Advanced Networking - Assignment on STP Limited
Added on 2020-03-02
15 Pages3414 Words41 Views
STP Limited
Networking Project
9/26/2017
Networking Project
9/26/2017
STP Limited: Advanced Networking
Table of Contents
Introduction.....................................................................................................................................................................4
Project Background.........................................................................................................................................................4
Scope of the Project....................................................................................................................................................4
Set of Goals................................................................................................................................................................5
Strategic Alignment....................................................................................................................................................5
Network Security Aspects...............................................................................................................................................6
Security Applications & Services for the Branch Office...........................................................................................7
Securing data..............................................................................................................................................................7
Virtual Private Networks (VPNs)..........................................................................................................................7
Firewall..................................................................................................................................................................7
Attack Protection....................................................................................................................................................7
Advanced Content Filtering...................................................................................................................................8
Security of Mobile Devices........................................................................................................................................8
Fingerprinting.........................................................................................................................................................8
Network Access Controls.......................................................................................................................................8
Authentication........................................................................................................................................................8
Hardware Purchases: Plan and Steps..............................................................................................................................9
Business Continuity........................................................................................................................................................9
Risk Management & Assessment...................................................................................................................................9
Strategy for Risk Management.................................................................................................................................10
Identification of the Risks....................................................................................................................................10
Risk Responsibilities & Roles..............................................................................................................................10
Assessment of the Risks.......................................................................................................................................10
Risk Response Strategy........................................................................................................................................10
Mitigation of the Risks.........................................................................................................................................10
Monitoring and Reporting....................................................................................................................................10
Conclusions...................................................................................................................................................................11
Recommendations.........................................................................................................................................................11
Infrastructure Integration..........................................................................................................................................12
Mobile Population....................................................................................................................................................12
WLAN Usage...........................................................................................................................................................12
References.....................................................................................................................................................................13
2
Table of Contents
Introduction.....................................................................................................................................................................4
Project Background.........................................................................................................................................................4
Scope of the Project....................................................................................................................................................4
Set of Goals................................................................................................................................................................5
Strategic Alignment....................................................................................................................................................5
Network Security Aspects...............................................................................................................................................6
Security Applications & Services for the Branch Office...........................................................................................7
Securing data..............................................................................................................................................................7
Virtual Private Networks (VPNs)..........................................................................................................................7
Firewall..................................................................................................................................................................7
Attack Protection....................................................................................................................................................7
Advanced Content Filtering...................................................................................................................................8
Security of Mobile Devices........................................................................................................................................8
Fingerprinting.........................................................................................................................................................8
Network Access Controls.......................................................................................................................................8
Authentication........................................................................................................................................................8
Hardware Purchases: Plan and Steps..............................................................................................................................9
Business Continuity........................................................................................................................................................9
Risk Management & Assessment...................................................................................................................................9
Strategy for Risk Management.................................................................................................................................10
Identification of the Risks....................................................................................................................................10
Risk Responsibilities & Roles..............................................................................................................................10
Assessment of the Risks.......................................................................................................................................10
Risk Response Strategy........................................................................................................................................10
Mitigation of the Risks.........................................................................................................................................10
Monitoring and Reporting....................................................................................................................................10
Conclusions...................................................................................................................................................................11
Recommendations.........................................................................................................................................................11
Infrastructure Integration..........................................................................................................................................12
Mobile Population....................................................................................................................................................12
WLAN Usage...........................................................................................................................................................12
References.....................................................................................................................................................................13
2
STP Limited: Advanced Networking
3
3
STP Limited: Advanced Networking
Executive Summary
STP Limited is an organization that designs and manufactures cabinets and is based out of
Wollongong. The head office of the company is also located in Wollongong and the company is
growing at a rapid pace with expansion of its services and operations in different regions. STP
Limited is working on the enhancement of its network connections and integrations to allow the
offices at four locations to function as a single unit. The report covers the security aspect of the
organization in terms of network security and network management.
Hardware purchase details and the information on business continuity has also been highlighted
in the report. There is a risk management plan along with a risk management strategy that has
been covered highlighting the different stages of risk management and handling.
4
Executive Summary
STP Limited is an organization that designs and manufactures cabinets and is based out of
Wollongong. The head office of the company is also located in Wollongong and the company is
growing at a rapid pace with expansion of its services and operations in different regions. STP
Limited is working on the enhancement of its network connections and integrations to allow the
offices at four locations to function as a single unit. The report covers the security aspect of the
organization in terms of network security and network management.
Hardware purchase details and the information on business continuity has also been highlighted
in the report. There is a risk management plan along with a risk management strategy that has
been covered highlighting the different stages of risk management and handling.
4
End of preview
Want to access all the pages? Upload your documents or become a member.
Related Documents
Networking Environment and Connectionslg...
|14
|3087
|86
STP Limited Networking Projectlg...
|14
|3493
|86
Network Security Assignment - STP Limitedlg...
|20
|5002
|54
STP Limited STP Limited Networking & Communication Project 10/11/2017 Overviewlg...
|22
|6029
|449
Project Background 2 1.1. Network Management and Security Name of the University Author's note 1.0. Project Background 2 1.1. Project Description 2 1.2. Project Goal 3 2.1. Strategic Alignment of Projlg...
|14
|3452
|119
Network Management and Security PDFlg...
|14
|3727
|51