a) An Introduction/Overview of Network Security issues.
b) A Risk Assessment analysis- to include:
Assets
Threats
Security Priority Identification
(In terms of assessing Asset Importance and in terms
of categoring threats by significance)
c) A discussion of Security Control Procedures for disruption, destruction or disaster
D)A diagram and associated description to illustrate where and what type of security-related hardware and software may be placed and utilised to good effect.
E) A proposed backup plan/schedule for 2 server roles/contexts; so that, in the event of data loss, a Disaster Recovery Plan may be implemented