Network Security Project - Security Technology Controls and Strategies
Added on 2023-06-11
9 Pages797 Words371 Views
NETWORK SECURITY PROJECT-SECURITY TECHNOLOGY
Table of Contents
1 Introduction..............................................................................................................................3
2 Controls....................................................................................................................................3
2.1 Objective of Control..........................................................................................................3
2.2 Resources Used.................................................................................................................3
2.3 Developing the Control.....................................................................................................4
2.4 System Description...........................................................................................................4
2.5 Block Diagram..................................................................................................................4
2.6 System Configuration.......................................................................................................5
2.7 Test plan............................................................................................................................7
3 Conclusion................................................................................................................................8
References........................................................................................................................................9
2
1 Introduction..............................................................................................................................3
2 Controls....................................................................................................................................3
2.1 Objective of Control..........................................................................................................3
2.2 Resources Used.................................................................................................................3
2.3 Developing the Control.....................................................................................................4
2.4 System Description...........................................................................................................4
2.5 Block Diagram..................................................................................................................4
2.6 System Configuration.......................................................................................................5
2.7 Test plan............................................................................................................................7
3 Conclusion................................................................................................................................8
References........................................................................................................................................9
2
1 Introduction
This project is implemented the security technology controls and its strategies to provide
the effective security plan for an organization. The organization uses the network security plan
and it does not provide the security. So, the organization is decided to upgrade the security plan
to provide the high security and reliability for an organization. The proposed network security
plan uses the firewall control to provide the effective security for an organization. Here, we will
analysis the firewall controls and it strategies and implementation. These are needs to be
discussed in detail.
2 Controls
The organization proposed security plan use the firewall controls. The firewall is most
popular security tool and it used to provide the high security for an organization. The medium
sized organizations are mostly use the firewall controls to secure an organization.
2.1 Objective of Control
The firewall control is used to provide the network security and it designed to protect the
usability and integrity of the organization data and its networks. The firewall also effectively
manages the network access to provide the secure network for an organization. It targets variety
of threats from spreading and entering on the network. The firewall controls is used to implement
the security control and policies. It put up a barrier between the trusted internal network and un-
trusted outside network such as internet. It defines the rules to allow or block the network traffic.
The Cisco firewall is used to provide the unified threat management devices and thread focused
next generation firewalls.
2.2 Resources Used
The firewall control resources are listed below.
Routers
Switches
Proxy Server
TCP and UDP ports
Intrusion Detection System
Internet connection sharing and gateway
3
This project is implemented the security technology controls and its strategies to provide
the effective security plan for an organization. The organization uses the network security plan
and it does not provide the security. So, the organization is decided to upgrade the security plan
to provide the high security and reliability for an organization. The proposed network security
plan uses the firewall control to provide the effective security for an organization. Here, we will
analysis the firewall controls and it strategies and implementation. These are needs to be
discussed in detail.
2 Controls
The organization proposed security plan use the firewall controls. The firewall is most
popular security tool and it used to provide the high security for an organization. The medium
sized organizations are mostly use the firewall controls to secure an organization.
2.1 Objective of Control
The firewall control is used to provide the network security and it designed to protect the
usability and integrity of the organization data and its networks. The firewall also effectively
manages the network access to provide the secure network for an organization. It targets variety
of threats from spreading and entering on the network. The firewall controls is used to implement
the security control and policies. It put up a barrier between the trusted internal network and un-
trusted outside network such as internet. It defines the rules to allow or block the network traffic.
The Cisco firewall is used to provide the unified threat management devices and thread focused
next generation firewalls.
2.2 Resources Used
The firewall control resources are listed below.
Routers
Switches
Proxy Server
TCP and UDP ports
Intrusion Detection System
Internet connection sharing and gateway
3
End of preview
Want to access all the pages? Upload your documents or become a member.
Related Documents
Firewallslg...
|17
|1394
|368
IT Network Securitylg...
|68
|3007
|50
Software and Hardware Firewallslg...
|7
|757
|156
Network Securitylg...
|17
|3645
|241
Firewall Network Security System PDFlg...
|5
|1247
|61
Security Presentation and Guidebook - IT Securitylg...
|10
|1587
|18