Ask a question from expert

Ask now

Technology Implementation of Security Controls for FNU's Online Learning Network

36 Pages1961 Words312 Views
   

Added on  2019-09-20

About This Document

FNU is a higher educational organization providing online courses and requires a high-performance network infrastructure to provide quality services to end-users. This article discusses the network requirements and the implementation of security controls, including centralized authentication, authorization, cryptography, device fingerprinting, and malware defenses.

Technology Implementation of Security Controls for FNU's Online Learning Network

   Added on 2019-09-20

BookmarkShareRelated Documents
Technology Implementation of Security ControlsOverviewFNU is a higher educational organization for long distance learning. This is the firsteducational organization providing online courses in the country. The university runs onlinetraining and courses; it requires a network infrastructure of very high performance to provideQuality of Services to the end users.Network Requirements:1.Improvements with issues in online assignment submissions.2.Implementation of bring your own device policy by adhering wireless network in thecampus. This enables the students to work on their own laptops, tablets, notebooks andsmartphones. 3.With WAT it will allow users (students and staff members) to access network facilitiesfrom their homes. 4.Security measures must be taken to safeguard data from the hackers.5.Providing Quality of Services to the network users both at on-campus and off-campus.The university provides off-campus distance learning and hence must be available at any time forits distance learners. Moreover, it requires the student’s on-campus to submit their assignmentsonline; hence availability of network is very important at that part as well.FNU must also provide Bring Your Own Device and Work AT Home policies in the network formore usability in the network. These policies are highly needed at the university since it isaffecting the usability of the network. Once more and more personal devices can be connected tothe network, it will affect in overall students learning process.FNU needs to implement a secure wireless network which safeguards student’s login credentials,files, and other important assets. Moreover, it may restrict the intruder getting into the networkby facilitating strict security measures. Authentication will also need once BYOD and WATpolicies discussed above are implemented in the network to filter illegal activities. The othersecurity measures should also be taken to protect important files in the server.
Technology Implementation of Security Controls for FNU's Online Learning Network_1
Security Controls for Wireless Network:1.Centralized Authentication2.Authorization3.Cryptography4.Device Fingerprinting5.Malware DefencesCentralized AuthenticationObjectiveBeing a large network, FNU needs to employ authentication schemes to make the network secureand protect it from outside users. The centralized authentication is required since students andstaff may log in from their devices also and in that case, logging in every time for differentdevices will create an extra overhead. Hence, centralized authentication should be employed inthe system. There are different protocols for authentication; the one that will be used for FNU’snetwork is a LDAP Protocol. Lightweight Directory Access Protocol (LDAP) is a directoryserver that allows grouping of users in the network and assigns different authorities to them. Thedirectory server, LDAP stores username, full names, telephone numbers and email addresses ofthe users.Resources UsedMinimum hardware requirements:Processor: Quad core 2GHz.10GB Space for database6GB RAMMinimum Software Requirements:Windows OS 7 or aboveWindows Server 2012 R2SSL/TLS libraries
Technology Implementation of Security Controls for FNU's Online Learning Network_2
Developing the control Description of the SystemSoftware:Language: Java 7Platform: NetBeans 7.4Hardware:OS: Windows 8RAM: 4GBHDD: 500GBProcessor: Intel i5
Technology Implementation of Security Controls for FNU's Online Learning Network_3
Block DiagramConfiguration of the systemConfiguration guide for setting up LDAP on SSLThe complete steps are divided into 2 major sections:1.Make a Virtual Windows Server in Azure2.Setup LDAP on SSL1.Make a Virtual Windows Server in AzureAdd AD LDS in Virtual Machine ldapstestClick on Start --> Server Manager --> Add Roles and Features. Click Next.
Technology Implementation of Security Controls for FNU's Online Learning Network_4
Technology Implementation of Security Controls for FNU's Online Learning Network_5
Technology Implementation of Security Controls for FNU's Online Learning Network_6
2.Setup LDAPS (LDAP over SSL)
Technology Implementation of Security Controls for FNU's Online Learning Network_7
Technology Implementation of Security Controls for FNU's Online Learning Network_8

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Technology Implementation of Security Controls for FNU's Online Learning Network
|20
|762
|412

Technology Implementation of Security Controls : Assignment
|36
|1961
|258

Network Security Plan for Mitigating Identified Issues in a University
|15
|679
|496

Network Redesign for FNU
|20
|8038
|110

Network Redesign for FNU
|6
|2800
|359

Higher Educational Organization for Long Distance Learning | FNU
|9
|4373
|365