Choose any business organization with multiple branches you


Designing a Complete Network Security Policy

Learning Outcomes: At the end of the assignment, student should be able:

To have an understanding of the network security issues in organizations and how to solve them by developing and applying a network security policy, which contains different security techniques and solutions at different levels in any organization.

Company: (Choose any business organization with multiple branches you wish to secure with complete description and background of services and other offerings)

As network security specialist your task is to develop and design a complete network security policy for the organization you have selected securing its network from different security vulnerabilities in a WAN environment where users will not only be connected locally but also globally using Internet.

It must focus on securing following aspects:

? Individual users security

? Securing PC's and other peripheral devices

? Securing Mobile devices and their connectivity

? Securing Network devices and equipment's

? Securing different Servers

? securing Network Bandwidth

? Securing Emails and email Servers

? Securing Webservers and organizational website

? Securing Remote access users and sites etc.

Individual Deliverables (Research & Documentation by individual members)

You have to complete this assignment by coming up with a complete security plan including a proper layered security strategy mentioning about security protocols, services allowed and disallowed, authentication and authorization systems, network security devices (hardware and software), firewall & their configurations, IDS and VPN systems, Remote Access Systems for remote users etc.

The complete network policy should have a practical implementation approach with regard to administrative perspective. It must be properly documented with
references, justifications and diagrams wherever necessary to deem the assignment being successfully completed.

You have to research and find best optimal and practical solutions for above components by giving proper evaluations to justify your policy solutions and arrange them in a complete network security policy to secure the organization.

Deliverables

Based on the above requirements you have to develop a document and submit it to blackboard with all your group member details with their specific tasks they performed in a matrices table.

Expected length is 5,000 - 7,000 words, with as many illustrations as possible and with all references clearly  indicated and provided. You can use a diagramming application, e.g. Visio, for diagrams and copy them to the Word Document.

Request for Solution File

Ask an Expert for Answer!!
Management Information Sys: Choose any business organization with multiple branches you
Reference No:- TGS02706786

Expected delivery within 24 Hours