Lab 5.1.5.2 Identifying Security Requirements


Step 1: Identify potential security weaknesses within the FilmCompany topology
a. Use word processing software to create a new document called “Security Strategies.”
b. Using the documents created in previous labs and the existing topology; identify potential
weaknesses in the existing design. (No firewalls, no VPNs)
c. Create a list of recommended security practices that should be employed in the FilmCompany
network.
d. Save your Security Strategies document.
Step 2: Create a security practices list
a. Using the list developed from the brainstorming session, create a finalized list of recommended
security practices for the FilmCompany.
Recommended security practices include:
  • • Use firewalls to separate all levels of the secured corporate network from other unsecured
networks, such as the Internet. Configure firewalls to monitor and control the traffic, based on
a written security policy.
  • • Create secured communications by using VPNs to encrypt information before it is sent
through third-party or unprotected networks.
  • • Prevent network intrusions and attacks by deploying intrusion prevention systems. These
systems scan the network for harmful or malicious behavior and alert network managers.
  • • Control Internet threats by employing defenses to protect content and users from viruses,
spyware, and spam.
  • • Manage endpoint security to protect the network by verifying the identity of each user before
granting access.
  • • Ensure that physical security measures are in place to prevent unauthorized access to
network devices and facilities.
  • • Secure wireless Access Points and deploy wireless management solutions.
b. Identify what devices and software will need to be purchased to facilitate the recommended security
practices. (Hardware firewalls, intrusion detection systems etc.)
c. Save your Security Strategies document.
Step 3: Create a security strategy
a. Use word processing software to create an addition to the Security Strategies document.
b. Using the list of identified equipment, develop a chart of costs and features of the recommended
devices.
c. Using the list of identified software needed, develop a chart of costs and features of the
recommended software.
d. Save your Security Strategies document.
Step 4: Create a security design
a. Use word processing software to create an addition to the Securities Strategies document.
b. Identify which types of access to the network should be secured by incorporating VPNs.
c. Identify methods for controlling physical security at the FilmCompany building and at the stadium.
d. Identify potential ACLs that can be created to filter unwanted traffic from entering the network.
(Standard ACLS or Extended need to be identified.)
e. Identify methods for securing the wireless Access Points. Determine the best method for the
FilmCompany network. (128 bit encryption etc.)
f. Save your Security Strategies document.
Step 5: Reflection
The creation of a security strategy creates many challenges for the designer. What were a few of the more difficult challenges you encountered?
Consider and discuss the identified challenges. Do all of the proposed strategies accomplish the task the
same way?
Would one be less expensive or less time-consuming than the other?
How could implementing a physical security plan into an existing company be difficult?
 Berbagai perangkat keras dapat dibeli dengan berbagai fitur dan biaya.
• Berbagai software keamanan dapat dibeli dengan berbagai fitur dan biaya.
• karyawan yang ada mungkin tidak menerima perubahan kebijakan keamanan mereka, jadi siapa yang perlu 
memastikan bahwa rencana itu ditegakkan?
• ACL dapat menyaring lalu lintas, tapi apa dampaknya pada arus lalu lintas yang akan mereka miliki? Apakah ACL diterapkan pada Akses 
Layer atau Pembagian Layer atau keduanya?

0 Response to "Lab 5.1.5.2 Identifying Security Requirements"

Posting Komentar