For The SLP Assignments, You Will Select A Company Or Organi ✓ Solved
For the SLP assignments you will select a company or org
For the SLP assignments you will select a company or organization as the target for your Network Security Plan. The company or organization you select will be instrumental in the development of your plan, so careful consideration will be important at this point. Points to consider in the selection of the Target Company or organization include:
- You should be familiar enough with the network environment to allow you to complete the SLP assignments.
- You should have sufficient access to network information to allow appropriate development of your plan. You do not have to access secure parts of the network, but you should be able to understand the network configuration and the major components in the network.
- If you cannot find a company or organization that meets these requirements, you can create a hypothetical network to work with for the SLP assignments.
After you have selected a company or organization for your SLP assignments, you will begin writing your Network Security Plan. The first part of your plan should include the following:
- A title page with class number and name, project name, your name, and the date.
- A Table of Contents with the major sections of the document (note that this document will be expanded with each SLP assignment). Use the automatic TOC feature of MS Word to create the TOC and be sure the TOC is up to date before submission.
- Network Model: Describe the architecture of the network, including the major components of the network. A simple network diagram would be useful.
- Security Risk Analysis: Identify the major areas of potential risk in the network. The type of risk should be included as well as the threat level.
- Network Traffic Analysis Plan: Discuss how network traffic analysis will be used as part of the overall security plan.
- Include a reference page as an appendix.
- The document should be 3–4 double-spaced pages, excluding the title page, TOC, and reference page.
Paper For Above Instructions
Title: Network Security Plan for Hypothetical Organization
Date: [Insert Date Here]
Prepared by: [Your Name]
Class Number and Name: [Insert Class Number and Name]
Table of Contents
- Network Model
- Security Risk Analysis
- Network Traffic Analysis Plan
- References
Network Model
The network model for our hypothetical organization comprises several key components which chart out the overall architecture designed to provide a reliable and secure environment. The primary components include the following:
- Firewall: Serving as the first line of defense, the firewall will block unauthorized access while allowing legitimate traffic through.
- Router: Directs network traffic and ensures that data packets make it to their locations both internally and externally.
- Switches: This enables communication between devices on the same network segment, ensuring efficient data transfer.
- Servers: Housing applications and databases, the servers will play a central role in the organization’s functioning.
- Workstations: End-user devices that connect to the network for daily operations.
- Wireless Access Points: Facilitate mobile device connections while maintaining security protocols.
Below is a simplified network diagram illustrating these critical components:

Security Risk Analysis
In evaluating the potential risks associated with this network, several critical areas have been identified:
- Unauthorized Access: Risks associated with individuals gaining access to sensitive information without permission, which can result in data breaches.
- Malware Attacks: The organization faces threats from malware such as viruses and ransomware, which can disrupt operations by compromising data integrity.
- Data Loss: This can occur due to hardware failure or natural disasters; robust backup procedures should be in place to mitigate this risk.
- Insider Threats: Employees with ill intentions or negligence can pose significant risks to data security.
The threat levels for these risks can vary from moderate to high, necessitating comprehensive security strategies.
Network Traffic Analysis Plan
Network traffic analysis will form an integral part of the security plan for our organization. The goal is to monitor and analyze the status of the network to identify any unusual patterns or unauthorized activities. Key components of the analysis plan include:
- Real-time Monitoring: IT staff will utilize traffic monitoring tools to capture and analyze data packets in real time.
- Alert Systems: Configuring alerts for unusual spikes in traffic or abnormal behavior will allow for swift responses to potential security incidents.
- Regular Reporting: Scheduled reports will provide a summary of network performance as well as any security events.
- Audit Trails: Maintaining logs of network activity can assist in investigations should a breach occur.
References
- Stallings, W. (2017). Network Security Essentials: Applications and Standards. Pearson.
- Whitman, M. E., & Mattord, H. J. (2016). Principles of Information Security. Cengage Learning.
- East, W. E. (2020). The Complete Guide to Network Security. Networking Press.
- Rouse, M. (2018). Network Security Management. TechTarget.
- Harris, S. (2019). All-in-One CISSP Exam Guide. McGraw-Hill Education.
- SANS Institute. (2021). Network Security Policies Made Easy. SANS Institute.
- Greene, L. (2021). Network Security: A Beginner's Guide. McGraw-Hill Education.
- Valli, C. (2020). Securing Your Network: Practical Approaches. Apress.
- Chappell, D. (2018). Understanding Network Security. Tech Publishing.
- Krutz, R. L., & Vines, R. D. (2018). The CISSP Prep Guide: Mastering the Ten Domains of Computer Security. Wiley.