Comprehensive Network Redesign and Security Project for FNU Univ.

Verified

Added on  2023/06/13

|103
|21907
|91
Project
AI Summary
This project comprehensively addresses the network and information security needs of the First National University (FNU). It includes a detailed network redesign plan, focusing on scalability, availability, and security, driven by the university's business goals of improved student and faculty efficiency, remote access capabilities, and robust security measures. The project outlines the identification of organizational needs and constraints, logical and physical network redesign, and specific protocols and quality of service requirements. Furthermore, it presents a network security plan encompassing risk analysis, security policies (including acceptable use, email, internet, workstation, wireless, and network-specific policies), disaster recovery and business continuity strategies, and recommended security controls to mitigate identified risks. Finally, the project delves into the technology implementation of security controls, detailing access control mechanisms, DMZ zone implementation, RADIUS server configuration, and the deployment of intrusion prevention and detection systems (IPS/IDS), alongside backup and recovery technologies and penetration testing methodologies.
Document Page
Running head: PROJECT ON NETWORK AND INFORMATION SECURITY
Project on Network and Information Security
Name of the Student
Name of the University
Author’s Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1
PROJECT ON NETWORK AND INFORMATION SECURITY
Table of Contents
Chapter 1 - Network Redesign........................................................................................................5
Overview....................................................................................................................5
Identify Organisation’s Needs and Constraints..........................................................7
Protocols and Quality of Service Requirements......................................................22
Logical Network Redesign.......................................................................................25
Physical Network Redesign.....................................................................................33
Conclusion................................................................................................................36
Chapter 2 - Network Security Plan................................................................................................38
Introduction....................................................................................................................................38
Scope..............................................................................................................................................38
Objectives......................................................................................................................................39
Assumptions..................................................................................................................................40
Risk Analysis.................................................................................................................................40
Security Policies............................................................................................................................54
Acceptable Use Policies...........................................................................................54
Email and Communications Policy..........................................................................54
Internet and Network Access Policy........................................................................54
Workstation Policy...................................................................................................55
Wireless and BYOD Policy.....................................................................................55
Network Security Policies........................................................................................55
Antivirus Policy.......................................................................................................55
DMZ Policy.............................................................................................................56
Extranet Policy.........................................................................................................57
VPN and Remote Access (Work-at-home) Security Policy....................................57
Firewall Policy.........................................................................................................58
Document Page
2
PROJECT ON NETWORK AND INFORMATION SECURITY
Intrusion Detection Policy........................................................................................58
Vulnerability Scanning Policy.................................................................................59
Internet Policy..........................................................................................................59
IP Address and Documentation Management Policy...............................................59
Physical Security Policies........................................................................................60
External Protection...................................................................................................60
Internal Protection....................................................................................................60
Personnel Policies....................................................................................................60
Visitors Policy..........................................................................................................60
Employee Hiring and Termination Policy...............................................................61
User training Policy..................................................................................................61
Data Policies.............................................................................................................61
Information Classification and Sensitivity Policy....................................................61
Encryption Policy.....................................................................................................61
Backup Policy..........................................................................................................61
Password Management and Complexity Policy.......................................................62
System and Hardware Policies.................................................................................62
Hardware Lifecycle and Disposal Policy.................................................................62
Workstation Policy...................................................................................................62
Switch and Router Policy.........................................................................................62
Server Security Policy..............................................................................................62
Logging Policy.........................................................................................................62
Disaster Recovery and Business Continuity..................................................................................63
Security Strategies and Recommended Controls...........................................................................65
Security Strategies....................................................................................................65
Specific recomended Controls to mitigate the risks uncovered...............................65
Residual Risks...............................................................................................................................66
Resources.......................................................................................................................................68
Conclusion.....................................................................................................................................68
Document Page
3
PROJECT ON NETWORK AND INFORMATION SECURITY
Chapter 3 – Technology Implementation of Security Controls.....................................................70
Overview........................................................................................................................................70
Network Security – Access Control..............................................................................................71
Overview..................................................................................................................71
Objective of Control.................................................................................................71
Resources Used........................................................................................................71
Developing the control.............................................................................................72
Description of the System....................................................................................73
Block Diagram.....................................................................................................74
Configuration of the system.................................................................................75
Test Plan Design..................................................................................................76
Test Plan Implementation....................................................................................77
Test Results and Analysis....................................................................................77
Network Security – DMZ Zone.....................................................................................................77
Objective of Control.................................................................................................77
Resources Used........................................................................................................77
Developing the control.............................................................................................78
Description of the System....................................................................................78
Configuration of the system.................................................................................78
Test Plan Design..................................................................................................79
Test Plan Implementation....................................................................................79
Test Results and Analysis....................................................................................79
Network Security – RADIUS Server.............................................................................................80
Objective of Control.................................................................................................80
Resources Used........................................................................................................80
Developing the control.............................................................................................80
Description of the System....................................................................................81
Configuration of the system:................................................................................81
Test Plan Design:.................................................................................................81
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4
PROJECT ON NETWORK AND INFORMATION SECURITY
Test Plan Implementation....................................................................................82
Test Results and Analysis....................................................................................82
Network Security – IPS.................................................................................................................82
Objective of Control.................................................................................................82
Resources Used:.......................................................................................................83
Developing the control.............................................................................................83
Description of the System:.......................................................................................83
Configuration of the system:....................................................................................84
Test Plan Design:.....................................................................................................86
Test Plan Implementation........................................................................................86
Network Security – IDS.................................................................................................................88
Objective of Control.................................................................................................88
Resources Used:.......................................................................................................88
Developing the control.............................................................................................88
Description of the System:.......................................................................................89
Configuration of the system:....................................................................................90
Test Plan Design:.....................................................................................................90
Test Plan Implementation........................................................................................91
Backup and Recovery Technology................................................................................................92
Penetration testing....................................................................................................96
Scanning Server.......................................................................................................96
Conclusion.....................................................................................................................................98
Bibliography..................................................................................................................................99
Document Page
5
PROJECT ON NETWORK AND INFORMATION SECURITY
Chapter 1 - Network Redesign
Overview
The First national university FNU is an institution off public higher education and the
institution deals with distance education and online study programs. This is the first higher
education institution of the country which has been associated with providing a distance
education facility and the recent facility includes the online programs. Besides the main campus
of the University there also exists five regional campus and ten metropolitan campus. The
present situation of the University has been associated with providing a diverse range of
undergraduate and postgraduate programs along with Vocational as well as educational trainings
and short professional programs. There exists around more than 45,000 students who are
currently studying in the various levels of the University as an on-campus student. Besides this
there exists around 15000 students who are currently studying under the online facility and the
distance education program.
There exists three major facilities which has been associated with supporting the IT
services which includes the Headquarters, Operations and the backup. The headquarter is
situated in the main campus and the operation facilities are located at a distance of 50 K.M. away
from the headquarter at a warehouse which is owned by the university in an industrial area of the
country. The Operation facility is associated with housing the technical functions at the back
office, Data Centres and the staffs of the It department. The location of the backup facility is
almost at a distance of 1000 K.M. from the headquarter. The University is associated with using
the backup facility for the purpose of using it as a warm-site which would get operational
whenever failure in the operation facility takes place.
Document Page
6
PROJECT ON NETWORK AND INFORMATION SECURITY
The regional as well as the metropolitan campuses are almost similar to the main campus
in terms of the size, staff as well as the technologies. The IT infrastructure that the university is
having is associated with the usage of the old and complex technologies. Along with this the
university is still associated with the usage of numerous protocols for the purpose of enabling the
communication in the campus and the main server farm which are located in the various
locations. In order to support the day-to-day learning and the activities as well as the teaching
activities, academics and administrative staffs present in the university. This is done for the
purpose of dealing with the external partners which includes the hospitals, research centres and
many more in various ways which are not necessarily compatible with each other. The current
network that the university is having has various problems related to consistence, performance
and reliability and this has been responsible for owing the growth of the enrolments and the
expansion of the operations which are very recent. There has been an increase in the number of
students for this reason the IT department of the university has been informed about the increase
in the number of students along with informing them about the various complaints received from
the faculties. Particularly it can be stated that the faculties and the academic staffs has been
associated with facing a problem related to the network. For this reason they are not capable of
submitting the grades in an efficient way or maintain a consistent connection amongst the
colleagues at the other units or keeping up with the research or conducting of the daily tasks.in
an similar way the students are also facing lot of problem and this includes late submission of the
tasks and many more. This problem has mainly occurred after the introduction of the online
submission method. For all this problems this report has been prepared in order to analyse the
business goals of the university along with redesign the network as the physic structure for the
purpose of elimination of all the problems.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7
PROJECT ON NETWORK AND INFORMATION SECURITY
Identify Organisation’s Needs and Constraints
Business Goals: different type of business goals of the university has been identified and
this include the providing of a network for the students as well as for the faculties to work in a
proper way. Besides this the university is also thinking of providing the facility of BYOD or
work at home policy. The university aims at providing a network which would be much faster
and would be helping the peoples associated with it to work efficiently and with much more
efficiency. Besides this the university is associated with providing with various type of
educational courses. The university has been focus on improving its IT infrastructure as they
think that the enrolment process of the campus is likely to grow by 50 % in the upcoming years.
Besides this they are also associated with improving the efficiency of the faculties and the
academic staffs. This is done for the purpose of helping them in taking active part in various type
of research processes by taking help from the other peoples who are present in the other units of
the university. The university is also aimed at improving the efficiency of the students. This is to
be done for the purpose of helping them in obtaining good marks along with helping them in
doing faster submissions and do their works in an efficient way. They are also thinking of giving
remote access of the campus network to the students and the faculties so as to help them in doing
their work from home. Another major goal involves saving themselves from any type of
intruders.
Technical Goals aimed to support business transactions:
Scalability
The following are the list of the scalability of the network needs that are needed for
redesigning the network solution for the first national university
Document Page
8
PROJECT ON NETWORK AND INFORMATION SECURITY
To restructure the current network infrastructure that the university is having. This can be done
by offloading the database of the university. Which means that they have to stay away from the
database as much as possible but this does not mean that they have to open the connections.
It should not to start any type of transactions unless and until there is a need of doing this. The
caches present in the network can also be removed. The overhaul of the IP addressing scheme is
also increased in the technical goal of the university.
The bandwidth of the internet connection is to be increased in order to provide much more
availability for the users. The increase in the bandwidth of the network would be greatly helping
out the users as well as the university. The increasing of the bandwidth would be providing much
more availability. The increase of bandwidth is to be done because there is lot of congestion in
the network of the university which are responsible for slowing the various services of the
university.
The congestion in the network should be handled with connecting the network device using
multiple links. The performance of the network would be greatly enhances as well. The
enhancement in the network would be very much helpful because the working process of
different units of the university would become much faster which would be responsible for the
eliminations of the various delays occurring due to slow network.
New security elements are also to be included in the network and this would be greatly helping in
securing the network. By providing a secure and private wireless network the university would be
opening a wide range of opportunities for the students and the staffs to work in an efficient way.
The security elements would also be ensuring the fact that the information stored in the database
of the university is secure.
The response time of the network should be minimum such that students are able to work faster
with the network the research processes would be greatly enhanced and submission of the grades
in correct time would be increasing the efficiency of the faculties. The network which is to be
Document Page
9
PROJECT ON NETWORK AND INFORMATION SECURITY
introduce would be very easy to maintain. And the adaptation of this network can be done in a
very easy way.
Availability
The following are the details of the requirement that includes the steps required to be
followed for the increasing the availability of the network are listed below:
Availability with relation to the network that is to be used by the university and this generally
refers to the ability of the users to access different information or resources within a specified
location and also in a correct format. This is one of the five pillars of the Information Assurance
and the other four pillars includes the integrity, authentication, confidentiality and lastly the
nonrepudiation.
The system that the university is having is non-functioning and also the availability of the
information is also effected and is also having a significant impact over the users. Besides this the
data servers are not secure and is easily available so the information security is affected. The
availability of the network is also effected by the time required.
The availability of the network has been compromised as it is not capable of delivering the
information in an efficient way. The availability of the network must be ensured. The high
availability of the network would be associated with providing a redundant infrastructure for the
university and all this can be switched as the network of the university is facing various type of
problems.
This is to be make sure before increasing the availability that a table is created regarding the
applications which generally requires fault tolerance or the high availability of the networks.
Besides this the identification of the different parts of the network topology which is to be used
by the applications in the university. The single point of failure is to be identified and this is one
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
10
PROJECT ON NETWORK AND INFORMATION SECURITY
of the important and easiest way which can be done economically for the purpose of improving
the availability of the network.
The fault-tolerance is also to be planned. The hardware subsystems are to be replicated besides
this there should exist a standby hardware and fast bot methods as well. The total remote
management would also be very much helpful and concurrent Backups and restore mechanism
can be used whenever the system of the university would be facing any kind of problem.
Network performance
The performance of the network that is currently being used by the university can be
increased by simply following certain steps and the most important step is to understand the
understanding the network that is being used. The following are requirement for increasing the
performance of the network that are required for the development of the network and restructure
the network device connected in the network.
The first step include the analysis of the workload, number of users using the network framework
and the university area that is needed to be covered using the network infrastructure.
The next steps includes the balancing of the bus loads in the system. The faculties and the
students should be md well aware about the effects that the use of the network for unnecessary
purposes can have over the speed of the network. FNU should also organize different workshops
regarding the security and the safe practices. The requirements of the network should also be
understood by the organization as the requirements change all the time along with the traffic
patterns, applications and many more.
It is to be made sure that everyone is on the same page when it is regarding the best practices and
the configurations. The server of the university is consisting of all the I/O on the same bus.
Certain ideas needs to be considered for the purpose of optimizing the use of same bus. The users
Document Page
11
PROJECT ON NETWORK AND INFORMATION SECURITY
are to be educated as well. The users of the network would mainly include the students and the
employees of the university.
It should also be made sure that all the employees of the organization are equipped with proper
tools for the purpose of getting their work done in an efficient and effective way. The processors
are also to be prioritized in order to make sure that the applications which are critical for the
information are indeed taking priority over any kind of less important traffic. It is also import to
compress the big data in the network. This can be done by upgrading the various software and the
processors.
The University can give their best had for the purpose of improving all the algorithms which have
the possibility of ferreting out along with organizing and grouping together the data sets which
are spread all across the network. This can be helping in saving of the precious bandwidth in the
network and the processing power of the network that is to be used by the university.
There should also exist certain defences against the junk traffic and this can include the
antiviruses, malware software, spam filters, firewalls and many more. It is very much important
to keep the network secure from any type of viruses or any other type of mal-intent programs.
Security
The following measures should be taken for increasing the security of the network
infrastructure designed for the first national university and is given below:
The security of the network is an important issue and due to increased amount of cyber
criminals along with the disgruntled employees and careless users might lead to bringing
down of the computer network and also might lead to compromise of the data.
The security of the network of the university is made up of different hardware, software,
policies and procedure. This elements of the security are mainly designed for the purpose
of defending the whole network against all the internal and external threats. Besides this
chevron_up_icon
1 out of 103
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]