Developing a Network Security, Backup, and Recovery Plan for FSM

Verified

Added on  2023/06/03

|3
|793
|79
Homework Assignment
AI Summary
This assignment details a comprehensive network security plan, backup schedule, disaster recovery plan, and maintenance schedule. The security plan covers the creation of a firewall, isolation of sensitive information, development of a DMZ zone, creating an authentication scheme, development of an IP security architecture, and a plan for spyware and virus protection. The backup schedule outlines a weekly backup strategy. The disaster recovery plan includes steps for recovering from worst-case scenarios, encompassing risk analysis, threat identification, and establishing a response team. A maintenance schedule is also provided, detailing daily, weekly, monthly, and annual tasks for computers and peripherals, ensuring data integrity and network performance. This assignment is designed to provide a robust framework for network management and security.
Document Page
Planning Details
Security Plan:
The security of the network is an important factor that helps in allowing the legitimate traffic
to reach the hosts connected in the network while blocking the illegal traffic out. For the
development of the network security plan the following tasks should be completed:
Development of a network security policy – In the security policy the permission given to the
user for accessing sensitive and the confidential information should be identified and it consists of
the following elements such as:
Creation of a firewall – It is used for filtering the data traffic and restrict the data according
to the protocol
Isolation of the sensitive and confidential information - The direct access of the internal
network should be blocked by configuring the router with a password and configuring the
firewall for blocking unknown traffic.
Development of a DMZ zone – An area outside the firewall should be created for allowing
anonymous access for any user and keep the internal network secured from the third party
agents.
Creating an authentication scheme – The direct access to the internet should require
username and password and the access to the internet via the firewall should also require
authentication for tracking the activity of the user.
An IP security architecture should be developed – For the management of the integrity of data,
replay protection, securely creating and automatically refreshing the encryption keys, creating
strong cryptographic algorithm and creating certificate based encryption. There are different
protocols tat are used for enforcement of the functions.
Creating a plan for spyware or virus protection – The virus and the spyware can disguise the user as
a business content for carrying out malicious activity and breach the security of the network. The
host connected in the network is needed to be installed with an antivirus application and updated
daily such that the malware, spyware and virus can be blocked before they can carry malicious
activity and the network is kept secured.
Backup Schedule:
For creating the backup schedule it should be kept in mind that the entire system can be
restored from the backup within a short duration of time. For the creation of the backup schedule
what files are needed to be backed up and the frequency of backup should be identified. Regular
backup should be setup and the changes in the files at the start of each week should be saved and
the final changes at the end of the week should be added with the low level backup. The following is
a weekly backup schedule created for the FSM:
Floating Mon Tue Wed Thurs Fri
Month 1 0
Week 1 9 9 9 9 5
Week 2 9 9 9 9 5
Week 3 9 9 9 9 5
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Week 4 9 9 9 9 5
Disaster Recovery Plan (DRP): Describe in a list the process to recover from
the worst case disaster for FSM offices and IT systems.
For the development of the disaster recovery plan a risk analysis should be performed on the
business impact and the resources that can be affected. The threats and vulnerabilities acting on the
system should be identified and the below steps should be followed for the preparation of the
disaster recovery plan.
Gathering information regarding the infrastructure of the network
Establishing the activity with the scope
Identification of the critical resources and the threats acting on it
Analysing the unplanned incidents and outrages and the response
Identification of the current strategy followed for disaster recovery
Development of a response team for handling emergency conditions
Reviewing the management process and approval of the plan
Testing the developed plan
Updating
Implementation.
Maintenance Schedule:
The following schedule is created for performing the maintenance for the computers and the
peripherals in the developed network.
Task Daily Weekly Monthly Annually
Deletion of the
temporary
internet files

Deleting the
temporary
windows files

Scanning system
with antivirus

Check for java
updates

Disk Clean-up
Scanning and
checking of disk

Disk
Defragmentation

Updating Adobe
Reader

Cleaning monitor,
mouse, keyboard,
CPU

Error log
Backup and
Restore
Document Page
Software
Checklist

Peripheral
checklist

The maintenance is important for the maintaining integrity of data and it causes a preventive
measure for eliminating the risk of major breakdown of the network. With the daily operation the
efficiency of the devices gets reduced and carrying out the maintenance helps in increasing the
efficiency and improvement of the performance of the network.
chevron_up_icon
1 out of 3
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]