Skip to main content

Network Security Architecture

This document describes the Information Technology (IT) security architecture for GIAC, a small fictitious company who specializes in the distribution of fortune cookie sayings. The following aspects of the security design are discussed: The company's business processes as they relate to the development and distribution of fortune cookie sayings. The network applications, protocols and infrastructure used to track fortune cookie sayings from development to market. The security infrastructure including complete policies for perimeter security devices. A tutorial for configuration of the company's border router. A process to validate the company's primary firewall policy In addition to the description of GIAC's security architecture outlined above, an analysis of a previously posted GIAC GCFW practical assignment submitted by Andrew Walker is provided.

1498 (PDF, 4.12MB)

15 Nov 2004
ByPatrick Luce
Share
All papers are copyrighted

No re-posting of papers is permitted

Subscribe to GIAC’s Monthly Newsletter

Receive expert insights, priority access to certifications, essential updates on regulatory changes and industry developments.