Technology Implementation of Security Controls Template*.
Added on - 20 Sep 2019
Technology Implementation ofSecurity Controls Template*Note: Your technology implementation follows up the strategies and controls yourecommended in your network security plan. This template provides guidance on how todocument the implementation of the proposed controls.Overview (one page)Make a brief reference to the controls you proposed in the network security plan (please referto the Security Strategies and Recommended Controls section of the Network Security Plan).For this technology implementation, you are required to document, implement, and test atleast five (5) controls (as shown below).[Control 1] (No word limit)Objective of ControlDescribe in which ways this control is to meet the organisation’s security needs. This is afollow up of your analysis conducted in planning the security. For example, let’s assume yourecommended to use a RADIUS server. In this case, you may say that the purpose of thisserver is for users to be securely authenticated when accessing the wireless network of theorganisation.Resources UsedDescribe the hardware and software resources you recommend implementing this control. Inthe RADIUS example, you should provide the complete technical specifications of thesoftware and hardware; the type of RADIUS implemented; protocols (WPA, AES, PEAP,etc.); database to store user accounts; type of storage system; server operation system; andweb interfaces to manage the server, database, monitoring, accounting, and reporting.Developing the control [proof of concept]This will be a proof of concept only of your recommended control using free open sourcesoftware and your computer. In a real-world project, you will be using commercial hardwareand software.Description of the SystemTechnical specifications of the open source software and your computer used to implementthis control.Block DiagramAttach a block diagram to illustrate the proof of concept. For example, if you were toimplement the RADIUS server above, then draw a logical diagram showing the following:1.Wireless router.2.Range of IP address and subnets.*Networks and Information Security Case study - Copyright © Edilson Arenas - CQUniversity