Security infrastructure design document


Asked by wiki @ in Computers And Technology viewed by 1798 People


In this project, you’ll create a security infrastructure design document for a fictional organization. The security services and tools you describe in the document must be able to meet the needs of the organization. Your work will be evaluated according to how well you met the organization’s requirements. About the organization: This fictional organization has a small, but growing, employee base, with 50 employees in one small office. The company is an online retailer of the world's finest artisanal, hand-crafted widgets. They've hired you on as a security consultant to help bring their operations into better shape. Organization requirements: As the security consultant, the company needs you to add security measures to the following systems: An external website permitting users to browse and purchase widgets An internal intranet website for employees to use Secure remote access for engineering employees Reasonable, basic firewall rules Wireless coverage in the office Reasonably secure configurations for laptops.
The following elements should be incorporated into your plan:
Authentication system
External website security
Internal website security
Remote access solution
Firewall and basic rules recommendations
Wireless security
VLAN configuration recommendations
Laptop security configuration
Application policy recommendations
Security and privacy policy recommendations
Intrusion detection or prevention for systems containing customer data

Answered by wiki @


Answer and explanation:

Authentication:

authentication can be done by using the user id and password, by using social sign in or by using the biometrics. Authentication means verify the user who they claim they are and to grant them access.

Authentication works as follows:

Prompting the user to enter the credentials.

Send the credentials to the authentication server.

Match the credentials.

Authorize the user and grants the acces

External Website security:

External Website security is important to protect the website from hackers, electronic thieves and to prevent security breach.

Use of firewall.

Implement the access control.

Use of MVC (Model View Controller) to create different view for different type of user.

Use of encryption.

Use of SSL certificate.

Use of security plugins.

Implement tools and techniques for backup and disaster recovery.

Use of network monitoring team.

Internal Website security:

Use of authentication to identify the user identity.

Use of authorization to provide different user with the specific privileges and access.

Encrypt or hide sensitive web pages.

By implementing IT policies.

Educate the user about the website.

Remote Access Solution:

Remote access provides better security, cost efficiency, ease of management, and increased availability.

Remote access can be deployed by using the RAS gateway (single tenant or multi-tenant):

VPN(Virtual private network), BGP(Border gateway protocol), hyper-V network can be used to provide the remote access.

Remote access can be provided by simple configuration. Remote access involves enabling user, managing their access, protecting the assets, use of remote desktop protocol and managing server sessions, remoteApp and personal and pooled desktop.

Firewall and Basic rules recommendations:

Firewall is important for managing the traffic and providing external website security.

Rules to prevent SQL injection and XSS.

Allow only the specific type of traffic.

Use access rules for IP security.

Implement certain IT policies.

Can implement their own rule.

Wireless Security:

Nowadays Wifi is being used in every organization and it prevents the network from malicious and unauthorized access.

Wireless security can be provided by the use of encryption, decryption, authentication and authorization.

VLAN configuration:

VLAN are important for traffic filtering and providing the logical division of the network.

VLAN can be configured for web interface and can provide web filtering.

In the following manner VLAN can be configured for web interface:

Switching => VLAN => Advanced => VLAN Membership

Switching => VLAN > Advanced => Port PVID Configuration.

VLAN web filtering:

VLAN can be configured between router and firewall, router and gateway, router and switch and by doing so one can filter the web traffic that passes the network.

Laptop Security Configuration:

Use of password, VPN and registering the laptop by their MAC address will provide laptop security. Use of security tool for local machine is also a good option. Use of device level authentication by using local username and password is also a good idea.

Application policy recommendations:

Application policy includes use of cookies, social media integration, access control, generating notifications and implanting other organization and IT rules.

Security and privacy policy recommendations:

It includes the list of security methods to be implemented for traffic filtering, IP spoofing, user authentication and other specific policy for the website.

Intrusion detection or prevention for systems containing customer data:

IPS is implemented behind the firewall and it matches the incoming traffic against the security policies. It matches the signature and handles the intrusion if any and generates the log and alerts for the same.

IDS goal is to identify malicious traffic before it can proceed further into the network. It generates alerts and notification so that the network monitoring team can look after the intrusion.

Use of anomaly based detection and prevention system is the better choice.

Similar Questions

Ipsec is designed to provide the security at the

Asked by admin @ in Computer Science viewed by 324 persons

IPSec is designed to provide security at the........... A) transport layerB) Network LayerC) Application LayerD) Session Layer​

Overcoming fixed mindset: a step-by-step guide to cultivating a growth mindset

Asked by wiki @ in Health viewed by 1192 persons

Which of the following would best complete this list?

Asked by wiki @ in Social Studies viewed by 682 persons

What had the king decided to do before he saw the spider

Asked by vanshika149 @ in English viewed by 1059 persons

Describe the karez in your own words

Asked by rajesh064 @ in English viewed by 1213 persons

What is 8 + (x + 5)?

Asked by jaylord7 @ in Mathematics viewed by 1020 persons

What is the topic of the info grapher

Asked by jesus643 @ in History viewed by 1307 persons

Elephant kills 11 in nepal , woman rescued from a friendly dolphine

Asked by kavin044 @ in English viewed by 1187 persons

(-3,0);slope =2/3

Asked by timothy2 @ in Biology viewed by 1459 persons

Which is an example of situational irony in "wherefore art thou romeo?”

Asked by noah5213 @ in English viewed by 1468 persons

Most viewed questions in Computers And Technology


Codehs python answer key

Asked by maham237 @ in Computers And Technology viewed by 2077 persons


3.4 6 t shirt shop codehs answers

Asked by maham237 @ in Computers And Technology viewed by 1846 persons



Security infrastructure design document

Asked by wiki @ in Computers And Technology viewed by 1798 persons


Codehs python answers

Asked by maham237 @ in Computers And Technology viewed by 1162 persons


In the business world people are often measured by their

Asked by maham237 @ in Computers And Technology viewed by 1096 persons




Banana fee fi fo fana song

Asked by maham237 @ in Computers And Technology viewed by 792 persons


List 10 www standards that the w3c develops and maintains

Asked by maham237 @ in Computers And Technology viewed by 778 persons


Open the excel workbook revenue xls from the default directory

Asked by maham237 @ in Computers And Technology viewed by 742 persons



In order to protect your computer from the newest viruses

Asked by maham237 @ in Computers And Technology viewed by 737 persons