Monday, November 4, 2019

Network Security

Network Planning - Proof of Concept


How to design a secured network (methods):

ZAWANAH

  1. Identify the network assets (hardware, software, employee)
  2. Analyze the security risks (hackers)
  3. Analyze the security requirements (backup)
  4. Develop a security plan (plan if any of the security risk happen)
  5. Define a security (rules of the security, e.g. don not change the setting of the computer)
SABRINA
  1. Set clear administrator Privileges
  2. Secure your private network
  3. Secure endpoints by Configuration Demilitarized Zone (DMZ)
  4. Monitor the network
  5. Maintain Firewalls
  6. Establish Intrusion Detection and Prevention Systems
  7. Protect Remote Access
HAZWAN HASSAN
  1. Exam the system of the company
  2. Interview employee what they know and what kind of guide they've received
  3. Start planning design
  4. Set up Firewall
  5. Set up IP router
HAZWAN HAILE
  1. Prepare - identify the assets (hardware, software, employee)
  2. Plan - make sure all the devices are listed down such as network devices, connection, security.
  3. Design - draw the draft sketch of the design
  4. Implement - create the network by following the design draft
  5. Maintenance - configure the setting of the network design
  6. Testing - test the implemented network design to make sure it is working and connected
MISS J
  1. Identify all the assets (hardware, software, employee. e.g. identify what they need or what they already have)
  2. Identify the budget
  3. Identify the problem (virus, hacker)
  4. Identify the solution (installing anti virus to prevent viruses, installing firewall to prevent hackers)
  5. List down all the software and network security hardware
  6. Identify the secure connection (what are the cable that suitable to use and how to connect)
  7. Sketch and plan your design
  8. Ask for the approval from the organization itself (is it design good or no? ask approval until it get approval)

The different types of network security designs that will aid good network security:

FARAH
  1. Antivirus
  2. Network Access Control (NAC)
  3. Data Loss Prevention (DLP)
  4. Email security 
  5. Endpoint security
  6. Firewall
  7. Intrusion Detection System & Intrusion Prevention System
  8. Virtual Private Network (VPN)
SYUKRI
  1. Network Access Control (NAC)
  2. Application Security - secure all the apps of the software that network use
  3. Email Security 
  4. Antivirus and anti-malware software
  5. Wireless Security 
ERRA
  1. Firewalls - monitor the incoming and outgoing traffic
  2. Virtual Private Network (VPN) - allow remote access to secure corporate applications or other resources
  3. Network Access Control (NAC) - strengthens network by controlling its access
  4. Data Loss Prevention (DLP) - responsible for securing the communication network of an organization in order to protect its sensitive data.

No comments:

Post a Comment