+ All Categories
Home > Documents > IMPLEMENTING NETWORK SECURITY - baixardoc

IMPLEMENTING NETWORK SECURITY - baixardoc

Date post: 24-Apr-2023
Category:
Upload: khangminh22
View: 0 times
Download: 0 times
Share this document with a friend
10
SCCS SECURITY INC. PREPARED FOR FRANKLIN MEDICAL SUPPLIES Implementing Network Security ITEC495 TEAM D
Transcript

S C C S S E C URIT Y I N C .

P R E PA R E D F O R

FRANKLIN MEDICAL SUPPLIES

Implementing Network Security

ITEC495 – TEAM D

Introduction

NETWORK SECURITY OVERVIEW

“The protection of networking components, connections, and content”(Whitman & Mattord, 2005).

Small piece of the overall information security pie.

Management, computer and data, policy, and network security.

Focus on network security.

Provide tools for a proactive approach

to information security overall.

IMPLEMENTING NETWORK SECURITY | SCCS SECURITY INC.

Scenario | Franklin Medical Supplies Needs

PROBLEM IDENTIFICATIONFranklin Medical Supplies is looking for a solution to secure their outdated network.

CURRENT OPERATING ENVIRONMENT

Franklin Medical Supplies has one three-floor building with one leased cable broadband connection entering the building.

The broadband connection connects the Franklin Medical Supplies local area network (LAN) to the metropolitan area network (MAN) hosted by their internet service provider.

The broadband connection is connected to a centrally located 24-port 10-BaseT hub that networks four 24-port 10-BaseT bridges on each floor of the building.

IMPLEMENTING NETWORK SECURITY | SCCS SECURITY INC.

Scenario | Franklin Medical Supplies Needs

CURRENT OPERATING ENVIRONMENT (Continued)

The current 10-BaseT hub is using outdated software with no firewall protection.

Of the 120 networked nodes, there are 85 workstations running Windows XP—each with outdated virus protection, security software patches, an no firewall protection.

The protocols used are a mesh of IPX/SPX (printers) and TCP/IP (servers, workstations, laptops).

During normal business operating hours, system uptime is considered critical and any amount of considerable downtime can cause severe revenue loss for Franklin Medical Supplies.

IMPLEMENTING NETWORK SECURITY | SCCS SECURITY INC.

Scenario | SCCS Security Inc. Solutions

SOLUTION RECOMMENDATION

SCCS Security Inc. to provide a complete network security solution for

Franklin Medical Supplies.

DELIVERABLES

A detailed threat analysis will be performed on the Franklin Medical

Supplies Network.

A Cisco Catalyst Express 500 10/100/1000Base-t switch will replace the

centrally located 24-port hub.

Each floor’s bridge will also be replaced with a Cisco Catalyst Express 500 switch.

IMPLEMENTING NETWORK SECURITY | SCCS SECURITY INC.

Scenario | SCCS Security Inc. Solutions

DELIVERABLES (Continued)

All unused ports on the switch will be disabled through the switches

management interface, protecting from unauthorized device plug-ins.

The main internet connection will have a Cisco Catalyst 6500 firewall that

can control and block unnecessary traffic.

A corporate version of Symantec Antivirus will be used that will allow

symmetrical deployment of antivirus updates that will protect all computers

from the latest virus threats, and periodically update with zero

administration.

Microsoft’s Windows Server Update Service (WSUS) will be configured, allowing control over deployment of Windows security updates.

IMPLEMENTING NETWORK SECURITY | SCCS SECURITY INC.

Scenario | SCCS Security Inc. Solutions

DELIVERABLES (Continued)

TCP/IP protocol will be the only network protocol used on the network, eliminating any open communicating devices.

Active Directory accounts will be set to allow scheduled work time access only. Any access needs that fall out of the normal business day needs approval from the CIO.

End user training material will be disseminated to all employees, empowering the users to make wise use of information resources.

Training will occur for all Franklin Medical Supplies personnel impacted by the project.

A security handbook will be developed and will encompass all aspects of network security.

IMPLEMENTING NETWORK SECURITY | SCCS SECURITY INC.

Scenario | SCCS Security Inc. Solutions

DELIVERABLES (Continued)

IMPLEMENTING NETWORK SECURITY | SCCS SECURITY INC.

Scenario | Solution Explanation

A NOVEL APPROACH

Our solution approaches the problem of network security as a process,

not a goal.

THE PROCESS

After hardware and software are installed, management begins.

Management of policies and procedures.

Overall system management and maintenance.

Ensure the process is constantly evolving with the trends in information

technology.

IMPLEMENTING NETWORK SECURITY | SCCS SECURITY INC.

Scenario | Solution Explanation

MANAGEMENT OF POLICIES & PROCEDURES

Instituting an effective policy and procedure management scheme should

not only encompass network security; but, software, hardware, data,

people, and the actual policies and procedures themselves (Whitman &

Mattord, 2005).

It is impossible to obtain a perfect information security scheme, the

process of implementing policies and procedures of how to act and react to

malicious attempts is crucial..

Training on the policies and procedures must begin at the user level and

move up to the executive levels.

Policies and procedures must be reviewed and adapted to meet the

organizational goals while maintaining security.

IMPLEMENTING NETWORK SECURITY | SCCS SECURITY INC.


Recommended