Describe the model, and identify the appropriate aspects of the model that are associated with the requirements.

Perimeter Security Requirements – Define a perimeter security requirements for the healthcare clinic network. Research Internet and Web perimeter security models, and select a model that is appropriate for the network. Describe the model, and identify the appropriate aspects of the model that are associated with the requirements.

Perimeter Security Design –Provide a design for the perimeter security architecture of the network based on the model selected in the previous step. The design should include the following areas for consideration:

State-based filters
Border routers
Screened subnets
Internet Protocol Security (IPSec)
Intrusion Detection Systems (IDS)
Proxy firewalls
Digital signatures
Access control list filters
Fail-safe equipment
Equipment redundancy
Section 2 (3 pages)

Save your time - order a paper!

Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines

Order Paper Now

Database and Server Security– Determine and summarize the methods that are necessary to secure back-end databases for the selected network. Determine and summarize the methods that are necessary to secure front-end UNIX or Windows servers for the selected network.

Client and Server Authentication– Outline the authentication issues for the selected network with Active Directory and UNIX servers and clients. Discuss what authentication methods can be used to address these issues.