Sunteți pe pagina 1din 6

Background The Department of the Kenya National Archives and Documentation Service was established in 1965 by an Act of parliament,

CAP 19 of the laws of Kenya. The main responsibility of the Department is the care and preservation of all public records and archives. The Challenge The Kenya National Archives acquired a new cyberoam security appliance to safeguard their network from external and internal attacks. But during implementation stage of the cyberoam a number of shortcomings were discovered that held back proper deployment of the cyberoam. In order to identify out this bottlenecks accurately, Geretin general supplies ltd contracted a network expert to carry out an unbiased assessment of the current system with two specific objectives;

To identify the current network shortcomings that hindered proper implementation of the cyberoam.

To recommend various actions that can be taken to correct the situation and make the network cyberoam ready, manageable and secure.

Objectives The objective of the audit was to determine the current network configuration and general network infrastructure in view of successfully deploying the cyberoam. This will ensure proper operation of the network, data integrity, and the security of IT systems at Kenya National Archives. To determine this overall objective, we conducted an assessment of the entire network including servers, Switches, router and workstations. T o help identify various areas of the network,

We interviewed key IT department personnel to identify critical data and ascertain how the network was being used.

Scope

Reviewed all network hardware e.g. Servers, switches, router and cabling.

The scope for this audit was to identify network configuration that can be rectified to successfully deploy the cyberoam and give recommendations for quick action. Methodology We conducted this audit in accordance with generally accepted international standards. Our procedure consisted of interviews with key department personnel and on site observation of the system configurations.

FINDINGS AND RECOMMENDATIONS Area of Audit 1. Server Configuration Detail Findings The current networks is configured as peer to peer without centralized file 2. Static IP addresses management systems Currently all computers are given static IP addresses Recommendations We recommend one of the servers to be configured as Active directory and DNS server to facilitate easy management of the network. To simplify issuance of the IP addresses on the network one of the servers should be configured as a 3. Workstations DHCP server Currently is no control over All work stations to be joined on the workstation user since all of them have local admin 4. Network Switches rights Currently the network is comprised of two 3com switches and two dlink unmanageable switches 5. Router The Current Level one router keeps on hanging and cannot handle your 6. Internet Bandwidth load sufficiently Current 128/256kbps is not We recommend you upgrade your sufficient for the over 5o 7. Antivirus Software users on the network Your current Norton antivirus has expired and a few users are using single user Kerspersky bandwidth to atleast 512/512 kbps or more. We highly recommend that you urgently procure Server centralized corporate antivirus for example kerspersky or Escan corporate antivirus and internet security to take domain to facilitate user accounts creation, administration of user permission and group policies We recommend Kenya National Archives to at least procure one core Switch to improve throughput in the network e.g. Cisco 3560 or 3760 series switch We recommend an upgrade of the current switch to Cisco 800 series.

care of your workstations and servers. Cyberoam will protect you from external attacks by filtering 8. Backup Current Netapp Backup is not configured ICT Policy Currently Kenya National Archives do not have an ICT policy in place. incoming traffic. We recommend immediate deployment of the netapp backup system We recommend Kenya National Archives to develop an ICT policy to aid the administration of your ICT operation.

The benefits of the Cyberoam on the network It filters all incoming and outgoing to traffic from the network. It gives the Network administrator a facility to monitor internet user activities. Administrators are able block users from accessing some sites e.g. pornographic sites etc.

It provides intrusion detection and prevention facilities It scans and removes viruses and spams from entering into network. It provides Gateway Anti-virus and Anti-malware, Gateway Anti-spam, Content & Application Filtering, Bandwidth Management and Multiple Link Management for comprehensive network protection from blended attacks.

It also provides Encrypted VPN tunnel for secure communication with branch

office, road warriors, telecommuters, partners and customers.

S-ar putea să vă placă și