Define the perimeter security requirements for your network


Perimeter Security

The project deliverables are as follows:

• Update the Information Network Security Architecture Design document title page with a new date and project name.
• Update your previously completed sections based on instructor feedback.
• Perimeter Security

o Perimeter Security Requirements

- Define the perimeter security requirements for your network.
- Research Internet and Web perimeter security models, and select a model that is appropriate for your network.
- Describe the model, and identify the appropriate aspects of the model that are associated with your requirements.

o Perimeter Security Design

- Provide a design for the perimeter security architecture of your network based on the model you selected in the previous step.
- Your design should include the following areas for consideration:
- State-based filters
- Border routers
- Screened subnets
- Internet Protocol Security (IPSec)
- Intrusion Detection Systems (IDS)
- Proxy firewalls
- Digital signatures
- Access control list filters
- Fail-safe equipment
- Equipment redundancy

• Be sure to update your table of contents before submission.

Solution Preview :

Prepared by a verified Expert
Computer Network Security: Define the perimeter security requirements for your network
Reference No:- TGS01712434

Now Priced at $40 (50% Discount)

Recommended (92%)

Rated (4.4/5)