
HI6006 Competitive Strategy Editing Service
Delivery in day(s): 4
The Community College (CC) is one of the fastest growing educational institutes for which the headquarters is located in the Northampton main campus. CC is providing its educational service through its nine (9) branches located in the regional and metropolitan areas of Northampton. The institution is providing educational service program for two types of students. The students who study in regular and the others who study through online and distance education programs. The institution headquarters facility is located in the Northampton main campus. Operation facility of the institute is located 50KMs from the Headquarters in a warehouse near an industrial area, this facility holds the back-office technical functions, data center and IT staff. The Backup facility is located in the country area of about 1000KMs from the Headquarters. For the past two years the number of students and institution services are doubled and senior management of the CC has identified enrolment for both on-campus and distance education will increase by 50% within next three years. The CC institute has planned to improve its services to meet the future requirements as well as to reduce the risks in the networking. Therefore, this work is focused on designing and implementing a secured information and network infrastructure to enhance the availability of the services, reliability, scalability, high performance of the information system of the institution and improving the security support of CC services. The current network design of the CC institute can be easily upgraded and they have used T3 leased line connection and 100Base-TX Switched Ethernet to establish network link between headquarters, operations and backup sites. Adding additional servers and backup devices to improve the performance and functionalities, reducing the network traffic by deploying appropriate devices and components in the network. Deploying VPN and using wireless LAN connections to provide better networking. The primary objective of the network security draft plan is addressing the network requirements to meet the future needs and network security requirements of the CC institution.
This project mainly concentrates on redesigning the existing network of the CC institution to meet the current and future demands. They are focused on implementing highly secured networking to provide better service to the students and to create a better communication medium between staffs to students, staffs with other campus staffs to improve their research work
Some of the important objectives of this security plan are as follows;
The network design of the CC institute is going to concentrate on reducing the network traffic by increasing the performance of the servers and backup devices. Identifying and deploying improved WAN links helps to reduce the network traffic and for the forecasted growth (CISCO, Retreived on 2016).
Monitoring the email and communication activities in the institute helps to minimize the problems because most of the virus and malicious codes are shared with the email attachment (FireEye, Accessed on 2016).
Creating policy to set password for the account will help to minimize the security risks. Users of the network can select strong passwords with the combination of uppercase, lowercase, numbers and symbols which will help to minimize the password guessing attacks
Implementing secured network for the CC institute provides many advantages but the institution needs to face some serious risk in developing the network. They are as follows,
Numerous security attacks and vulnerabilities are available in the internet with the help of these mechanisms attackers can easily access a private network. There are numerous tools available to access the data which is transmitted through network. Some of the attacks used by the unauthorized users to access the network is as follow,
Anyhow CC institute can use some mitigation techniques to avoid these kinds of attacks in the network. With proper training and awareness the institute network specialist can easily control the various attacks and using proper tools will help to secure the network from these kinds of attacks.
Using better security policies and procedures will help to slice the threats and attacks in the network. Using the encryption mechanism will help the CC institute to minimize the risk in the network and helps to avoid the unwanted attacks. While sharing the information through the internet it needs to be in an encrypted format which makes it hard for the attackers to access the original data without proper decryption code. Attackers can’t retrieve the original message from that encrypted data.
By categorizing and providing different access permissions to the users of the CC institute helps to reduce the unauthorized and misappropriate use of the CC data and software project. Currently, CC institute has different types of users such as regular students, online and distance education students, guests, staffs, faculty and employees. Providing different access permissions to the users in the network helps the CC institute to secure confidential information from the unauthorized users (Loukas & Oke, September 2010).
Driving different policies for the information access will help a lot to the CC to track which user accessed the information from the database and at what time.
The CC institute handles different types of data such as student personal and academic information, staffs and faculty information, accounts and financial information. All this data are stored in the backup center of the CC institution. The institute is providing the educational service to its students in different ways, so it needs a large storage to store the details. There are many possibilities for human and natural issues with the databases and networking devices. To avoid these issues and critical situations the institute needs to deploy extra backup servers. These systems automatically collect and store every day activities and processes of the CC institution. Any problems occurring in the institute network or in database server then it starts to provide the service the users (BRANDON, Accessed on 2016). To ensure that the disaster recovery and business continuity replica of backup database of the CC institute is deployed the system properly. This disaster recovery system helps the CC institute to provide better service and meet the future requirements of the users. The CC institute may deploy one hundred petabytes of additional storage device to store a replica of information system. They can use the cloud services to store and work with information and it provides many benefits to the institute and it is cost effective (Alhazmi, Accessed on 2016).
Using the listed security mechanisms in the network of the CC institution helps to secure its network, systems and applications from the threats and vulnerabilities,
Security for network
To conclude, implementing the above mentioned network design plan helps the Community College to avoid security and data breaches in the network. This network design will help the Community College to meet the future requirements and to provide better service to the distance education students who study through online. So this network design helps to control the various attacks but the price of implementing this network is little bit high. Institution has to buy advanced networking tools to complete the network implementation. Once the implementation is completed successfully then the Community College can easily manage its campus data and can provide better network services to students, staffs and employees.
Alhazmi, P. D. (Accessed on 2016). Evaluating Disaster Recovery Plans Using the Cloud. https://www.researchgate.net/publication/244478078_Evaluating_Disaster_Recovery_Plans_Using_the_Cloud.
BRANDON, J. (Accessed on 2016). How to Use the Cloud as a Disaster Recovery Strategy. http://www.inc.com/guides/201106/how-to-use-the-cloud-as-a-disaster-recovery-strategy.html.
CISCO. (Retreivedon 2016). What Is Network Security? http://www.cisco.com/cisco/web/solutions/small_business/resource_center/articles/secure_my_business/what_is_network_security/index.html.
Cobb, M. (Accessed on 2016). Network password security: Following password policy best practices. http://www.computerweekly.com/tip/Network-password-security-Following-password-policy-best-practices.