Relationship between infrastructure and security
The way the network has been planned has significant impact on the way the security of the company will be undertaken. It is important to understand the gateways and the security devices have been planned. It is also important to understand the policies that have been put in place to have the data of the company protected. There is a need to analyze the flow of information so that the diagnosis of any security faults will be easy to identify. Security depends so much on the infrastructure that has been put in place in the company. There is a need to put more investment in the company infrastructure. Attackers make use of network faults to exploit resources and gain access. This is why the security of any organization will depend much on the way infrastructure has been set. This is an important component that should be put in place. The devices that are integrated in the network play an important role in the network and should be put in place to ensure that the network is secure. With the data collection process and analysis, infrastructure plays an important role in the whole process. There is a need to ensure that the network has been designed to have the data analysis and collection protected. The data of the company goes through the networks and there is need to have security of the network assured (Efstratiou et al., 2010).
Physical network plan
The physical plan for the network is that each floor should have a server. This means that departments which will share the same information and databases should share the same floor. This means that the finance and accounting departments will be located in the first floor. All the host computers which will share the data from one server will have to be in one floor. Each floor will have a firewall installed which will be used to eradicate unwanted access to sites that are suspicious. This is an important concept so that the websites that are a source of threats will not be allowed to the network (Kizza, 2011). The design of the floors will depend on the requirements of the users and the departments in that floor. The devices in these floors will dictate the level of security that will be available in the floor.
Logical design of the network
The logical design of the network is an important aspect. It determines how the tools that will be used in the network will be designed. One aspect that needs to be undertaken in the design of the network is that of the antivirus protection tools. The antivirus should be installed in the servers. This will enable the servers to distribute updates to the host computers which are connected to them. There should also be the inclusion of encryption n the network so that the data is kept confidential and with the required integrity.
Proposed network topology
Rationale for the physical design
The various choices which have been made for the physical and logical designs of the network include the fact that having one server for all the floors will make the connectivity and processing of services slow. There should be less computers using one server.
Rationale for logical design
The rationale that has been used to choose the installation of anti-attack tools in the server is because of the distribution method of the updates and security patches. The server will download all the security updates and antivirus updates and distribute to the host computers. This will ensure that there is one point of control for the network.
Protection of company information
There is a need to protect the company information from attacks. The three areas of data protection include data integrity, confidentiality, and authentication. The data should be confidential so that the people who are supposed to access it remain the genuine people who have the access. This will be provided in the company by ensuring that there are security controls. Some of the security controls include the use of passwords and biometric access methods. Data integrity is the feature where the data is still intact and has not been altered. One way in which this is assured is by using cryptographic keys to encrypt the data. The last is authentication. This is where the right people access the data. Use of access controls is the strategy that will be used to achieve this.
Security policy of the company
The company will make use of the following policy so that company information will be protected from attack. All staff will be guided by this security policy put in place to be used in the company. This policy is to be used to protect company information and data. In case of any issue arising, the staff will have to refer to this policy.
- Access levels
There will be access levels set in the company that will guide on the levels that staff are allowed to operate from. Administrators will only be allowed to access administrative controls of the network. Any staff that shall be found to have accessed levels they are not allowed to access will be liable to company punishment.
- Individual profile management
There shall be profiles created for the different users in the company. The profiles will have username and password and the personal preferences that will be managed by each individual in the company. Users are required to protect their passwords and username and should not use with any other member of the staff or any outsiders. All passwords should be kept in safe places where they will access them alone.
- Bring Your Own Devices (BYOD) policy
Individuals who will come with their own devices to the company premises will be required to protect them and should not save any company information in these devices. They should seek company and security approval before they use these devices.
- Ethical concerns
All staff will be required to observe confidentiality and the integrity of company data and information. They are not required to display any information to outsides.
Updated Work Breakdown Structure
Updated Gannt Chart
Efstratiou, C., Leontiadis, I., Mascolo, C., & Crowcroft, J. (2010, November). A shared sensor network infrastructure. In Proceedings of the 8th ACM Conference on Embedded Networked Sensor Systems (pp. 367-368). ACM.
Kizza, J. M. (2011). Computer network security and cyber ethics. McFarland.
Kurose, J. F., & Ross, K. W. (2012). Computer networking. Pearson Education.