Comprehensive Network Security Plan for CQUniversity

Verified

Added on  2020/04/15

|27
|7506
|360
AI Summary
The report presents a comprehensive network security plan aimed at fortifying the network infrastructure of CQUniversity. It begins by emphasizing the importance of developing stringent security policies to protect network components from unauthorized access, thereby increasing network flexibility. The analysis delves into identifying potential errors and vulnerabilities within the existing network system. Furthermore, it outlines the necessity for improvement areas that would ensure network uptime and robust security measures against cyber threats. To address these challenges, the report documents various networking policies that could be implemented to enhance security. An integral part of this strategy is recognizing the associated risks in the development project and crafting a risk mitigation plan to eliminate or reduce them. The study concludes by asserting that with proper identification of vulnerabilities and formulation of appropriate security measures, the network can be safeguarded effectively against unauthorized access while maintaining operational flexibility.
Document Page
Network Security Plan
Introduction
For the development of the network security plan an analysis is made on the current network
infrastructure of the First national university and the security measures that can be
imploemneted in the design is analyzed. The network security plan is important because it
enables to identify the different areas of risk associated with the network and configure the
network accordingly such that it meets all the requirement of the user. The network of the
camous is expanded over 10 metropoliton cities and 5 different regions. A wide area network
design should be created for covering the different parts of the campus. The user connected in
the network should be able to communicate with each other using the network. VPN, Firewall
and other security hardware or software can be used by the organization for increasing the
security of the University network solution. The servers must be configured with active
directory such that separate user account is needed for accessing the core resources of the
server installed in the network. The server must be secured against illegal access and it is
recommended to create a DMZ zone for installing the servers and secure it from physical
access. The slection of the security technology is important for increasing the security of the
network and elimination of the different vulnerabilities related with the dveelopment of the
First national university network infrastructure.
Scope
The development of the network solution would help First National university to open new
opportunities and develop the network frameework for aligning the curret buisness needs of
the organization. The scopes of the network security project are given below:
*Networks and Information Security Case study - Copyright © Edilson Arenas - CQUniversity
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
The facilities provided to the student and the staffs can be manage from a central
point with the development of the network infrastructure and increase the efficiency
of the network communication for the development of the network security.
Different innovative technologies can be applied in the network such that the different
activities of the network can be managed efficiently and the business process of the
organization can be re aligned for redesigning the network security and develop the
network security plan.
Different project activities can be included such that it helps in systematic
development of the network infrastructure and develop the security policy for
securing the network elements. For the successful implementation of the network
security it is important to develop a network security policy and analyse the future
needs for the users connected in the network.
*Networks and Information Security Case study - Copyright © Edilson Arenas - CQUniversity
Document Page
Objectives
The network development project for the First National University is designed for the
imporvement of the security and efficiency of the current networo design of the university.
The following are the objectives identified for the development of the network framework
and the secuirty needs in the network redesign for improvement of the facilities of the
network.
To make the servers and the network available for the users 24 * 7 such that the user
does not feels any lag while using the university network solution.
To design the network according to the floor plan of the building of the university and
divide the network into different subnets such that it can be used for the creation of
different VLAN and make the management of the network easier.
To create a network security policy for the network the business rules of the
university should be analysed and the rules should be aligned with the security policy
for improvement of the security of the network.
To implement the network security policy for the development of the report it is
important to identify the requirement of the project and develop the project according
to the needs of the users.
To configure the network devices according to the requirement and develop user
group policy for the management of the network solution secure the servers from
illegal access.
*Networks and Information Security Case study - Copyright © Edilson Arenas - CQUniversity
Document Page
Assumptions
.....Different types of assumptions are made for the development of the security framework of
the network solution and they can be grouped into two types such as design assumptiona nd
the security assumption. The assumption helps in eliminating the barriers faced during the
development of the network project and divide the network assets for taking input from the
same level and take effective decision for the improvement of the competition policy. The
priorities and the responsibility of the project are also assumed regardless of the expected
outcomes from the network design plan and the enterprise network should be created
considering the innovation, quality and the creativity of the network solution. The risk
associated with the network should be shared with the different personnel such that the
network is designed according to the needs and the security of the network is retained.
Assumption for creation of the network design – For the development of the network design
it is assumed that the network development team have the sufficient knowledge about the
requirement of the users connected with the First national University Network. A prototype
of the network design should be created in any simulator software such that it can be
confirmed with the stakeholders associated with the development of the project.
Assumptions for the development of the network security plan – The network security
device, hardware and software that is essential for increasing the security of the network
should be identified and it is assumed that is the security device can counter measure the
different threats acting on the network. It is also assumed that the development team is able to
configure the firewall and the other security device used for securing the network and would
not face any difficulty while configuring the network security. The external factors like price,
legal factors would not hamper the current needs of the network and the network security
plan would meet all the objectives of the First national University.
*Networks and Information Security Case study - Copyright © Edilson Arenas - CQUniversity
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Risk Analysis
For the development of the network solution the risk is needed to be identified and it is
important to identify the security assets and the other network equipment that are vulnerable
to the network and should be secured from illegal access. The assets of the First national
university are divided into Physical and Non Physical assets and the different risk acting on it
are identified for the development of a secure network solution.
Asset Identification and Assessment
Physical Assets –
The main elements that falls on the category of physical assets are the different network
hardware devices that are needed to be deployed in different areas of the network for
enabling communication with the main campus, regional campus and the other department of
the university. There are different network devices such as 2000 PCs, headsets, webcams, 20
networked Laser Printers, 50 computer labs with 1200 Desktop PCs and 50 printers, VoIP
video phones for the main campus. For the metropolitan and the regional campus there are
250 Desktop PCs, 4 networked Laser Printers, 10 computer labs with 240 PCs and 10
printers. For the operation and the backup site there are 250 servers, 4 networked Laser
Printers, 10 computer labs with 240 PCs and 10 printers.
Non-Physical Assets –
The non-physical assets for the first national university consists of the operating system used
in the desktops and the servers of the university network and they are mainly Ubuntu,
Windows 10, Windows 7 and Windows Server 2012 R2. Network drive is also attached with
the university network that is used for backing up the local data into the cloud servers and
increase the redundancy of the data and create a recovery mechanism for the development of
the network solution. The routers (“Cisco 2811 Integrated Services Router”), Switches
*Networks and Information Security Case study - Copyright © Edilson Arenas - CQUniversity
Document Page
(“Cisco Catalyst 2960 Series Switches”) are used for the development of the local area
network of the different areas of the university. There are different software installed in the
servers such as network traffic analyser, file storage solution, antivirus that are also
considered as the non-physical assets. Load balancer can also be used for increasing the
security of the network and reducing the load on the physical server for getting the maximum
throughput from it.
Risks
Individual Asset Risk Analysis
The individual resource chance examination depends on the advancement of the compelling
danger appraisal for the system association activities of FNU. The individual hazard
investigation would be based for the arrangement of the exercises supporting the recognizable
proof of the hazard factors. The different hazard elements would be broke down in light of
the ramifications of the compelling advancement of the system plan and utilizing system
observing devices for shaping the major glitches in the system. The plausible hazard factors
for the system association arrangement at FNU are introduction of the key college
applications and administrations to outer people because of the cloud sending, wrong access
and utilization of assets, unapproved and malignant inner and outside system assaults, and
system excess. Every one of these issues would bring about framing the significant issues for
the execution of the system association for the FNU. The issues would bring about framing
the immediate and backhanded effect on the physical and nonphysical resources of FNU. The
hazard factor would frame the issues in administration of the correspondence for the FNU
and it would bring about shaping the real issues for the administration of the different areas
on a solitary system association.
Risk Summary
*Networks and Information Security Case study - Copyright © Edilson Arenas - CQUniversity
Document Page
The plausible dangers of the system execution are presentation of the key college applications
and administrations to outer people because of the cloud organization, improper access and
utilization of assets, unapproved and noxious inside and outside system assaults, and system
excess. The movement of the key applications and tasks would bring about making the
information and data accessible on the cloud stage that can be gotten to from any area
bringing about probability of information abuse and alteration. The likelihood of unapproved
and noxious inward and outside system assaults is another main consideration that would
frame the issue in the advancement of the compelling system. The assaults would bring about
making the framework unfit to work and process the inquiry. The assaults make the system
moderate and slow, as well as structures the issues of information capture attempt and phony.
Anybody would have the capacity to change the current information framing the issues in the
arrangement of the tasks for FNU. The DDoS assaults is a case for the assault on the system
that would bring about hurting the tasks of the exercises. System excess is identified with the
activity issues in the system that can be caused from think and incidental reasons.
Threats, Challenges and Vulnerabilities
Threats
There are different threats associated with the development of the network project and it
should be eliminated for the development of the network framework for the organization. The
source of the threat is important to be identified such that it can be blocked for mitigation of
the threats and increasing the security of the network. The threats acting on the security of the
network infrastructure of the First national university can be divided into external, internal,
structured and unstructured threats. The external threats are the threats that are acting on the
network from external agents such as unauthorised users that can compromise the security of
the university data.
*Networks and Information Security Case study - Copyright © Edilson Arenas - CQUniversity
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
The threats in network connection can result in forming the issues in the deployment of the
network from external factors. The threats in network can be divided into four variants
namely external threat, internal threat, structured threat, and unstructured threat. The
unstructured threats to the network would include the inexperienced individuals using
password crackers and shell scripts. These two can be used for hacking into the easily
decrypted password protection and extract information. The structured threats involve the
inclusion of the threat of exploitation of the scripts and codes forming the major influence in
the development of the activities. The advanced hackers and cyber criminals would include
the use of advanced hacking methods for forming the major influence in the application
development. The external attacks would result in making the system unable to work and
process the query. The attacks not only make the network slow and sluggish, but it also forms
the issues of data interception and forgery. Anyone would be able to change the existing data
forming the issues in the alignment of the operations for FNU. The DDoS attacks is an
example for the attack on the network that would result in harming the operations of the
activities. The internal attacks are the person specific attacks caused by the person working in
the network gaining the authentication. The individuals might extract the information from
the network by gaining the access to the network and use it for personal use.
Challenges
The difficulties of the system are the different issues that would be created for the
organization of the system association. The usage had been confronting the issue of complex
ICT framework, huge fatigue of the assets, and the security issues. The likely hazard factors
for the system association organization at FNU are introduction of the key college
applications and administrations to outer people because of the cloud arrangement, wrong
access and utilization of assets, unapproved and vindictive inner and outside system assaults,
and system repetition. Every one of these issues would bring about shaping the significant
*Networks and Information Security Case study - Copyright © Edilson Arenas - CQUniversity
Document Page
issues for the execution of the system association for the FNU. The significant difficulties of
the task are Password assaults, Trust misuse, Port redirection, Man-in-the-center assaults,
Social designing, and Phishing.
Vulnerabilities
The vulnerabilities in the system association can be distinguished as the particular
'weaknesses' or interior shortcomings that can bring about the event of the system hazard
event. There are numerous reasons because of which the system issues can be raised and it
incorporates the likely factors of the plan or execution mistakes of FNU. The mechanical
vulnerabilities that may affect the system advancement security capacities are working
framework shortcomings, TCP/IP convention shortcomings, and system gear shortcomings.
The design that may affect the system improvement security capacities are utilization of
simple passwords that can be deciphered effortlessly, Unsecured client accounts, unsecured
default settings, and misconfigured web administrations. The security arrangement
shortcomings that may affect the system advancement security capacities are absence of
security strategy, absence of congruity, governmental issues, and absence of legitimate access
controls. These are the significant vulnerabilities order and vulnerabilities that can frame the
effect on the advancement of the system association for the FNU. The likelihood of
unapproved and pernicious inward and outer system assaults is another central point that
would shape the issue in the improvement of the powerful system.
Security Policies
Acceptable Use Policies
Email and Communications Policy
FNU First National University requires an email and communication policy for the
development of the network infrastructure and enabling secure communication within the
*Networks and Information Security Case study - Copyright © Edilson Arenas - CQUniversity
Document Page
students and the staffs of the university. The new request coming from the different users and
should be managed and certificated should be used for verification of the authenticity of the
messages send and received for the different users connected in the network. The email
server should be configured with the user name and password such that it can be used for
sending and receiving emails between the different users. All the emails and the messages
should be transferred via the firewall connected in the network from securing the network
from spa emails and other vulnerable emails from the external email servers.
Internet and Network Access Policy
The access of the internet should not be allowed for the students connected in the labs
because it can increase the vulnerability of the lab computers. The users must be grouped by
configuring the windows servers’ active directory policy. The remote users i.e. the students
enrolled with the distance education learning program should be connected using a VPN link
via the radius server configured for the management of the activity of the remote users. The
access of the file server installed in the network should be restricted for most of the users
such that at the sensitive files of the university such as student records, staff records and the
other organizational data are kept secured.
Workstation Policy
The workstations deployed in the different areas of the network must be secured with the
application of the password management policy. The administrative functionality should not
be available for the normal users such that the user cannot install or remove any application
for performing mischievous activity on the workstation. Moreover the workstation should be
installed with antivirus such that it can be protected from spam emails and virus coming from
different sources. The work station should also be configured with DHCP connection such
*Networks and Information Security Case study - Copyright © Edilson Arenas - CQUniversity
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
that it can automatically receive the IP address from the DHCP server installed in the network
and enabling transfer of data packet in the network.
Network Security Policies
Antivirus Policy
The approach can be considered as an inside IT strategy which straightforwardly
characterizes the counter infection arrangement which is put on each PC which
fundamentally incorporate how regularly the sweep of the infection is done, what program
will be utilized as a part of the area of the discovery, expel of the malware program and
avoidance. The idea can be specifically identified with the part of what program would be
obstruct at the server and what kind of hostile to infection program would be keep running on
the server of the mail. It can be expressed that it can likewise be utilized to get an
unmistakable thought of the idea of what hostile to infection program will be open and keep
running on the server of the mail. The principle action which assume an exceptionally
fundamental part is the check of the records and what documents would be gotten to and what
are the courses by which the avoidance of the spread of the malware. The association in the
idea of the counter infection would utilize a specific against infection and the base necessity
identified with the counter infection are expressed beneath:
The library meaning of the antivirus ought to be refreshed no less than ones every
day.
The item which is identified with the antivirus ought to be worked in an ongoing way
on all the customer server and customer framework.
The idea which ought to be connected to the angle is the continuous security.
The check which is identified with the antivirus ought to be completed ones every
week and the principle thought which is contemplated would be founded on the part
of the server and the workstation.
*Networks and Information Security Case study - Copyright © Edilson Arenas - CQUniversity
Document Page
DMZ Policy
The fundamental strategy which is identified with the DMZ can be expressed as following:
The hardware must be reported in the organization venture wide administration
framework. At the very least the accompanying angles ought to be thought about. The
primary purpose of accentuations would be on the area of area and host contacts, working
framework and equipment adaptation, fundamental capacity and the identifying with it the
application and the secret word which is identified with the advantaged gathering of
individuals.
The interface which is identified with the system ought to have a fitting Domain
Name server (DNS).
The gatherings of the secret key ought to be kept up utilizing the idea of the corporate
wide watchword procedure of administration framework.
The changes which is identified with the part of the gear and the arrangement might
be identified with the new hardware and must take after a change administration strategies
and forms and the part of the corporate tutor.
Extranet Policy
All the new availability which is identified with the extranet ought to be gone through a
security audit which is connected with the data security division. The principle perspective
which is identified with the looking into is predominantly to guarantee that the coordinating
of the prerequisite of the most ideal way or approach of the arrangement is finished. Then
again another idea which ought to be thought about is the slightest access technique ought to
be taken after.
VPN and Remote Access (Work-at-home) Security Policy
*Networks and Information Security Case study - Copyright © Edilson Arenas - CQUniversity
chevron_up_icon
1 out of 27
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]