FNU Network Security Plan: Disaster Recovery and Incident Response

Verified

Added on  2019/09/21

|13
|3551
|117
Report
AI Summary
This document outlines the network security plan for First National University (FNU), addressing critical aspects of data protection, disaster recovery, and incident response. The plan aims to provide a robust and secure computing environment, covering various programs, including undergraduate, postgraduate, vocational, and online education. Key components include risk management, incident response, awareness programs, and the implementation of strong security policies and advanced tools. The plan also addresses BYOD and Work-at-Home (WAT) policies, ensuring network availability, confidentiality, and integrity. It details assumptions, objectives, and the scope of the plan, including physical safeguards and incident response procedures. Disaster recovery and business continuity are crucial elements, with considerations for business impact analysis, insurance, and restoration procedures. The plan emphasizes the importance of preparedness, including a prepared items inventory and procedures for handling security incidents, to minimize risks and ensure the continuous operation of FNU's network and services. This comprehensive plan is designed to protect the university's data and information from various threats and to support its academic mission.
Document Page
Network Security Plan
Introduction
The First National University(FNU) network security plan is to provide specific instructions
for the practice of IT which is used on daily basis. Network security plan is going to help in
providing robust and secure environment for computing. These plans provide the protection ,
reputation and operation facilities to FNU system and its network. At current , FNU have
wide,differnt type of undergraduate and postgraduate programs as well as Vocational and
Educational Training (VET) and short professional programs. Above 45,000 students are
currently studying at different levels of programs at FNU as on-campus students.
Additionally, there are 15,000 students are presently studying at FNU under the online and
distance education programs. At FNU to support the day-to-day learning , teaching activities
and academics between student and administrative staff, they uses Network infrastructure
which is nowadays relatively old and complex technologies. At FNU the current network has
consistency, performance, and reliability problems which cause due to high growth in
enrolments and due to expansion of operations process . Another major problem at FNU is
that there are no BYOD and Work-at-home (WAT) policies is available. Now it has become a
focus of contention between the IT department, staff and students. This network security plan
going to provide the security, privacy and confidentiality of FNU data and information.
Network security plan are mainly develop to protect data and information of FNU employees,
students, sponsors, suppliers, and other different related entities. Due to absence of perfect
network security plan FNU faces so many problems like attacks of virus , security threats of
network systems and its services, as well as legal problems. This Network Security Plan is
going to support the culture and academic mission of First National University by providing
the availability, confidentiality, and integrity of the university's network in accordance with
the FNU network Security Plan and other different applicable procedures and standards
methods.
*Networks and Information Security Case study - Copyright © Edilson Arenas - CQUniversity
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Scope
These procedures and standards is applicable to every network systems and the resources
which comes under the control of FNU, including each computers which is connecting to the
network of FNU and each FNU employees of the System, faculty member, students, and
different other individuals who administer and uses those systems as well as computers,
specially those which are involved with network system management. This network security
plan applicable to many uses of the computing process of the University's or network
resources as explain in the resources of Computing , FNU Network and E-mail Use Policy, as
well as the Confidentiality Policy of University. Additionally given procedures and standards
may lead specific data or computer systems or networks provided or operated by the third-
party service providers to FNU. These assets mainly include the FNU data in software and
hardware as well as paper or other different media of storage. This network security plan
provide the protection , reputation and operation facilities to FNU system and its network.
Network security plan are mainly develop to protect data and information of FNU employees,
students, sponsors, suppliers, and other different related entities.
*Networks and Information Security Case study - Copyright © Edilson Arenas - CQUniversity
Document Page
Objectives
The main objectives of this plan is to provide the security which have been established by the
FNU to secure its administrative information systems, which mainly exchnage,store, transmit,
retrieve, process and confidential, personally identifiable, trusted or otherwise protected data
and information, against the unauthorized access, virus attack or other different security
threats. The main component of this network security plan are : Management of risk ;
response on incident ; spreading awareness; strong policy; as well as advance tools. This
network security plan applicable to many uses of the computing process of the University's
or network resources as explain in the resources of Computing , FNU Network and E-mail
Use Policy, as well as the Confidentiality Policy of University. As part of the BYOD policy,
it is going to allow students, staff and visitors to the University to access the campus network
and the Internet wirelessly using their mobile devices including notebooks, smartphones, and
tablets. It is also going to improve the student support efficiency and eliminate problems
related with assignment online submission. As part of the WAT, it also permit students and
staff to remotely access the campus network from home. It is also going to Provide a network
which offers a response time of less than a second for interactive applications. It is also going
to automate the majority of the network tasks and services including plug and play, network
configuration, network management, troubleshooting, network monitoring, resource sharing,
load balancing, updates, and data backups. This network security plan provide the protection ,
reputation and operation facilities to FNU system and its network.
*Networks and Information Security Case study - Copyright © Edilson Arenas - CQUniversity
Document Page
Assumptions
For FNU the redesign process of network security should be justified in terms of scalability,
availability, network performance, security, manageability, usability, adaptability, and
affordability. The network security plan going to Provide a network which is available
approximately 99.9 percent of the time and offers an MTBF (mean-time-between-failure) of
6000 hours and an MTTR (mean-time-to- repair) of less than 90 minutes. At present, FNU
supports its wide area network operations using a mesh topology of three (3) Layer2 VPLS
(Virtual Private LAN Service) point-to-point circuits. This mesh guarantees redundancy
between the Headquarters, Operations (Data Centre), and Backup sites. To provide support in
a day-to-day learning and teaching activities, academics and administrative staff at FNU also
deals with a dozen (12) of external partners which mainly include hospitals, research centres,
vendor support, and technology partners in many different ways, non-necessarily compatible
with each other. FNU security plan is going to manages threats by finding, evaluating,
controlling, and reducing the vulnerabilities which are major security threat to the data and
information systems under its authority.
*Networks and Information Security Case study - Copyright © Edilson Arenas - CQUniversity
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Disaster Recovery and Business Continuity (five pages)
In order to control the interruptions in work many of the organisation have rely on Disaster
contegency recovery plan . Long term recovery and risk management have specific plan to
control the disaster of the FNU. These things will keep the organisations up and running
without any interruptions. Business continuity plan and disaster recovery help the
organisations to prepare for upcoming events. By applying disaster recovery plan we resume
the business after any disruptive activities. Whereas business continuity planning help in
making more comprehensive approach which always make sure that you keep money making
not only in natural calmity but it also continue during lower disruptions including the illness
or minor software as well hardware problem. IT leaders, Security and business all works on
same platform to to make decisions which is very crucial for the organisation or the company.
Business Impact Analysis
As we see that the senior management at FNU has find out so many business impacts which
is going to be benfitted due to network security plan. Due to this the ennrolment for both on-
campus and distance education is goingg to increase by 50% in coming next three years. It is
going to improve the efficiency of faculty and permit the academic staff as well as student to
take part in more research projects with their mates and working colleagues at different
campuses and other partner universities. It also going to Improve the efficiency of student
support and remove the problems related with online assignment . As part of the BYOD
policy, it permit students, staff and visitors to the FNU to access the campus network and the
Internet wirelessly by using their mobile devices including notebooks, smartphones, and also
ss part of the WAT, it allow students and staff to remotely access the network of campus .
*Networks and Information Security Case study - Copyright © Edilson Arenas - CQUniversity
Document Page
Insurance Consideration
Paying attention to the network risks is a very good for FNU network security. Responsible network
admisnistrator should focus on, and devote the resources to, effective programs to manage the data
and information security related issues. It will going to reduce their security threats by providing
specialized network risk insurance coverage, with language which features their special
requirements and exposures. The network security plan makes a standards and guidelines for
accessing the FNU network system and informations.
It is responsibilites of the Network security department to provide adequate confidentiality and
security which place in local or remotely area. In FNU network only authorised and genuine
software is installed as well as internet and other services can be only used by authorised person
only.
Incident Response Team
The incident response planning mainly work on fixing the way to reduce and minimize the
risk and threats to the FNU network system. Network manager and data center manager
mainly work on eliminating the errors or threats which occur in the network of FNU. The
FNU administrative staff handles the admissions records, student records, and other different
operational student functions. The FNU management team mainly consists of human
resources, and information technology. During the incident response process we update the
already available controls or develop new according to the needs and uses. It is going to
automate the large part of the network works and services which mainly include plug and
play, configuration of network and its management, network troubleshooting, monitoring,
sharing of resources, load balancing of loads, updates, and providing backup of data .
*Networks and Information Security Case study - Copyright © Edilson Arenas - CQUniversity
Document Page
Physical Safeguards
At FNU physical safeguards mainly stand for control over the network of physical euipments
like Desktop PCs, Laser Printers, VoIP video phones and 100Base-TX Switched Ethernet . It
is Implemented in FNU to provide various methods and policies to control the physical
access to its network systems and ensured that only authorized access is permitted. In FNU
each high-end switch in every building is connected with a high-end Campus core switch
which is situated in the backbone of the FNU campus . In every building, 24-port Ethernet
switches are connected on every floor with the end user. Here in FNU every devices are part
of the similar domain broadcast as well as every devices (except the public servers) are part
of the 192.168.0.0 internal network system.
Prepared Items
As we see that at FNU one major step to find out the risks to prepared items is performing an
prepared items inventory by find out the different items we need to protect within FNU
network system. This inventory mainly based upon FNU business plan and the sensitivity of
the prepared items. This FNU inventory mainly include those prepared items which the
organization is consider more valuable. To fix if something is valuable, we first find what the
loss of the prepared item will be in terms of lost revenue, time and the cost of repair. For
each items its type, general system of support, information about the owner , its logical and
physical location, its level of service, and key contacts should be available so that it
completely fits in to the supplying availability , security, and prepared items replacement
process.
*Networks and Information Security Case study - Copyright © Edilson Arenas - CQUniversity
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Incident Response Procedures
As we see that security incident can come any time in any forms: like a malicious attacker
which can control the network of FNU, a virus or other different type of malware infecting
the computers, or even after a laptop which is stolen containing confidential information and
data. A well develop Incident Response Procedure is important in successful recovery from
information and data theft.
This procedure covers every incidents which will affect the integrity and security of FNU
information and data items, and outlines the specific steps to solve this when an incident
happens. During the incident response process we update the already available controls or
develop new according to the needs and uses. It is going to automate the large part of the
network works and services which mainly include plug and play, configuration of network
and its management.
Restoration Procedures
In FNU the restoration procedures are very important only if the data stored on the network
system is of valuable and very important. It is a very important facility which can take over
within minutes when any of the facilities available during operations is fails. The restoration
procedures is the mirror image of the available operations facility at FNU. Each of the
operational servers in FNU including file, web, mail, DHCP, DNS, Authentication,
Blackboard, Domain Controllers, Database, SAN, Load Balancing and video streaming
servers are comes under this facility. It mainly helpful during failure of network hardware,
failure of software, user & administrator mistakes, hacking, natural disasters, theft and other
different type of disaters.
*Networks and Information Security Case study - Copyright © Edilson Arenas - CQUniversity
Document Page
Forensics Considerations
At FNU network forensics considerations is the analysis , recording and capture of the events
happens in network to find out the root of network security attacks as well as other incidents which
happen inside or outside the campus of FNU. This considerations mainly need a huge amount of
storage facilities. It also need regualr erasing of old data to store new data.
Maintaining the Plan
Due to increasing dependence on IT also increased the risk impact of IT on the overall organization
business. Nowadays threats in network services is increased because its vulnerabilities is exposed
across the world. When we check our plan then we found that only the location of FNU is risky thing
otherwise its purpose and plan are same and good. We have to store the data of student and staff
as well as their products in such a manner so that we can use it in future without any hinderances.
End user are the students and other people who visit FNU website and put their details in form and
register themselves.During the sending and processing to third party the security of user data is at
very high risk. There are so many risk factors available in the infrastructure. The software and
hardware part which are going to use in the network system of FNU is also checked by the IT
professional for upcoming risks. Session management, ID management, security events and logging
are the major risk factor areas of the FNU.
*Networks and Information Security Case study - Copyright © Edilson Arenas - CQUniversity
Document Page
Security Strategies and Recommended Controls
Security Strategies
As we can see that network security plan play an important role in increasing the business.
The business processes of FNU totally depend on a combination of systems and services with
a very complex ICT infrastructure. At present the University is spending a large amount of
money to maintain and integrate the disparate and cumbersome systems, with little room to
expand and improve its services. FNU requires to change and re-provision the infrastructure
of ICT to give high quality learning and teaching in the most cost-effective way. FNU
network security is related with guaranteed availability, confidentiality, integrity and
authentication. Here we can see that the effective security is only achieved through working
in a proper framework. To make a best network security policy we have to fix the startegies
of the network security plan. It help in finding the upcoming threat people face due to lack of
proper network security plan.
Specific recomended Controls to mitigate the risks uncovered.
In FNU network the transition to interoperability should be get in a easy way while
leveraging the new developments in network and security of information infrastructure to
provide “zero” risk. It also include the increase of key FNU applications and providing
services to the Cloud. Due to increasing dependence on IT also increased the risk impact of
network security on overall business of FNU. This Network Security Plan is going to support
the culture and academic mission of First National University by providing the availability,
confidentiality, and integrity of the university's network in accordance with the FNU network
Security Plan and other different applicable procedures.
*Networks and Information Security Case study - Copyright © Edilson Arenas - CQUniversity
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Residual Risks
List of Residual Risks - that remain after all possible (cost-effective) mitigation or
treatment of risks.
As we know that residual risk is the threat which remains after complete efforts to find out
and remove threats which have been occur. There are mainly four method to cope up with
residual risk at FNU . During mitigation risks of FNU network system we have to find out
the compliance needs,risk and related authorities. It helps in determining the strength and
weakness of network security framework. The main basic risk catogery of FNU network
security is power loss at data center. Frequent power loss at data center cause important data
loss. The second major risk faced in the Network securityis is frequent service disruption due
to malfunctioned software equipment as well as physical euipment. After that third risk
which mainly affected the Network system is physical environment or climate. Last but not
the least residual risk of physical security and logical security play a major role in network
security of FNU.
Residual Risk Management Plan - estimate, describe and rate these residual risks to
guide the priorities for ongoing management and monitoring of risks.
As we know that according to the ISO 27001, residual risk plan in network security is “the
risk remaining after risk treatment”. Residual risks are mainly handles by the same method as
we act on the starting risk assessment work – here we use the similar methodology, the
similar assessment measurements. What is different is that we need to take notice about the
effects of controls , so the similarity of an risk is normally decreased and sometimes the
effect is lower. In FNU network if the level of risks is greater than the acceptable level , and
the costs of reducing such risks will be greater than the effect itself, then we require to
propose to the FNU to accept these high residual risks.
*Networks and Information Security Case study - Copyright © Edilson Arenas - CQUniversity
Document Page
Resources
During the risk treatment process we update the already available controls or develop new
according to the needs and uses. If we approach the right way then we can easily run the risk
treatment with the confidence. It helps in generating huge benfits at very cheap cost. Whereas
risk evaluation mainly involves in making the decision to the level of risk and develop a
criteria during context was created. Long consistency lead to huge confidence in making of
decision and, finally, which covert to better decisions. In this paper, we analyzed few of the
already available risk assessment techniques and after that they proposed a new mechanism
technique for risk assessment and mitigation. Here we see that network security plan is not
an optional tool in the complete risk management of the FNU. Risk is termed as threat ,
which cannot be easily removed fully and always needs an effective network secutity plan.
*Networks and Information Security Case study - Copyright © Edilson Arenas - CQUniversity
chevron_up_icon
1 out of 13
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]