The integrative practical activity connects students with concepts, tools, and methods that improve organizational security. The goal is to apply the technical knowledge gained during the course to propose and implement a security system for the selected organization.
In addition, the assignment requires designing an information security architecture that protects the company’s information assets and implements ongoing prevention, management, control, and monitoring of the network components.
Scenario
RAMSV SRL is a company led by a president and a general manager, with departments for Sales, Purchasing, Production, Systems, and Collections/Payments. It currently employs around fifty people across those areas.
The business sells products online through its own website. The site is maintained by in-house developers and analysts, and products are manufactured internally, which means raw materials must be sourced weekly depending on demand.
The website uses up-to-date SSL certificates, so client-server communications are protected. Customer passwords are stored using a one-way hash function, and users regularly exchange encrypted emails through PGP4Win.
Within the Systems Department, there is no dedicated information security office. The organization lacks both basic and advanced security measures.
Each employee has a workstation, and the internal network is segmented by department. The company has internet access and allows remote work. There is at least one PC running Windows XP with only a free antivirus solution, which does not cover all current threats.
Workstations are connected through a local area network where files and shared folders are exposed without access controls or logging. There is also a public WiFi network used by staff and visitors.
RAMSV SRL hosts its own database server, which runs a free version of the Yetiforce ERP/CRM system. All employees use it to register sales, suppliers, and marketing campaigns. Each department has a defined role and permissions. The database holds about 50,000 records containing customer and supplier data, invoices, and personal information.
The company lacks network monitoring software and packet filtering technology. Last month it suffered a ransomware attack and lost data on 50% of its devices, with no recovery due to the absence of a contingency plan.
Instructions
Analyze the security measures currently deployed to prevent malware. If enterprise solutions are installed, identify the antivirus and anti-malware products, their licensing models, and how endpoints are protected. Research integrated solutions (AVG, ESET, Kaspersky, etc.), prepare a comparative pricing table, and select the best option.
Design a secure internal network architecture. Consider perimeter security, firewalls, intrusion detection systems, access control lists, and monitoring/management technology. Provide a secure network prototype and diagram.
Estimate implementation costs and the timeline. Build a schedule and research software and hardware costs based on the previous proposals.
Submission Format
Prepare a Word document detailing the research, no fewer than 20 pages, A4 size, Arial 12pt, 1.5 line spacing (total for the four activities).
While a minimum page count is required (excluding cover, index, bibliography, and appendices), research that exceeds the limits is encouraged.
Requirements
To diagram the secure network requested in instruction 2, you may use Visual Paradigm.
For more information on instruction 3, consult:
RedesZone
CyberSecurity
Fortinet
Submission
You have reached the end of this module’s activity. Save your responses and upload them by clicking “Submit task.”
Remember that you can discuss questions with classmates in the course forum.
Proposed Responses
Current security posture and solution comparison
Existing controls include SSL on the website, hashed passwords, and encrypted email via PGP4Win. Endpoints, however, rely on Windows XP and free antivirus without centralized management or monitoring. There is no dedicated security team, no packet filtering, and the public WiFi is not segmented. This makes the environment vulnerable to malware, ransomware, and unauthorized access.
Baseline improvements should include upgrading all workstations to a supported operating system, deploying centrally managed endpoint protection with anti-ransomware capabilities, and enforcing least-privilege access.
Comparison table (reference pricing in USD per endpoint per year):
Solution
License model
Key capabilities
Estimated range
ESET Protect Entry
Annual subscription
AV/anti-malware, centralized console, web control
25-40
Bitdefender GravityZone Business Security
Annual subscription
AV/basic EDR, anti-ransomware, device control
30-50
Kaspersky Endpoint Security Cloud
Annual subscription
AV/basic EDR, cloud console, web control
30-55
Microsoft Defender for Business
Annual subscription
AV/EDR, M365 integration, hardening
35-60
Best fit for RAMSV SRL: a centrally managed suite with basic EDR and ransomware protection, such as Bitdefender GravityZone or Microsoft Defender for Business, because it scales to 50 devices and provides visibility and incident response. Final pricing should be verified with local vendors.
Secure internal network architecture
The proposed design uses segmentation, strong perimeter security, and continuous monitoring. It introduces a firewall with IDS/IPS, a DMZ for the public website and sales systems, VLANs per department, isolated guest WiFi, and a VPN with MFA for remote users. Access control lists on switches limit lateral movement, while a SIEM aggregates alerts for incident response.