Talk With an Expert

Network Security Architecture

Network Security Architecture (PDF, 4.18MB)Published: 15 Nov, 2004
Created by
Patrick Luce

This document describes the Information Technology (IT) security architecture for GIAC, a small fictitious company who specializes in the distribution of fortune cookie sayings. The following aspects of the security design are discussed: The company's business processes as they relate to the development and distribution of fortune cookie sayings. The network applications, protocols and infrastructure used to track fortune cookie sayings from development to market. The security infrastructure including complete policies for perimeter security devices. A tutorial for configuration of the company's border router. A process to validate the company's primary firewall policy In addition to the description of GIAC's security architecture outlined above, an analysis of a previously posted GIAC GCFW practical assignment submitted by Andrew Walker is provided.