Analysis of the Network Security Plan at First National University

Verified

Added on  2023/06/11

|15
|679
|496
Report
AI Summary
This report provides an overview of the network security plan implemented at the First National University (FNU). It highlights the scope of the plan, focusing on mitigating identified network security issues. The report identifies current risks such as problems in consistency, performance, and reliability, the absence of BYOD and WAT policies, and potential cyber-attacks. Key network security policies including Acceptable Use Policy, Confidential Data Policy, Incident Response Policy, Network Security Policy, and Wireless Network and Guest Access Policy are discussed. The security strategies involve redesigning the current network, overhauling the IP addressing scheme, and ensuring high availability. The existing IT infrastructure, including switches, addressing schemes, and network management software, is detailed along with mitigating strategies such as firewalls and antiviruses. The report also covers security technology implementation, including the use of a Higher Performance Computing Cluster, web services, online teaching programs, and data backup and recovery technologies. Finally, it outlines the security testing process, encompassing security architecture study, threat modeling, test planning, and test case execution, concluding that the network security plan plays a crucial role in mitigating network issues at the university. Desklib provides resources to students, visit for more solved assignments and past papers.
Document Page
Network
Security
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Introduction
Network security plan is a plan that helps in creating an
awareness in the organization related to the netwoek
security issues.
Document Page
Scope of the plan
The scope of the plan is to mitigate all the identified
network security issues in the organization.
Document Page
Current risks
Problems in consistency, performance and reliability
No BYOD and WAT policies
Cyber-Attacks
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Network security policies
Acceptable Use
Policy
Confidential
Data Policy
Incident
Response
Policy
Network
Security Policy
Wireless
Network and
Guest Access
Policy
Document Page
Security Strategies
Redesign the current network including provision for
wireless services
Overhaul the IP addressing scheme
Provide a network that is available approximately 99.9
percent of the time and offers an MTBF (mean-time-
between-failure) of 6000 hours and an MTTR (mean-
time-to- repair) of less than 90 minutes
Document Page
WAN
A wide area network (WAN) is a telecommunications
network or computer network that extends over a large
geographical distance.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
IT Infrastructure
A high-end switch in each building is connected to a high-end Campus core switch in
the campus backbone
Within each building, 24-port Ethernet switches on each floor connect end user
systems.
Floor switches are connected to the high-end building switch.
The 100Base-TX switches are layer-2 switches running the IEEE 802.1D Spanning
Tree Protocol.
All devices are part of the same broadcast domain. All devices (except public servers)
are part of the 192.168.0.0 internal network
Addressing for end-user hosts is accomplished with DHCP. A Windows server in the
cluster located in the Operations facility acts as the DHCP server.
A Windows-based network management software package monitors the switches
using SNMP and RMON. The software runs on a server in the cluster located in the
Operations Centre.
Document Page
Mitigating strategies
Firewalls
Antiviruses
VPN
Document Page
Security technology
implementation
Higher Performance Computing Cluster located
in the Operations building. This system is part
of the nation’s scientific research program.
Use of web browsers to access information,
participate in chat rooms, and other typical
Web services.
On-campus students use the network to write
assignments and other documents. Computer
Science academics and students use the
network to develop code. They can save their
work to file servers in the campus servers and
print their tasks on printers within the campus
and other buildings.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Contd..
All faculties have online teaching programs that require
video streaming via Blackboard Collaborate.
Human Resource Management and SAP Enterprise
Resource Planning
Online word processor to create and format documents
and work collaboratively.
To access Adobe apps including Photoshop, Illustrator,
InDesign and Premiere Pro.
Document Page
Contd..
Data backup and recovery technology including the
procedures for backup and recovery. Note that there are NASs
at the campuses to back up the data generated locally,
however the vast majority of data is backed up to the File
Servers in each campus and ultimately to the Operations
facility through the WAN.
A proper authentication system that takes care of highly
secured roles and permissions to access, share, download,
upload files and folders.
Services like File, Web (and secure Web), Mail (and secure Mail
including spam email prevention), DHCP, DNS, Domain
Controllers.
Document Page
Security Testing
Security testing is a process that
is performed with the intention
of revealing flaws in security
mechanisms and finding the
vulnerabilities or weaknesses of
software applications.
Security Architecture Study
Security Architecture Analysis
Threat Modelling
Test Planning
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Contd..
Traceability Matrix Preparation
Security Testing Tool identification
Test Case Preparation
Test Case Execution
Reports
Document Page
Conclusion
IT can be concluded that the network security plan has
been playing an important role in the mitifating network
issues in the university.
chevron_up_icon
1 out of 15
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]