Advanced Network Security
Contents 1. Introduction..........................................................................................................3 2. Project Scope: ......................................................................................................3 3. Statement of Work: ..............................................................................................3 4. Current Security Environment: ............................................................................3 5. Security Policies ..................................................................................................4 6. Disaster Recovery and Business Continuity Plan ...............................................4 6.1
RAID.................................................................................................................4
6.2
Microsoft and Veritas Clusters .........................................................................5
6.3
High Availability of DNS:................................................................................5
7. Risk Management Plan ........................................................................................5 8. Basic Network Security to the network ...............................................................6 9. Further Security Procedures ................................................................................8 9.1
Managing the switches and routers ................................................................11
9.2
Managing MacAfee Anti-Virus......................................................................12
9.3
Managing FortiGATE Firewall ......................................................................12
9.4
Managing a Windows Proxy server. ..............................................................13
9.5
Managing DHCP Server .................................................................................14
9.6
Managing Active Directory Users and Computers ........................................15
9.7
Network security policies and practices you could implement ......................16
10.
The following are all some of my recommendations for general security.....17