Introduction
A median network is defined as a network whose number of users is between 300 and 1,000. As a basis the student will use the SAFE methodology. The project approach is based on designing a secure network.
Parts
Organization Description – Select an organization that meets the definition of a medium network and will carry out the secure development plan as established by the SAFE methodology. The organization the student selects can focus on designing a new network or improving an existing network. The work does not have a maximum, nor a minimum of pages defined by the teacher, however the evaluation of the same will be based on the following aspects:
- Work Level – Using the SAFE methodology as the main reference throughout the work
- Types of Protection – Defining the types of protection to use
- Including Configuration Parameters – Specify which configuration parameters to use to mitigate risks related to different threats. This part requires to present specific technical examples
- Inclusion of a Threat Management Plan – Define the threat management plan according to the methodology, it should be chord the types of protection and configuration parameters used
- Inclusion of a Threat Monitoring, Analysis and Correlation Plan
- Inclusion of a Threat Control Plan
- You should use diagrams if necessary
• Planning Phase – Explain in detail the design planning to be proposed, it must include justification for the design, propose a budget (team, human resources, consultants etc.)
• Design Phase or You must define the modules to include in the proposed secure design or Modules must comply with the SAFE methodology
(Campus, Enterprise, Data Center, WAN Edge, Branch etc.) o Include diagram of the proposed network, equipment to be purchased,
o Include configuration elements to be used in each of the modules that include controls to mitigate threats and address the need for the organization in terms of the effectiveness required for optimal network operation
o Address planning
o Use of network protocols (Routing, Switching) and that the use of them is justified within what establishes the SAFE methodology and the need of the organization
• Deployment Phase – Include how the deployment process will be carried out, proposed time plan (Gantt Chart) that includes all tasks and the sequence of execution of them.
• Operational Phase – Include the maintenance plan for the proposed solution. It should include the administrative profile and monitoring plan, in addition to the intelligent threat mitigation security plan.
• Optimization Phase – Define the appraisal plan in relation to the health of the system and define the action plan if design optimization is necessary according to the cycle set out in the SAFE methodology guide.