Preview

IS 3230Unit 4 Assignment 1

Satisfactory Essays
Open Document
Open Document
439 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IS 3230Unit 4 Assignment 1
IS 3230
Unit 4 Assignment 1 Implementation of an Organization-Wide Security Plan
Looking at the network diagram provided I determined that the user, workstation, LAN, LAN-to-WAN, and system/application domains involved in the company should be redesigned to implement better access controls to provide multi-layered security. The most important access control implementation would be the user domain where the company should put emphasis on training; how to recognize social engineering attacks, how to create strong passwords, and how often they should be changed. The workstation domain should focus security via virus and malware scanning, operating system patching, and other types of application-level firewalls. To achieve a multi-layered security approach in the LAN domain I would recommend using an intrusion detection system (IDS) and an intrusion prevention system (IPS) to prevent unauthorized access. Security for the LAN-to-WAN domain should be implemented through the use of a firewall or DMZ to also prevent unauthorized access into the company’s network.
Finally, the system/application domain would require virtual testing of everything before any implementation, hardening of all servers, and keeping up with patches and updates regularly after testing has been completed. Some of the more efficient ways to implement better access controls in a company would start with the proper level of authorization policies including physical controls for facilities. The authorization policy would appropriate entry system access controls that specify what areas are to be locked at all times and what type of locking mechanism should be implemented. It would also include the implementation of secondary locks on specific equipment and storage cabinets within the facility, and training goals on the recognition and prevention of social engineering attacks. Authorization policies will also include access controls for data by specifying which data should be encrypted, they would

You May Also Find These Documents Helpful

  • Better Essays

    This domain is the fastest way for the system to be compromised. I would implement an AUP (acceptable use policy) that will be understood and signed by all employees with access to the network. The employees will also have to go through initial information security training before gaining access to the network. This training will also be required annually in order to maintain their access to the network. The AUP will dictate the requirements for passwords. The requirements will include an eight character alphanumeric password, two uppercase letters, two lowercase letters, two special characters, and two numbers. This will make it more difficult for the password to be breached. The AUP will also state that the company systems will only be used for work related purposes. All social networking sites and many other miscellaneous sites will be blocked. The user will also have to consent to monitoring when signing the…

    • 1234 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    We are looking for the item Brake Set, Luffing Mechanism, GUL. Please kindly quote for the following item.…

    • 67 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    When creating a multi-layered security plan, I would look at all seven domains of the IT infrastructure and then increase the security on each of those domains because that will increase the security for the whole plan. In the user domain, this is the quickest way for the system to be compromised the users. So I would implement complex passwords including eight or more characters, both upper and lower case, and use of at least one special character. Passwords will also need to be changed every 90 days and the same password cannot be used again for three calendar years. In the workstation domain, I would make sure that each workstations, whether desktop or laptop has some security on it like antivirus and malware protection installed. Laptops can be very vulnerable for loss or theft, which would make me install an encrypted hard drive so if it is stolen the data can only be retrieved by the owner. For the LAN domain, just train all users about email scams. I would guess that most users know not to access suspicious emails when on our system but I would still implement to the users a quick training course. Then I we should add spam filters this will help get rid of most of the junk email. In the LAN-to-WAN domain, we need to shut down the File Transfer Protocol (FTP) server we have running and switch it over to use secure FTP so that only users allowed on our system can access our FTP server. In the WAN domain, we need to make sure that we have firewalls set up on our network that will filter all incoming traffic. This firewall will stop all traffic coming on to our system that is not meant or not wanted our network. In the Remote Access Domain, we need to establish strict user password policies, as well as lockout policies to defend against brute force attacks, require the use of authorization tokens have a real-time lockout procedure if token is lost, or stolen. The last domain is System/Application domain we need to…

    • 449 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Security implementation responsibilities focus on implementing the access controls and account management processes outlined in this Plan. The following positions are responsible for security implementation:…

    • 1211 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Is3350 Unit 1 Assignment 1

    • 2290 Words
    • 10 Pages

    By agreement with the mother by joint registration at birth or by court order under section 4(1) (a) and 4(1A).…

    • 2290 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    I can understand your concern with your network security and better securing your information without losing productivity. You can set up your users to have their passwords be changed at a certain time and I would recommend a short amount of time in-between. And also you can have the passwords be in a certain context or to be made a certain way and make sheer that the security levels are high on them so that a hacker has a harder time to get in to the network. I recommend you use the following format; using capital and lower case letters the first letter of their name, their whole last name and their employee number, ex. “JVentura10415867@Domain*%$.Local” if someone tried to hack the account and all that they knew was the person name and the domain name they could not get in because it is very unlikely that they would know that person employee number and if they do then you have a spy in your company. Can also buy better security items to better your network things like smart card, finger print scanners, retinal scanners, and others. But I only recommend these for really sensitive information and only for certain users in your company. I hope that this has helped you in any way and I wish the best of luck to you.…

    • 327 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    The SEC decided to enforce this provision for the first time for the James Nordgaard. Because James decided against resigning, the company retaliated against him (Deakins, Campbell, & Ferrantella, 2014). The company took away his rights to trade and access to the company’s system. James couldn’t even get into his email. They moved him into a little room and eventually found a way to accuse him of violating the company’s confidentiality agreement. On August17, 2012, James resigned, and he sued the company for violating his…

    • 841 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Network: The network should be designed with security in mind. Its structure must support the company’s policies, relevant laws and regulations, without impairing the organization’s ability to conduct business. The network should be logically and physically separated into distinct and manageable security zones. Traffic between the security zones must be inspected and filtered, to ensure that only authorized network use is permitted, and all access is recorded for future auditing. Multiple devices and methods should be used to ensure security across all parts of the network. In preparing this recommendation, network security design principles have been drawn from the Cisco SAFE Reference Guide [33] and the Council on CyberSecurity’s Critical Security Controls for Effective Cyber Defense Version 5.1 [34].…

    • 598 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Johnson Company provides networking components and services. Today we are using the yellow pages for advertising, which is still useful but outdated. In most businesses today use other methods such as In person by using sale representatives. Mostly all the businesses today use the internet to reach out to customers, either by having a website, social media, sending emails or even newsletters. There are some that use a totally different approach, some of which include video conferencing and text messages. Other companies even push it further by utilizing social media sources such as Facebook, twitter, LinkedIn, Instagram and so many more to promote their company.…

    • 811 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Employees will be also using the workstation domain is where they will connect to the company’s network. Tight security and access controls will be enforced on company equipment and users must have proper access rights…

    • 539 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Currently the security for the internet server and the location of it in the network is not as protected as it should be and it is not the best design either. The internet server must be located out of the company firewall to protect the systems and network internally. By doing this it separates the remote server system the system has proper validation and connection through the system allows access to the rest of the network. Staffs that are located in the firewall can authenticate through a proxy system and then access the internet, which in turn allows them to communicate…

    • 560 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Reseta

    • 1504 Words
    • 7 Pages

    1. Purpose. This Interim Policy Document (IPD) establishes XX Agency (XXA) procedures for managing network security.…

    • 1504 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Access Control Policy

    • 703 Words
    • 3 Pages

    Describe how and why authentication credentials are used to identify and control access to files, screens, and systems. Include a discussion of the principles of authentication such as passwords, multifactor authentication, biometrics, and single-sign-on.…

    • 703 Words
    • 3 Pages
    Good Essays
  • Good Essays

    At the outset, make the physical system inaccessible to unauthorised users. Identification and verification must be required for all users of the system. This can be done using user passwords or personal identification numbers (PINs). Procedures for automatic shutdown routines when the system has a confirmed breach. The next phase in conjunction with monitoring the system is identifying what each work station is used for. This allows the system administration to specify privacy settings and distinguish the capabilities of each work station.…

    • 787 Words
    • 4 Pages
    Good Essays
  • Best Essays

    Network Security

    • 4030 Words
    • 17 Pages

    I am commissioned by a nationwide firm of lawyers and accountants to perform such a challenging task. The firm has its Head office in Manchester and a branch office in Glasgow. My job is to produce a consultation report to connect both of their sites together using an appropriate WAN technology and then specify and design their “network security provision”. In this report I am going to discuss different WAN technologies and will select the best among them i.e. IP VPN to connect our network sites together. Based on the diagrams provided for the planes of two sites I will identify the areas of security weaknesses and risks and will recommend the necessary solutions to overcome those weaknesses. I will then present techniques to prevent our network from several viruses and malicious softwares that could destroy our network. I will suggest some necessary actions to be carried out in order to strengthen the security of our network. Finally I will enlighten the role of switches in securing networks and will explain the role of “IEEE 802.1x protocol” in our “network security provision”. Keeping in mind all the above key factors I will produce a complete report of “network security provision” for the lawyers and accountants firm that will gain their entire satisfaction.…

    • 4030 Words
    • 17 Pages
    Best Essays