Essential Question: How do I create a plan for a network solution? How do I setup a network? What type of policies do I need for a network?
Mastery Objectives:
SWBAT design a security policy.
SWBAT design a network and network schema.
SWBAT create a redundancy plan for a network.
SWBAT configure a firewall to fulfills the goals of their security policy and network design.
Directions: You will be assigned a scenario. In a team of two people, you will plan a network, software, and hardware solution for the scenario. You will need to defend your solution. You will write a paper, create a design, and create a presentation on the highlights of your solution.
Deliverables and Requirements:
Create a Security Plan
Create an Acceptable Use Policy, write a batch file to open acceptable use policy when the user logs on to the Internet or network
Create a Network Schema
Design your network
Justify your network, provide research and references to justify your design
Describe how it solves the problem
List the subnet masks, number of hosts, and servers
Identify the amount of cable you need
Create a batch file to manage your network
Create a RAID plan, backup schedule, and Emergency plan
Create a maintenance plan
Describe and justify the operating system you choose
Plan the gateways, routers, switches, servers, and other devices
Implement policies for remote users and BYOD users
Plan your firewall and security procedures
Create a plan of action for solving the immediate problem
Scenarios:
Scenario 1:
A mid-size company located in the United States has 650 employees and also has a large sales force that are remote workers and use their own devices. They are unable to access the network to enter invoices to keep track of their sales. They have salespeople in all four time zones that would be entering invoices during 9am-5pm in their corresponding time zone. They have the following departments: Sales, HR, Accounting, IT, Shipping, Marketing, and Executive.
Scenario 2:
A large school district, 1500 students and 200 teachers, has a BYOD policy for students but also has school-distributed chrome books. Students have hacked the servers several times and also used school desktops to hack the servers. The district has an elementary school, middle school, high school, and alternative school. The district has the following departments: Superintendents, Administration, Students, IT, Teachers, and Staff. The superintendent's department handles accounting and human resources. Student assignments need to be stored but the budget is limited.
Scenario 3:
A coffee shop, which is part of a chain, has had several customers try to hack other customers and obtain banking information. The accounting software is also coming up with a deficit because it is suspected that someone is utilizing the office computer and accessing accounting records. Employees need to use their own devices to clock into their shift, access their work schedule, and keep track of their tips. They too are susceptible to customers accessing their banking records. The coffee shop uses a POS system to enter orders. This POS system records credit cards. The coffee shop provides free Wi-Fi to customers. The coffee shop is open from 5am to 9pm, 7 days a week.