Preview

itt security final paper

Better Essays
Open Document
Open Document
1085 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
itt security final paper
Proposal for Intranet and
Extranet Security

5/5/2013

Richman Investing is one of the top leading investing firms in the United States. In order to stay on top of the competition a few things have to be implemented. Accessing Richman’s intranet and extranet is one of many nice features about the company. Securing these ways to access the network is more than just saying which sites users can and cannot access. It is encrypting data, setting passwords, physically locking doors, and many other very important security measures that need to be thought of. Being 100 percent safe and secure is not achievable but if we follow these steps Richman Investing will be more secure and will remain number one in the United States when it comes to investing.
Every business has an Acceptable Use Policy(AUP), whether or not they inform the users of it is a different story. When people give out an AUP, they need to enforce it. The worst user is an uniformed user. An AUP states what a user can and cannot do on the network. This is what should not be allowed:
No downloading executable from software sites; as this may be infected with any type of virus that could further do damage to our network.

No access to Facebook or any other type of social networking. This is because this will slow down production.

No remote connections from systems that fail to meet the set requirement. This is because any computers that do not have updates installed may be another security threat.

No accessing unauthorized internal resources or information from external sources This is to make sure we follow the internal use policy.
A password by definition is, a secret word or phrase known only to a restricted group. Make sure users are not physically displaying passwords on the monitor or anywhere an unauthorized user can find it. If an unauthorized user finds a password, that person is held personally responsible. Be sure to enforce strong passwords

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    All of the servers will be virtual, and a backup of each server will be refreshed weekly and saved to cloud storage. All company data will be backed up and saved to cloud storage daily. All users requiring remote access will have a VPN set up with strict login requirements. These users will also have their laptops checked by the IT department on a monthly basis to ensure that they are in compliance with company security policy.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Scope this policy applies to all Richman Investments employees, contractors, vendors and agents with a Richman Investments-owned or personally-owned computer or workstation used to connect to the Richman Investments network. This policy applies to remote access connections used to do work on behalf of Richman Investments, including reading or sending email and viewing intranet web resources. Remote access implementations that are covered by this policy include, but are not limited to: frame relay, DSL, ISDN, SSH, VPN, dial-in modems, and cable modems, etc.…

    • 438 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Assignment 4 Nt2580

    • 485 Words
    • 2 Pages

    1. Will be the responsibility of Richman Investments employees, affiliates, vendors and agents with remote access privileges to Richman Investment's corporate network to ensure that their remote access connection is given the same consideration as the user's on-site connection to Richman Investment.…

    • 485 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 2207 Words
    • 9 Pages

    They may even share their login id and password with others. It is better if the IT members create software which asks certain questions before they log into the data.…

    • 2207 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Richman Investment needs and new enterprise encryption strategy. This is for a more secure network. They are wanting to grow to 10,000 employees worldwide. Richman Investment wants to operate out of 20 different countries in the future. This is very easy to do but to have a secure network there are many things that would have to happen which will make this more difficult to do. Have a secure network takes a lot of work and has to be monitored 24 hours a day 7 days a week. There are many different ways to go about this topic the one I am going to pick is a public key infrastructure (PKI).…

    • 444 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Unit 9 Assignment 1

    • 582 Words
    • 2 Pages

    - Ensure compliance requirements of this policy concerning data at rest and role-holders access to managed networks, systems and servers…

    • 582 Words
    • 2 Pages
    Good Essays
  • Good Essays

    strong passwords and trend analysis to ensure only those authorized are able to access sensitive…

    • 3990 Words
    • 15 Pages
    Good Essays
  • Better Essays

    Nt2580 Final Project

    • 1848 Words
    • 6 Pages

    Based on the premises that Richman has 5000 employees throughout the main office and several branch offices, this document dictates research solutions and details the appropriate access controls including policies, standards, and procedures that define who users are, what they can do, which resources they can access, and which operations they can perform on a system. |…

    • 1848 Words
    • 6 Pages
    Better Essays
  • Good Essays

    NT2580 Unit 1

    • 578 Words
    • 3 Pages

    The first domain that would be affected is the User Domain. The User Domain defines the people who access an organization’s information system. One of the roles and tasks is that the user can access systems, applications, and data depending upon their defined access rights. Inside the User domain is where the user would find the acceptable user policy or AUP. The AUP defines what users are allowed to do within the organization-owned IT assets. The User Domain is considered the weakest and most affected domain. One reason why is that it has a lack of user awareness. Another reason is that when users are downloading various content and different files, they generally do not conform to the established security guidelines. To protect from these issues, there should be enabled content filtering as well as automatic antivirus scans. A way to protect from an user doing Employee blackmail or extortion is to enable intrusion detection system/intrusion prevention system (IDS/IPS) monitoring. The monitoring will examine the IP data streams for inbound and outbound traffic.…

    • 578 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Activity 8-9: Evaluate an acceptable use policy. Learn whether the organization where you work or attend school has an acceptable computer use policy for employees or students. Make a list of activities that are permitted and those that are not permitted. Identify on your list those activities that are illegal and those that are not permitted according to organizational policy. Compare your organization’s computer use policy with the University of Oregon’s policy referenced in the chapter. Describe the similarities and differences.…

    • 477 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Remote access implementations that are covered by this policy include, but are not limited to DSL, VPN, SSH.…

    • 848 Words
    • 4 Pages
    Good Essays
  • Good Essays

    You Decide Assignment

    • 755 Words
    • 4 Pages

    As a company grows , changes and new policies are created to fit the fast pace industry that we live in today. And as a part of your IT staff, I 've collected some information that can help the company, with implementing a new policy when it comes with computer use. From legal reasons, virus attacks, to our network systems and services, we all need to be aware and cautious about this as a whole. The material I 'll be covering today will include all of the issues brought up by our CEO, CFO, and General Manager. In addition, an explanation on general use ownership, security and proprietary information, and unacceptable use, will be discussed.…

    • 755 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    lab 4

    • 451 Words
    • 2 Pages

    Internet use at Richman is only authorized to conduct Company business only. Internet use can easily allow hackers to see confidential Company information and allow viruses. This allows the hackers to get passwords and other important things. Which is why we want the staff at Richman’s to only use the internet for business only and business only sites. Employees can only check their business…

    • 451 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Remote access services are enabled on some but not all of the machines. SSH port open, attacker might try to access the SSH by bruteforcing. once the attacker cracked the SSH, they can conduct MITM for the remote access.…

    • 1647 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    use software to block connections to web sites deemed off limits for employees. This is a…

    • 1201 Words
    • 8 Pages
    Powerful Essays