0% found this document useful (0 votes)
116 views

Network Infrastructure and Security Assessment

The document outlines what should be included in physical and logical network diagrams for a network infrastructure and security assessment. Specifically, the diagrams should document physical communication links, server information, locations of network devices, WAN links and bandwidth, authentication infrastructure, security infrastructure, and management infrastructure. The assessment should then analyze these diagrams to identify information security loopholes and threats.

Uploaded by

Rmae Longakit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
116 views

Network Infrastructure and Security Assessment

The document outlines what should be included in physical and logical network diagrams for a network infrastructure and security assessment. Specifically, the diagrams should document physical communication links, server information, locations of network devices, WAN links and bandwidth, authentication infrastructure, security infrastructure, and management infrastructure. The assessment should then analyze these diagrams to identify information security loopholes and threats.

Uploaded by

Rmae Longakit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

ITE Elect 5 Principles of Information Security

Rmae Longakit-Perito

NETWORK INFRASTRUCTURE AND SECURITY ASSESSMENT


The physical and logical network diagrams should include the following
information:

1. Physical communication links, including cables and the paths of analog


and digital lines.

2. Server names, IP addresses, and domain membership.


3. Location of printers, hubs, switches, routers, bridges, proxy servers,
4.
5.
6.
7.

and other network devices.


Wide area network (WAN) communication links, their speed, and
available bandwidth between sites. If you have slow or heavily used
connections, it is important to note them.
Authentication infrastructure.
Security infrastructure.
Management infrastructure.

Risk Analysis
(Discuss the result of assessment. Highlight information security
loopholes and threats based on the above mentioned
infrastructure.)

Sample:
Physical Network Infrastructure Diagram

ITE Elect 5 Principles of Information Security


Rmae Longakit-Perito

Logical Network Infrastructure Diagram

You might also like