The purpose of this computer security exercise is to help you develop a better approach to implementing security and identifying faults in your own security architecture.
When it comes to computer and network security, everyone has their own ideas on how it should be done. A person will implement security based on their education, experience, referenced resources, checklists, security vendor recommendations, and suggestions made by colleagues. Each environment has unique requirements, so it’s not always possible to follow a “recipe” when implementing security. In addition, “best practices” are often constrained by budget and the ability of an organization to manage and maintain the security after initial implementation.