Verified Document

Creating A Secure Network Term Paper

Network Security This report is the answer to a scenario that was provided as the basis for this assignment. The idea is that a security firm has been awarded a contract for a local government agency. As part of that contract, the author is being asked to provide a number of deliverables. These would include an information flow diagram, an equipment list that would be required so as to make up the network security infrastructure, a maintenance plan to keep the network running and operating in optimal fashion, a list of at least four security measures that could be developed, two physical security vendors that could be used and how human resources could and should figure into all of the above. While there are multiple ways to undergo a network security system plan, there are some options and paths that are more required than others.

Analysis

The network information flow diagram that was asked for as part of this assignment is shown in the appendix. Something that should be clear from that diagram is that there is not just a single barrier, software for physical, when it comes to the network. In terms of the network, there are actually three zones. There is the exterior zone and there is the most secure zone. In between, there is a middle zone. The need for the middle zone comes from the fact that just because some devices are allowed past the external firewall does not mean that they should get full access to anything and everything that is beyond that first firewall. For users that are outside of the network that have permission to access the intranet, they will have the credentials to get through the external and internal firewalls. The virtual private network (VPN) that is nestled in between the two firewalls is just one way for external users to get through. For example, if a worker is at a hotel and is connected to the internet, they can access the intranet and the rest of the internal network by accessing the VPN. Conversely, users that are behind both firewalls are able to use the internet, cloud services and so forth so long as they stay within the network security policies. For example, an authorized computer would be given access to the services and information to which they are entitled per the network and user setup. Unauthorized computers, on the other hand, are restricted or blocked from accessing anything important. In short, the information flows back and forth across the length of the network based on what information is allowed to be accessed, what services are allowed to be accessed and so forth. The proper configuration and arrangement of these services,...

In total, there are about four general types. These types would be active devices, passive devices, preventative devices and Unified Threat Management (UTM) devices. Active devices would include firewalls, antivirus scanning devices, content filtering devices and other devices that block surplus traffic on the network. Passive devices would include intrusion detection appliances. These are devices that identify and report on traffic that is unwanted or undesirable. Preventative devices would include penetration testing devices and vulnerability assessment devices, otherwise known as appliance. Those devices scan the networks and help identify potential or verified security problems. The last type, of course, would be the aforementioned UTM devices. These would include firewalls, content filtering, web caching and other sorts of all-in-one security devices. One specific device that would be useful in the case of the local government agency that is the subject of this brief report would be a Cisco ASA 5515-X Firewall Edition Security Appliance. The device has gigabit internet, is rack-mountable and has six ports. That device is a smidge over two thousand dollars. A comparable device to that would be a WatchGuard Firebox M500. Like the Cisco device, it serves as a physical firewall that can protect the network security of the local government agency in question. The device has onboard support for gateways, web content filtering intrusion prevention and other features that are presented and discussed on the network information flow diagram elsewhere in this report. Like the Cisco device, the WatchGuard offering is also in the price range of several thousand dollars, coming in at about $2500 (ITCS, 2017).
Other devices that would be necessary would include end-user computer workstations. Two of the common brands that could be used to meet this end would include Dell and Lenovo. The latter is what used to be the computer division of IBM. Cost per workstation would range from $500 to $2000 per unit, depending on the computing power that is needed. The major things that would drive the price would include the processors in the computers, the amount of RAM, the type and size of hard drive and so forth. Something else that would be necessary is the proper network and patch cabling. So as to keep things as “future-proof” as possible, using Category 7 networking cabling would be the best. If existing infrastructure is present and…

Sources used in this document:

References

Brown, M. (2012). Who makes the best 802.11ac router? We review the only 5 models available today. PCWorld. Retrieved 25 November 2017, from https://www.pcworld.com/article/262148/who_makes_the_best_802_11ac_router_we_review_the_only_5_models_available_today.html

Concept Draw. (2017). Network Security Devices. http://www.conceptdraw.com. Retrieved 25 November 2017, from http://www.conceptdraw.com/How-To-Guide/network-security-devices

Gov.UK. (2017). [Withdrawn] Browser Security Guidance: Google Chrome - GOV.UK. Gov.uk. Retrieved 25 November 2017, from https://www.gov.uk/government/publications/browser-security-guidance-google-chrome/browser-security-guidance-google-chrome

ITCS. (2017). Cisco ASA vs WatchGuard XTM | IT Central Station. Itcentralstation.com. Retrieved 25 November 2017, from https://www.itcentralstation.com/products/ comparisons/cisco-asa_vs_watchguard-xtm

Mays, J. (2017). Update and Patch OpenSSL for Heartbleed Vulnerability | Liquid Web Knowledge Base. Liquid Web Knowledge Base. Retrieved 25 November 2017, from https://www.liquidweb.com/kb/update-and-patch-openssl-for-heartbleed-vulnerability/

Shinder, D. (2017). 10 physical security measures every organization should take. TechRepublic. Retrieved 25 November 2017, from https://www.techrepublic.com/blog/10-things/10-physical-security-measures-every-organization-should-take/

Zielinski, D. (2014). Integrating HR Systems Can Deliver Rich Rewards. SHRM. Retrieved 25 November 2017, from https://www.shrm.org/hr-today/news/hr-magazine/pages/0514-hr-systems-integration.aspx


Cite this Document:
Copy Bibliography Citation

Related Documents

Technologies Designed to Secure Networks From Cyber-Attacks
Words: 607 Length: 2 Document Type: Essay

Technologies Designed to Secure Networks from Cyber-Attacks In this paper, I examine different approaches to security designs intended to protect the integrity of the information contained on network databases in light of recent technological developments. Traditionally, network security has been designed either to protect the database of the network or to protect the specific applications that are executed upon the network. However, in the last decade, the implementation of Web

Network Design Scenario Straight Sales
Words: 1313 Length: 4 Document Type: Term Paper

The company should use the Cisco hedge router to make the company to achieve a reliable communication over the internet. The edge router will also make the company to achieve higher capacity, scalability, and improve routing protocol convergence at lower costs. As traffic volume increases, the solution will allow the company to implement incremental bandwidth upgrades without necessarily changing the router interface. The edge firewall will be used to

Network Design Network ABC Network Design a
Words: 3772 Length: 12 Document Type: Essay

Network Design Network ABC NETWORK DESIGN A Comprehensive Proposal and Design for ABC Inc. Network Requirements Network Proposal Overview Telecommunication Overview Telecommunication Proposal Network Configuration Management Plan In order to meet the needs of the customers, ABC Inc. must insure that productivity is not hindered by the growth of the company. The employees at ABC Inc. must have a robust network so that customer service is not jeopardized. The accounting firm has grown from five to fifty employees

Network Security the Practice of
Words: 1551 Length: 5 Document Type: Term Paper

Conclusion The purpose of this discussion was to examine the network security measures that are available. The research found that the proper configuration provides the first line of defense as it relates to securing a network. In addition, firewalls serve an essential role in securing networks against outside intrusions. The research also indicates that anti-virus software, encryption software and biometrics allow organizations to secure networks in a more comprehensive manner. There are

Network Security
Words: 3486 Length: 8 Document Type: Term Paper

Network Security History and Evolution of Network Security: The term 'Network Security' refers to the concept of the creation of a 'secure platform' based upon which the user of the computer or of a program within the computer are allowed to perform only those specific tasks that are allowed within the parameters dictated by the security network of the computer, and banned from performing those that are not allowed. The tasks include

Network Security
Words: 9364 Length: 25 Document Type: Term Paper

networking and TCP/IP and internetworking. Also discussed are risk management, network threats, firewalls, and also more special purpose network devices. The paper will provide a better insight on the general aspects of security and also get a better understanding of how to be able to reduce and manage risk personally at the workplace and at home. In today's world, the Computer has become a common feature in any organization anywhere

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now