Technology Implementation of Security Controls Template*.

Added on -2019-09-20

| 2 pages
| 687 words
| 635 views

Trusted by 2+ million users,
1000+ happy students everyday

Showing pages 1 to 1 of 2 pages

Technology Implementation of Security Controls Template*Note: Your technology implementation follows up the strategies and controls you recommended in your network security plan. This template provides guidance on how to document the implementation of the proposed controls.Overview (one page)Make a brief reference to the controls you proposed in the network security plan (please refer to the Security Strategies and Recommended Controls section of the Network Security Plan). For this technology implementation, you are required to document, implement, and test at least five (5) controls (as shown below).[Control 1] (No word limit)Objective of ControlDescribe in which ways this control is to meet the organisation’s security needs. This is a follow up of your analysis conducted in planning the security. For example, let’s assume you recommended to use a RADIUS server. In this case, you may say that the purpose of this server is for users to be securely authenticated when accessing the wireless network of the organisation. Resources UsedDescribe the hardware and software resources you recommend implementing this control. In the RADIUS example, you should provide the complete technical specifications of the software and hardware; the type of RADIUS implemented; protocols (WPA, AES, PEAP, etc.); database to store user accounts; type of storage system; server operation system; and web interfaces to manage the server, database, monitoring, accounting, and reporting. Developing the control [proof of concept]This will be a proof of concept only of your recommended control using free open source software and your computer. In a real-world project, you will be using commercial hardware and software.Description of the SystemTechnical specifications of the open source software and your computer used to implement this control.Block DiagramAttach a block diagram to illustrate the proof of concept. For example, if you were to implement the RADIUS server above, then draw a logical diagram showing the following: 1.Wireless router.2. Range of IP address and subnets.*Networks and Information Security Case study - Copyright © Edilson Arenas - CQUniversity

Found this document preview useful?

You are reading a preview
Upload your documents to download
or
Become a Desklib member to get accesss

Students who viewed this