Set of Requirements for the Network Solution
For this case, the attorneys will need to access the company network both from within their offices and when they are on site. The set of requirements for this will be the provision of a corporate WAN network that will only allow the authorized personnel to access it within the office. The second requirement for the mobile network is the provision of a Virtual Private Network that will allow the mobile users to access the company resources outside their offices while still maintaining security of the firm’s information. The access to the network will need to be secured and will prompt users to input their user names and passwords before accessing the system. It will also need the users to uphold the password policy for the access of the information to prevent access by other intruders .
The subsequent requirements is on the storage of the information in which the main data center in the main office will need to have various security measures to prevent intrusion on the data. This will be by the use of perimeter and firewall system on the data center. The communication between the main office and the other offices will be done by the provision of an aggregation router that will relay the information to the two other locations .
The physical records will need to be secured in a safe that will only allow authorized individuals to access it. This will also need double authorization to the system with access card, eye and fingerprint recognition for the employee .
The devices used in the companies will need to be secured by antiviruses. This is due to the fact that users will also bring their own devices at work and will need to access the corporate network through it and thus authentication of the devices and security for the devices will be needed.
There is also a requirement for the physical monitoring of the system by the use of cameras in the workplace and at the storage facilities.
Information Protected and Security Requirements
The sensitive information to be protected in the firm will include the client company and individual information, the patents stored in the firm, the firm’s user login information to the company system and the company’s private information. The related security requirements is the need for password protection in all the user login to the system, firewall for prevention of information access and CCTV system for monitoring of facility. There will also be intrusion detection system and antiviruses to prevent the entry of malicious information on the devices used by the employees.
There is the need for security of the information communication between the users. This can be in terms of email communication, upload of files from remote areas and update of the information on the company network. The security requirement is to allow for encrypted communication between devices through either a secure channel like VPN and firewall to prevent external attack .
Types of Network(s), Components, Devices and Equipment
The following are the list of networks, components and devices that will be involved in the provision of the given network system.
-The Wide Area Network which will be the corporate network between the three offices in different locations for stationary offices
-the Virtual Private Network for the secure access outside office through the internet by attorneys
-The aggregation router and core switch for routing network to the three office location
-Local Area Network for access of network through laptops and desktops in the office
-The Wi-Fi network for the access of network by employees personal devices
-Routers for the provision of Wi-Fi network
-LAN cables for connection to office phones, laptops and desktops
- Secure Mobile devices for mobile attorneys
-Access Control System like fingerprint, face recognition and password system for access to safe storage facilities
-The card reader system for access to the main office firms doors
-CCTV camera system and alarm system
Network Design Diagram
Benefits of the Proposed Network Solution
The proposed network solution offers a wide range of benefits as below:
The first benefit is that it offers a secured connection by the users. This is done by the introduction of password systems that will need authentication before allowing users into the system. The system will also have physical access control units that will have the likes of card readers, finger print access and facial recognition system to allow only for authorized personnel into specific areas. The document storage areas will remain armed at any given time and any unauthorized access will trigger an alarm system and the access will also require double authorization to the system .
The system allows for flexibility. The network like the cloud services that will be used by the company will allow the users to access the company portal everywhere easily while at the same time providing security.
The system allows for flexible future expansion. The proposed network solution is highly scalable and can allow for easy future expansion by only expanding on the bandwidth of the system. The devices used have upward compatibility capability and downward compatibility capabilities thus the integration into any future system will be easily achievable .
The proposed network solution will also reduce the cost in the company. This is done by allowing the employees to use some of the allowed personal devices at work in the secured network. The case application is the use of personal devices in the mobile environment instead of purchase of other devices for the employees
The proposed network system has a wide range of network connectivity within the offices like the Wi-Fi and LAN cable system for ease of access to the network. The additional systems like CCTV cameras will provide physical security and monitoring of the facilities.
References
BSIA. A specifier's guide to access control system. British Security Industry Association, 2012.
hp. Grow your small or midsize business with a scalable network: A guide to understanding networking technologies. Business white paper, Hewlett-Packard Development Company , 2014.
Reid, Allan, and Jim Lorenz. Networking for Home and Small Businesses: CCNA Discovery Learning Guide. Indiana: Cisco Press, 2008.
Thayer, Theresa A. Security Acess Control System: Operations Manual. Manual, Columbus: The Ohio State University, 2008.
.