2000 words report about a network configuration — 2
Project detail
In this task, you are considered as a technical security officer in a company. The IT department
provided you with an overall network configuration of the company (Figure 1). Your line manager
asked you to identify and explain all necessary security protocols and devices (devices mean not only
physical devices but also software packages in this context) to be used in this configuration.
The company has a headquarter and a branch. Their IT facilities are connected using the Internet. The
customers of the company (clients) are also connected to the permitted applications using an
authentication server. You are asked
1) to identify all security protocols and devices used in this configuration.
2) to explain one of them based on your choice.
3) to provide your comments on what is/are missing in this in terms of security.
2. Analyse requirements for the design of a
security system for a given scenario and evaluate it under various constraints. “ You will analyse the
given configuration and gain advanced knowledge on one of the security protocols or devices used in
this scenario. You will evaluate the configuration and make suggestions to improve it in terms of
security concerns.