Security Final Project

Over the last 11 weeks you have acquired additional information regarding TCP/IP, protocols, and specifically how this all plays a vital role in networking.  I realize that some of the material is “dry”, but when it comes down to it… having a knowledge base of the content, how it is setup, along with how to analyze and troubleshoot will carry you a long way in growing and developing your network administrative career.

The missing part of the puzzle, and one could make an argument that it is the most important part…. TCP/IP and Network Security. It is not just “good enough” to have a functional and well performing network. That network and the resources you allow and provide to your users, customers, etc could create security nightmares, which in the end could be the complete demise to your network.

The Scenario:

You are a network admin that has been put in charge of revamping and implementing new network security policies for a growing company.  The company is a Sports Clothing Company with stores located throughout the North West United States. You specialize in Bikes, Mountain gear, apparel, and accessories. In addition you have your own brand of Bikes.  (Originally where it all began). and your bike factory is located in Seattle, WA.

You have the following break down of People, Places and Resources:

Administrative Office – Seattle, WA

  • 25 employees
  • accounting / payables
  • inventory
  • business office
  • marketing office
  • sales team headquarters (sales team needs remote access for reports, place orders, etc)
  • IT Office with File Servers / WebServer / Email Server / Operations Server

Bike Factory / Warehouse – Seattle, WA

  • Bike manufacturing
  • Bike parts (Note: you have ongoing B2B with suppliers)

Brick & Mortar Locations

  • 30 different retail stores located throughout the North West
  • Remote Access to Business office (secure)
  • financial and inventory (daily interaction with main office)

 

Using the above information, you need to design, develop and recommend an implementation of a security based network. You can make what ever assumptions you would like about the network, however you must research, design and develop the “new” security policies / provisions to be put in place.

Using details in Chapter 12 for your book. You should account for:

  • VPN access (different types)
  • Financial transactions (stores to business office) (B2B transactions), etc
  • Outline Threats / potential breeches, pitfalls
  • Physical Security
  • Personnel Security
  • System and Network Security
  • Pay attention to topics in Principles of IP Security
  • Attacks, Exploits, and Break-Ins
  • Holes, Back Doors, and Illicit Points of Entry

Your report should be nicely outlined and developed:

  • Cover Page
  • Current Network Setup (prior to doing any work) – NOTE you make this scenario up – but in general you have NO security provisions.
  • Break down of the different areas of focus for your Security Plan (Note, you should be using details and terms outlined in the book along with your research)
  • Summary of your plan