iLab Paper

0 comments

iLAB OVERVIEW

Scenario/Summary

In this lab, you will  develop a policy statement and the processes and procedures that can be used to drive the design, implementation, and maintenance of a wireless network in a SOHO (small office, home office) setting. 

With the policy statement in place, you will then outline the key processes and procedures for the same network.  

Generally, we start with the network and user requirements, and from there, develop the supportive security policies, processes, and procedures. In this case, you will outline your own basic requirements that call for a SOHO wireless network. Those requirements can be broad and reasonable for the business setting you select. Some guidance about creating a broad requirements statement shall be provided later in this document.  
 
Assume your materials will be used in a high-level briefing to the business managers. Therefore, keep your recommendations at an executive and practical level.  

The reason for this lab is to give you some practical experience in developing and exploring the creation of best practices guidelines, which will be used by managers and business owners. Additionally, this lab should be very useful to you personally because you (or some people you know) likely need this type of guidance.

Deliverables

Document Authoring Guidelines

Each section will vary in size based on the requirements. Drive yourself to create a useful document for the setting you have selected.

Lab Document Framework

  • The SOHO Wireless Network: Describe the setting for the SOHO wireless network. An example could be a five-person law office, size and layout, and other details. Discuss relevant physical conditions. It should be generally about 3–5 sentences or bullet points.
  • Key Network Requirements: Describe the key user, application, and systems requirements. For example, what must the network provide, and how will it be used? Identify special industry or regulatory requirements. Discuss bandwidth requirements, fault tolerance, recovery goals, privacy needs, openness needs, and so forth. It should be generally about 5–10 sentences, or bullet points. 
  • Wireless Network Security Policy Statement: Outline a wireless network security policy statement. This should address the key policies that must be respected. It should be 2–3 paragraphs, 5–10 sentences, or 5–10 bullet points. Each statement is mapped to (highly related to) the requirements.
  • Wireless Network Security Processes and Procedures Statement: Outline a wireless network security processes and procedures statement. This should address the key operational tasks that must be respected. It should be 5–10 must do statements and mapped to the requirements or the security policy.
  • Citations and Resources Used in This Report: Tell us where you received external guidance and ideas. If you have presented original ideas, then give yourself credit and tell us why you believe it will work.

Delivering Your Lab Document

Organize your materials into a single comprehensive document. Name your document(s) such that the course ID, your full name, and this lab’s name are referenced. For example, include SEC572_FirstName_LastName_Lab2 in the file’s name. Your document must be readable with Microsoft Word 2007 (or prior), or a standard PDF file viewer.

Submit your assignment to the Week 2 Dropbox located on the silver tab at the top of this page. See the Syllabus section “Due Dates for Assignments & Exams” for due date information.

Use the Dropbox comment area to give your instructor an introduction or to state any special information.

 

Lab Document Framework

Back to Top

The SOHO Wireless Network: Describe the setting for the SOHO Wireless Network. Example: 5 person law office, size and layout and other details. Relevant physical conditions. Generally about 3 to 5 sentences, or bullet points.

Key Network Requirements: Describe the key user, application and systems requirements. Example: What must the network provide and how will it be used. Identify special industry or regulatory requirements. Discuss bandwidth requirements, fault-tolerance, recovery goals, privacy needs, openness needs, etc. Generally about 5 to 10 sentences, or bullet points.

Wireless Network Security Policy Statement: Outline a Wireless Network Security Policy Statement. This should address the key policies that must be respected. Generally 2 to 3 paragraphs, or 5 to 10 sentences, or 5 to 10 bullet points. Each statement is mapped to (highly related to) the requirements.

Wireless Network Security Processes and Procedures Statement: Outline a Wireless Network Security Processes and Procedures Statement. This should address the key operational tasks that must be respected. Generally 5 to 10 “must do” statements and mapped to the requirements, or the Security Policy.

Citations and Resources Used in this Report: Tell us where you received external guidance and ideas. If you have presented original ideas, than give yourself credit and tell us why you believe it will work.

Document Authoring Guidelines Each section will vary in sized based on the requirements. Drive yourself to create a useful document for the setting you have selected

About the Author

Follow me


{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}