Network Security Plan for CQUniversity: Case Study and Analysis

Verified

Added on  2019/09/21

|2
|304
|528
Report
AI Summary
This assignment presents a comprehensive network security plan tailored for CQUniversity. The report begins with an introduction outlining the organization's needs, business domain, security issues, and proposed action plan. It then defines the project's scope, objectives, and necessary assumptions. A significant portion of the report focuses on disaster recovery and business continuity, covering business impact analysis, insurance considerations, incident response teams and procedures, and forensic considerations. The plan also details security strategies, recommended controls, and residual risks, alongside a residual risk management plan. Finally, it identifies the resources required for implementation and concludes with a summary of the key findings and recommendations. This assignment is a valuable resource for students studying network security, providing practical insights and a structured approach to security planning.
Document Page
Network Security Plan Template*
Introduction (one page)
Provide a clear and concise description of your network security plan in terms of the
organisation’s needs. Make sure to include a brief description of the organisation, the
business domain, security issues, your action plan to address the issues, and respective
recommendations.
Scope (one page)
Focusing on the mission of the project, describe as clear as possible the deliverables of the
plan and milestones.
Objectives (one page)
Provide clear and concise statements about what the security plan is designed to achieve.
Include the business and technical goals to ensure the network is protected against intruders.
Assumptions (one page)
The information provided in the case study is not comprehensive, therefore a number of
factors need to be assumed. Document any assumptions you make, in preparing the plan.
Disaster Recovery and Business Continuity (five pages)
Business Impact Analysis
Insurance Consideration
Incident Response Team
Physical Safeguards
Prepared Items
Incident Response Procedures
Restoration Procedures
Forensics Considerations
Maintaining the Plan
Security Strategies and Recommended Controls (two
pages)
Security Strategies
Specific recomended Controls to mitigate the risks uncovered.
Residual Risks (three pages)
*Networks and Information Security Case study - Copyright © Edilson Arenas - CQUniversity
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
List of Residual Risks - that remain after all possible (cost-effective) mitigation or
treatment of risks.
Residual Risk Management Plan - estimate, describe and rate these residual risks to
guide the priorities for ongoing management and monitoring of risks.
Resources (one page)
They include any type of resources like humans, communities of practice, and quality audit
groups required to implement the recommendations.
Conclusion (one page)
*Networks and Information Security Case study - Copyright © Edilson Arenas - CQUniversity
chevron_up_icon
1 out of 2
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]