Technology Implementation of Security Controls.

Added on - 20 Sep 2019

  • 36

    pages

  • 1961

    Words

  • 147

    Views

  • 0

    Downloads

Showing pages 1 to 8 of 36 pages
Technology Implementation of Security ControlsOverviewFNU is a higher educational organization for long distance learning. This is the firsteducational organization providing online courses in the country. The university runs onlinetraining and courses; it requires a network infrastructure of very high performance to provideQuality of Services to the end users.Network Requirements:1.Improvements with issues in online assignment submissions.2.Implementation of bring your own device policy by adhering wireless network in thecampus. This enables the students to work on their own laptops, tablets, notebooks andsmartphones.3.With WAT it will allow users (students and staff members) to access network facilitiesfrom their homes.4.Security measures must be taken to safeguard data from the hackers.5.Providing Quality of Services to the network users both at on-campus and off-campus.The university provides off-campus distance learning and hence must be available at any time forits distance learners. Moreover, it requires the student’s on-campus to submit their assignmentsonline; hence availability of network is very important at that part as well.FNU must also provide Bring Your Own Device and Work AT Home policies in the network formore usability in the network. These policies are highly needed at the university since it isaffecting the usability of the network. Once more and more personal devices can be connected tothe network, it will affect in overall students learning process.FNU needs to implement a secure wireless network which safeguards student’s login credentials,files, and other important assets. Moreover, it may restrict the intruder getting into the networkby facilitating strict security measures. Authentication will also need once BYOD and WATpolicies discussed above are implemented in the network to filter illegal activities. The othersecurity measures should also be taken to protect important files in the server.
Security Controls for Wireless Network:1.Centralized Authentication2.Authorization3.Cryptography4.Device Fingerprinting5.Malware DefencesCentralized AuthenticationObjectiveBeing a large network, FNU needs to employ authentication schemes to make the network secureand protect it from outside users. The centralized authentication is required since students andstaff may log in from their devices also and in that case, logging in every time for differentdevices will create an extra overhead. Hence, centralized authentication should be employed inthe system. There are different protocols for authentication; the one that will be used for FNU’snetwork is a LDAP Protocol. Lightweight Directory Access Protocol (LDAP) is a directoryserver that allows grouping of users in the network and assigns different authorities to them. Thedirectory server, LDAP stores username, full names, telephone numbers and email addresses ofthe users.Resources UsedMinimum hardware requirements:Processor: Quad core 2GHz.10GB Space for database6GB RAMMinimum Software Requirements:Windows OS 7 or aboveWindows Server 2012 R2SSL/TLS libraries
Developing the controlDescription of the SystemSoftware:Language: Java 7Platform: NetBeans 7.4Hardware:OS: Windows 8RAM: 4GBHDD: 500GBProcessor: Intel i5
Block DiagramConfiguration of the systemConfiguration guide for setting upLDAPon SSLThe complete steps are divided into 2 major sections:1.Make a Virtual Windows Server in Azure2.Setup LDAP on SSL1.Make a Virtual Windows Server in AzureAdd AD LDS in Virtual Machine ldapstestClick on Start --> Server Manager --> Add Roles and Features. Click Next.
2.Setup LDAPS (LDAP over SSL)
desklib-logo
You’re reading a preview
card-image

To View Complete Document

Become a Desklib Library Member.
Subscribe to our plans

Download This Document