logo

Technology Implementation of Security Controls Assignment

   

Added on  2020-04-13

24 Pages6349 Words50 Views
Technology Implementation of Security ControlsOverview The following report has been made for forming a network connection among all the branchoffices of First National University (FNU) and the remote locations with requirement for dataaccess including the Campus location. The security considerations are being deployed forforming the list for the alignment of the various technologies supporting the implication of theeffective implementation. The existing network would be modified for aligning with thedeployment model supporting the utilization of the advanced security development. Theuniversity would require the security of their sensitive and crucial data from external infiltration.The utilization of the security functions would help in easing the deployment of the effectivetools for protecting the data. The implication of the tools and operations for security would bealigned with the development of the successive innovation models. The deployment of theactivities for security would require considering the factors of implication of the improveddevelopment of cyber security, physical security, and personal security. The alignment of thesecurity policies would be deployed with the security functions and alignment of the operations.Network Security – Access Control Objective of ControlThe network access control is a function useful for the implication of the effective controlstrategies for the network (Kaur et al. 2014). The network security is deployed for aligning theimplication of the limited access in the system. The access control would be deployed for listingthe implication of the improved operation development levelling the alignment of the activities.The control of the access in the network can be implied by installing IDS or intrusion detectionsystem. The unauthorised users would be prevented from entering the system and protection ofthe system via tools would be achievable. Resources UsedThe resources required for the execution of the security implication are router, radius server,firewall, radius client, and security protocols. The hardware and software consideration for the

project would be limited with the development of the effective utilization of the software andhardware requirements as mentioned in the table below,HardwareSoftwareRAM for the computer system (4GBpreferable)CPU with 2 or more cores Hardware for Wi-Fi with WPA support Windows Server 2012 R2Server Certificate Developing the control The IP address is defined by the configuration of the network devices and the implementation ofan access list. The access list would allow the development of the effective control for theinformation (Curiac 2016). The IP address and host name would be entered for allowing theaccess in the network. The other types of control would result in forming the problems for thedeployment of the network access in the system. The implication of the firewall security wouldassist in forming the implication of the activities forming control of the data packets. Thelimitation of the network devices would allow the alignment of the activities forming theimplication of the improved operation development. The following reasons are considered forthe deployment of the network security,Security plan would be used for protecting the hosts and the internal network of the FNUReducing the probability of the occurrence of the network infiltration via the cloud baseddue to the alignment of wireless accessData stored in the network is crucial for the alignment of the operations for FNU as verysensitive and crucial information is stored in the cloud networkDenial of Service DoS attack is a major network flaw that is used by the hackers and theFNU must use stern protection against this type of attackThe attack on internal data would be required for being prevented due to the probabilityof misusing the data and illegal access in the system

The network of the FNU can be improved with the alignment of the security via application ofthe level gateway, packet filtering options, and circuit level gateway. These functions can bealigned with the network for ensuring the implication of the activities favouring the networksecurity.Description of the SystemThe packet filtering firewall would be aligned for the development of the network security andthe deployment of the effective implication of the network security. The router connection withthe internal network connection would be deployed for the implication of the effectiveimplication of the packet filtering firewall (Booth and Andersson 2015). The inspection of thedata packets would be assisted by the process of inspection. The source, IP address, port number,and protocol are used for deployment of network blocking and accessing for the network for theFNU. The allowance of the data packets or its blocking would be deployed based on the TCPSYN, ACK bits, and ICMP message. The criteria of selection and the action field are the rulesfor the data packet filtering used, Selection Criteria: The selection criteria would be deployed for the utilization of the effectiveimplication and development models. Action Field: The action field is deployed for the executing the points identified in the selectioncriteria. The application of the packet data filtering is deployed for ensuring that the operations wouldform the utilization of the access control list. The traffic is passed through the firewall after thesecuritization with the access control list is done for checking the permission or denial ofpermission.

Block DiagramThe diagram shows that the data connection to the device would be dependent on the accesscontrol list. The access request would be passed through the firewall of the network for gainingaccess to information. The passing through the firewall would be dependent on the implication ofthe effective utilization of the operations for forming the alignment of the data pass. The logicaldiagram for the network security via implication model would be implied for the alignment ofthe successive alignment of the activities.The logical diagram would be formed for listing the alignment of the effective network diagramfor the allocation of the successive development model. The devices used for the creation of thenetwork diagram are, Cisco 2811 routerRadius ServerRadius Client UserDatabase

Configuration of the systemThe devices would be connected via the use of the proper cabling method and it would align withthe development of the effective implication model for listing the development of the successfulintegration model. The device interface would be supported for the alignment of the IP addressscheming and the alignment of the activities for listing the utilization of the firewallconfiguration. Configuration of access list Configuration of the activitiesApplication of the access list and the alignment of the activitiesThe firewall can be configured with the implementation of the following command:Router(config)# access-list 105 permit ip 10.1.1.0 0.0.0.255 192.168.0.0 0.0.255.255Router(config)# For the inspection of the firewall rules the following command should be used Router(config)# ip inspect name firewall tcp

Router(config)#For the application of the access list and the rules of inspection of the network interface thefollowing command should be used:Router_Firewall(config)# interface g 0/1Router_Firewall(config-if)# Router_Firewall(config-if)# ip access-group 103 inRouter_Firewall(config-if)#Router_Firewall(config-if)# exitRouter_Firewall(config)#Test Plan DesignThe test plan would be aligned for the utilization of the activities and deploying effectivealignment of the operations favouring the implication of the improved functional development.The alignment would be formed for listing the alignment of the successive development model.The remote connection would be supported for the formation of the interface development (Obioand Mutale 2015). The listing of the operations would be aligned for forming the deployment ofthe activities for network security. The test case would be used for defining the number of stepsfavourable for the deployment of the effective operation development. Test Plan ImplementationThe enlisting of the activities would be supported for the formation of the improved operationdevelopment. The alignment would be formed for developing the integration of the operationsfor listing the development. The test plan would be aligned for the scheduling of the activitiesand it would be assisted by the allowance of the design material. The remote host would beformed for aligning the development of the successive integration model.Test Results and AnalysisThe alignment of the activities had formed for verification of the effective utilization of theactivities favouring the implication of the test process execution. The results for the adjusting of

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
IT Network Security
|68
|3007
|50

Assignment IT Network Designing
|10
|2046
|84

Technology Implementation of Security Controls Template
|2
|687
|278

Technology Implementation of Security Controls
|4
|787
|192

Network and System Administration
|16
|2669
|255

Network Security
|17
|3645
|241