CompNtwk : Lab 5.1.5.2 Identifying Security Requirements

Step 1: Identify potential security weaknesses within the FilmCompany topology

a. Use word processing software to create a new document called “Security Strategies.”

b. Using the documents created in previous labs and the existing topology; identify potential

weaknesses in the existing design. (No firewalls, no VPNs)

c. Create a list of recommended security practices that should be employed in the FilmCompany

network.

d. Save your Security Strategies document.

Step 2: Create a security practices list

a. Using the list developed from the brainstorming session, create a finalized list of recommended

security practices for the FilmCompany.

Recommended security practices include:

  • • Use firewalls to separate all levels of the secured corporate network from other unsecured

networks, such as the Internet. Configure firewalls to monitor and control the traffic, based on

a written security policy.

  • • Create secured communications by using VPNs to encrypt information before it is sent

through third-party or unprotected networks.

  • • Prevent network intrusions and attacks by deploying intrusion prevention systems. These

systems scan the network for harmful or malicious behavior and alert network managers.

  • • Control Internet threats by employing defenses to protect content and users from viruses,

spyware, and spam.

  • • Manage endpoint security to protect the network by verifying the identity of each user before

granting access.

  • • Ensure that physical security measures are in place to prevent unauthorized access to

network devices and facilities.

  • • Secure wireless Access Points and deploy wireless management solutions.

b. Identify what devices and software will need to be purchased to facilitate the recommended security

practices. (Hardware firewalls, intrusion detection systems etc.)

c. Save your Security Strategies document.

Step 3: Create a security strategy

a. Use word processing software to create an addition to the Security Strategies document.

b. Using the list of identified equipment, develop a chart of costs and features of the recommended

devices.

c. Using the list of identified software needed, develop a chart of costs and features of the

recommended software.

d. Save your Security Strategies document.

Step 4: Create a security design

a. Use word processing software to create an addition to the Securities Strategies document.

b. Identify which types of access to the network should be secured by incorporating VPNs.

c. Identify methods for controlling physical security at the FilmCompany building and at the stadium.

d. Identify potential ACLs that can be created to filter unwanted traffic from entering the network.

(Standard ACLS or Extended need to be identified.)

e. Identify methods for securing the wireless Access Points. Determine the best method for the

FilmCompany network. (128 bit encryption etc.)

f. Save your Security Strategies document.

Step 5: Reflection

The creation of a security strategy creates many challenges for the designer. What were a few of the more difficult challenges you encountered?

Consider and discuss the identified challenges. Do all of the proposed strategies accomplish the task the

same way?

Would one be less expensive or less time-consuming than the other?

How could implementing a physical security plan into an existing company be difficult?

Berbagai perangkat keras dapat dibeli dengan berbagai fitur dan biaya.
• Berbagai software keamanan dapat dibeli dengan berbagai fitur dan biaya.
• karyawan yang ada mungkin tidak menerima perubahan kebijakan keamanan mereka, jadi siapa yang perlu
memastikan bahwa rencana itu ditegakkan?
• ACL dapat menyaring lalu lintas, tapi apa dampaknya pada arus lalu lintas yang akan mereka miliki? Apakah ACL diterapkan pada Akses
Layer atau Pembagian Layer atau keduanya?

 

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: