop a network security policy and analyse the futureneeds for the users connected in the network. *Networks and Information Security Case study - Copyright © Edilson Arenas - CQUniversity
Network Security Plan Introduction_2
ObjectivesThe network development project for the First National University is designed for theimporvement of the security and efficiency of the current networo design of the university.The following are the objectives identified for the development of the network frameworkand the secuirty needs in the network redesign for improvement of the facilities of thenetwork. To make the servers and the network available for the users 24 * 7 such that the userdoes not feels any lag while using the university network solution. To design the network according to the floor plan of the building of the university anddivide the network into different subnets such that it can be used for the creation ofdifferent VLAN and make the management of the network easier.To create a network security policy for the network the business rules of theuniversity should be analysed and the rules should be aligned with the security policyfor improvement of the security of the network. To implement the network security policy for the development of the report it isimportant to identify the requirement of the project and develop the project accordingto the needs of the users. To configure the network devices according to the requirement and develop usergroup policy for the management of the network solution secure the servers fromillegal access. *Networks and Information Security Case study - Copyright © Edilson Arenas - CQUniversity
Network Security Plan Introduction_3
Assumptions.....Different types of assumptions are made for the development of the security framework ofthe network solution and they can be grouped into two types such as design assumptiona ndthe security assumption. The assumption helps in eliminating the barriers faced during thedevelopment of the network project and divide the network assets for taking input from thesame level and take effective decision for the improvement of the competition policy. Thepriorities and the responsibility of the project are also assumed regardless of the expectedoutcomes from the network design plan and the enterprise network should be createdconsidering the innovation, quality and the creativity of the network solution. The riskassociated with the network should be shared with the different personnel such that thenetwork is designed according to the needs and the security of the network is retained. Assumption for creation of the network design – For the development of the network designit is assumed that the network development team have the sufficient knowledge about therequirement of the users connected with the First national University Network. A prototypeof the network design should be created in any simulator software such that it can beconfirmed with the stakeholders associated with the development of the project.Assumptions for the development of the network security plan – The network securitydevice, hardware and software that is essential for increasing the security of the networkshould be identified and it is assumed that is the security device can counter measure thedifferent threats acting on the network. It is also assumed that the development team is able toconfigure the firewall and the other security device used for securing the network and wouldnot face any difficulty while configuring the network security. The external factors like price,legal factors would not hamper the current needs of the network and the network securityplan would meet all the objectives of the First national University. *Networks and Information Security Case study - Copyright © Edilson Arenas - CQUniversity
Network Security Plan Introduction_4
Risk Analysis For the development of the network solution the risk is needed to be identified and it isimportant to identify the security assets and the other network equipment that are vulnerableto the network and should be secured from illegal access. The assets of the First nationaluniversity are divided into Physical and Non Physical assets and the different risk acting on itare identified for the development of a secure network solution. Asset Identification and AssessmentPhysical Assets – The main elements that falls on the category of physical assets are the different networkhardware devices that are needed to be deployed in different areas of the network forenabling communication with the main campus, regional campus and the other department ofthe university. There are different network devices such as 2000 PCs, headsets, webcams, 20networked Laser Printers, 50 computer labs with 1200 Desktop PCs and 50 printers, VoIPvideo phones for the main campus. For the metropolitan and the regional campus there are250 Desktop PCs, 4 networked Laser Printers, 10 computer labs with 240 PCs and 10printers. For the operation and the backup site there are 250 servers, 4 networked LaserPrinters, 10 computer labs with 240 PCs and 10 printers. Non-Physical Assets –The non-physical assets for the first national university consists of the operating system usedin the desktops and the servers of the university network and they are mainly Ubuntu,Windows 10, Windows 7 and Windows Server 2012 R2. Network drive is also attached withthe university network that is used for backing up the local data into the cloud servers andincrease the redundancy of the data and create a recovery mechanism for the development ofthe network solution. The routers (“Cisco 2811 Integrated Services Router”), Switches*Networks and Information Security Case study - Copyright © Edilson Arenas - CQUniversity
Network Security Plan Introduction_5
(“Cisco Catalyst 2960 Series Switches”) are used for the development of the local areanetwork of the different areas of the university. There are different software installed in theservers such as network traffic analyser, file storage solution, antivirus that are alsoconsidered as the non-physical assets. Load balancer can also be used for increasing thesecurity of the network and reducing the load on the physical server for getting the maximumthroughput from it. RisksIndividual Asset Risk Analysis The individual resource chance examination depends on the advancement of the compellingdanger appraisal for the system association activities of FNU. The individual hazardinvestigation would be based for the arrangement of the exercises supporting the recognizableproof of the hazard factors. The different hazard elements would be broke down in light ofthe ramifications of the compelling advancement of the system plan and utilizing systemobserving devices for shaping the major glitches in the system. The plausible hazard factorsfor the system association arrangement at FNU are introduction of the key collegeapplications and administrations to outer people because of the cloud sending, wrong accessand utilization of assets, unapproved and malignant inner and outside system assaults, andsystem excess. Every one of these issues would bring about framing the significant issues forthe execution of the system association for the FNU. The issues would bring about framingthe immediate and backhanded effect on the physical and nonphysical resources of FNU. Thehazard factor would frame the issues in administration of the correspondence for the FNUand it would bring about shaping the real issues for the administration of the different areason a solitary system association.Risk Summary *Networks and Information Security Case study - Copyright © Edilson Arenas - CQUniversity
Network Security Plan Introduction_6

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
IT Infrastructure for Desklib: Design and Implementation
|18
|2850
|452

IT Networking and Designing: Proposal for MonkeyNet
|11
|1524
|110

Planning and Implementing Server
|13
|2725
|27

Network Requirement Analysis and Plan
|16
|1147
|247

Network Requirement Analysis and Plan for HiTech Telecommunication
|14
|1180
|54

IT Infrastructure for Compname.org.au: Network Solution Proposal
|19
|3051
|347