Date post: | 24-Apr-2023 |
Category: |
Documents |
Upload: | khangminh22 |
View: | 0 times |
Download: | 0 times |
S C C S S E C URIT Y I N C .
P R E PA R E D F O R
FRANKLIN MEDICAL SUPPLIES
Implementing Network Security
ITEC495 – TEAM D
Introduction
NETWORK SECURITY OVERVIEW
“The protection of networking components, connections, and content”(Whitman & Mattord, 2005).
Small piece of the overall information security pie.
Management, computer and data, policy, and network security.
Focus on network security.
Provide tools for a proactive approach
to information security overall.
IMPLEMENTING NETWORK SECURITY | SCCS SECURITY INC.
Scenario | Franklin Medical Supplies Needs
PROBLEM IDENTIFICATIONFranklin Medical Supplies is looking for a solution to secure their outdated network.
CURRENT OPERATING ENVIRONMENT
Franklin Medical Supplies has one three-floor building with one leased cable broadband connection entering the building.
The broadband connection connects the Franklin Medical Supplies local area network (LAN) to the metropolitan area network (MAN) hosted by their internet service provider.
The broadband connection is connected to a centrally located 24-port 10-BaseT hub that networks four 24-port 10-BaseT bridges on each floor of the building.
IMPLEMENTING NETWORK SECURITY | SCCS SECURITY INC.
Scenario | Franklin Medical Supplies Needs
CURRENT OPERATING ENVIRONMENT (Continued)
The current 10-BaseT hub is using outdated software with no firewall protection.
Of the 120 networked nodes, there are 85 workstations running Windows XP—each with outdated virus protection, security software patches, an no firewall protection.
The protocols used are a mesh of IPX/SPX (printers) and TCP/IP (servers, workstations, laptops).
During normal business operating hours, system uptime is considered critical and any amount of considerable downtime can cause severe revenue loss for Franklin Medical Supplies.
IMPLEMENTING NETWORK SECURITY | SCCS SECURITY INC.
Scenario | SCCS Security Inc. Solutions
SOLUTION RECOMMENDATION
SCCS Security Inc. to provide a complete network security solution for
Franklin Medical Supplies.
DELIVERABLES
A detailed threat analysis will be performed on the Franklin Medical
Supplies Network.
A Cisco Catalyst Express 500 10/100/1000Base-t switch will replace the
centrally located 24-port hub.
Each floor’s bridge will also be replaced with a Cisco Catalyst Express 500 switch.
IMPLEMENTING NETWORK SECURITY | SCCS SECURITY INC.
Scenario | SCCS Security Inc. Solutions
DELIVERABLES (Continued)
All unused ports on the switch will be disabled through the switches
management interface, protecting from unauthorized device plug-ins.
The main internet connection will have a Cisco Catalyst 6500 firewall that
can control and block unnecessary traffic.
A corporate version of Symantec Antivirus will be used that will allow
symmetrical deployment of antivirus updates that will protect all computers
from the latest virus threats, and periodically update with zero
administration.
Microsoft’s Windows Server Update Service (WSUS) will be configured, allowing control over deployment of Windows security updates.
IMPLEMENTING NETWORK SECURITY | SCCS SECURITY INC.
Scenario | SCCS Security Inc. Solutions
DELIVERABLES (Continued)
TCP/IP protocol will be the only network protocol used on the network, eliminating any open communicating devices.
Active Directory accounts will be set to allow scheduled work time access only. Any access needs that fall out of the normal business day needs approval from the CIO.
End user training material will be disseminated to all employees, empowering the users to make wise use of information resources.
Training will occur for all Franklin Medical Supplies personnel impacted by the project.
A security handbook will be developed and will encompass all aspects of network security.
IMPLEMENTING NETWORK SECURITY | SCCS SECURITY INC.
Scenario | SCCS Security Inc. Solutions
DELIVERABLES (Continued)
IMPLEMENTING NETWORK SECURITY | SCCS SECURITY INC.
Scenario | Solution Explanation
A NOVEL APPROACH
Our solution approaches the problem of network security as a process,
not a goal.
THE PROCESS
After hardware and software are installed, management begins.
Management of policies and procedures.
Overall system management and maintenance.
Ensure the process is constantly evolving with the trends in information
technology.
IMPLEMENTING NETWORK SECURITY | SCCS SECURITY INC.
Scenario | Solution Explanation
MANAGEMENT OF POLICIES & PROCEDURES
Instituting an effective policy and procedure management scheme should
not only encompass network security; but, software, hardware, data,
people, and the actual policies and procedures themselves (Whitman &
Mattord, 2005).
It is impossible to obtain a perfect information security scheme, the
process of implementing policies and procedures of how to act and react to
malicious attempts is crucial..
Training on the policies and procedures must begin at the user level and
move up to the executive levels.
Policies and procedures must be reviewed and adapted to meet the
organizational goals while maintaining security.
IMPLEMENTING NETWORK SECURITY | SCCS SECURITY INC.