All You Need To Know About Network Security

Page 1

Advanced Network Security

Contents 1. Introduction..........................................................................................................3 2. Project Scope: ......................................................................................................3 3. Statement of Work: ..............................................................................................3 4. Current Security Environment: ............................................................................3 5. Security Policies ..................................................................................................4 6. Disaster Recovery and Business Continuity Plan ...............................................4 6.1

RAID.................................................................................................................4

6.2

Microsoft and Veritas Clusters .........................................................................5

6.3

High Availability of DNS:................................................................................5

7. Risk Management Plan ........................................................................................5 8. Basic Network Security to the network ...............................................................6 9. Further Security Procedures ................................................................................8 9.1

Managing the switches and routers ................................................................11

9.2

Managing MacAfee Anti-Virus......................................................................12

9.3

Managing FortiGATE Firewall ......................................................................12

9.4

Managing a Windows Proxy server. ..............................................................13

9.5

Managing DHCP Server .................................................................................14

9.6

Managing Active Directory Users and Computers ........................................15

9.7

Network security policies and practices you could implement ......................16

10.

The following are all some of my recommendations for general security.....17


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.