Closed

Security Project - JNCIS

Security Project

The goal in this project to redesign the network security infrastructure for Spyon Technologies so that it meets the business requirements for the organisation, and to write a detailed proposal which you will submit to Spyon Technologies for consideration.

To complete this task, you will submit a final design proposal to Spyon Technologies which will include:

• a detailed list of business requirements that must be met by the network security design

• a complete and detailed discussion of the network security design proposal. This must include complete logical diagrams of the redesigned network and a discussion of the techniques and technologies used, e.g. Clustering, zones, policies, authentication, encryption, and VPN's

• details of how the network security design will meet all the business requirements

You will also need to:

• Prepare implementation plans

• Document the network design and present the documentation to the appropriate person for approval

• Present the design in a clear and logical fashion

• Provide advice to the client on reasons for your design choice.

The most important idea to keep in mind is that the goal of any proposal is to convince potential clients to award you their contracts.

The scenario and questions below will guide you through many of the things you will need to consider for your proposal. You need to answer the questions and then write your proposal.

Scenario

You are employed by Spyon Technologies, a global business that manufactures weapons and military technology and equipment. You work in the cyber security division as a network engineer. Your role is to assist with the planning and implementation of security measures and general network infrastructure.

Company profile

Spyon Technologies is a global security and aerospace company that employs about 120,000 people worldwide and is principally engaged in the research, design, development, manufacture, integration, and sustainment of advanced technology systems, products, and services. The Corporation's sales from continuing operations are $46.5 billion P/A.

The company's primary business is in supplying military equipment to Governments around the world.

Company's Security Statement: Cyber Security attacks continue to increase in frequency and sophistication for the Aerospace and Defense industry. Adversaries are targeting anyone who possesses the sensitive information they seek including the government, prime contractors, and suppliers. It is imperative that our suppliers understand what's at stake and recognize our shared role in protecting sensitive information and intellectual property. A single mistake or breach could have enormous consequences for our customers, our business, the Aerospace & Defense Industry, and national security.

The Spyon Technologies Cyber Security Alliance combines the strengths of market leading companies' solutions and integrates their best practices, hardware, software and tools within the NexGen Cyber Innovation and Technology Center.

IT Services

Spyon Technologies uses the following server technologies:

[login to view URL] servers for the company intranet and Web applications. This is accessed by remote workers.

[login to view URL] servers - Used by internal and external staff

[login to view URL] Communications servers

Security Requirements

Much of Spyon Technologies business dealings involve top secret military projects with governments around the world. It is imperative that the details of these projects remain confidential. The following security measures are required:

1. The security perimeter must prevent all unauthorized access to company data.

2. All WAN links must be encrypted and secured.

3. All electronic communication within the company and with third parties must be encrypted and digitally signed.

4. Measures must be put in place to protect against DOS, DDOS, viruses, and all other cyber security threats.

5. The solution must be fault tolerant by eliminating single points of failure

Skills: Security, Network Security, Network Administration

See more: flash project website redesign, scope security awareness project, built microcontroller based fingerprint recognition security system project, gsm based car security system project, security consulting project, visual basic security cam project, security testing project, java security provider project, usb security key project, home security system project, adt security outbound project, security capstone project, ecommerce websites security analysis project details, fingerprint based security system project, implementation security php project, luggage security system project, luggage security system project report, luggage security system project report detail, network security based project

About the Employer:
( 0 reviews ) Brisbane, Australia

Project ID: #30145140

9 freelancers are bidding on average $240 for this job

FutureNOWPK

Hello I admire the detail provided. I've a good deal of experience in IT Hub in one of the largest MNCs. I'd love to be given the task. Lets discuss the quality and length criteria vs time constraints. Regads

$220 AUD in 9 days
(7 Reviews)
4.3
delwaralam

I am a Cyber and information security expert and I have passed CEH. I invest my time and skills to help people protect their business from Cybercriminals. My specialties are 10+-years of experience, Information Securit More

$450 AUD in 15 days
(3 Reviews)
3.6
ExpertSoul

I can help you with Security Project Let's discuss together the project via chat So we can make a deal !!! Thank you

$140 AUD in 1 day
(2 Reviews)
2.7
yasiriqbalengr

Hello, I am Yasir Iqbal. I have my MS degree in Cyber Security. I have worked in ISO 27001, from gap analysis to asset identification, risk assessment, and vulnerability mitigation. I have made compliance and audit rep More

$250 AUD in 7 days
(2 Reviews)
2.8
Dianimohamed

hello, I introduce myself, I am an information systems security engineer, certified in several security solutions (FORCEPOINT, CISCO ASA FIREPOWER, FORTINET, ....) also I have a CEH V10. I read your need and I infor More

$278 AUD in 5 days
(0 Reviews)
0.0
intells

Hello, Good Day. We have read the requirements of your project. Therefor We would like to let you know that we can fulfil your requirement properly as we have the experience of working in this sector for many years no More

$180 AUD in 10 days
(0 Reviews)
0.0
lovkeshbogra

I am establish Cyber-security professional with 12+ experience. I am working as an Architecture and prepare Technical Proposals, Designs, did Implementation, Transitions, Assessment and Migration projects for various More

$250 AUD in 7 days
(0 Reviews)
1.6
issaouiMed

hello, Based on the details you provided we can deliver a Beta version of the offer in 15 days. After discussion we can deliver the final offer after one week. Please consider my company expertise in this field, large More

$140 AUD in 15 days
(0 Reviews)
0.0
ATLASteam

Hi there ! My Team with 6 years of experience in security engineering do a lot of projects just like yours on many similar project . They gives Us just the right experience and perspective that your looking for. In 20 More

$250 AUD in 7 days
(0 Reviews)
0.0