Question: oull create a security infrastructure design document for a fictional organization. Your plan will be evaluated according to how well you met the organization's requirements.
oull create a security infrastructure design document for a fictional organization. Your plan will be evaluated according to how well you met the organization's requirements. Points will be awarded based on how well you met these requirements, considering the security implications of your choices.
The following elements should be incorporated into your plan:
Authentication system
External website security
Internal website security
Remote access solution
Firewall and basic rules recommendations
Wireless security
VLAN configuration recommendations
Laptop security configuration
Application policy recommendations
Security and privacy policy recommendations
Intrusion detection or prevention for systems containing customer data
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
