Preview

Multi Layered Security Plan

Good Essays
Open Document
Open Document
299 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Multi Layered Security Plan
Project Part 1

Multi Layered Security Plan

Richman Investments

1) General

This MLS plan will give a brief overview of the security strategies that will be implemented at each level of the IT infrastructure.

2) User Domain

a. The usage of security awareness training to instruct employees of Richman Investments security policies

b. Auditing of user activity

3) Workstation Domain

a. The usage of antivirus and antimalware programs on each user computer

b. Strict access privileges to corporate data

c. Deactivation of media ports

4) LAN Domain

a. Utilizing network switches

b. WPA 2 encryption to wireless access points

c. Securing server rooms from unauthorized access

5) LAN to WAN Domain

a. Closing off unused ports via a firewall to reduce the chance of unwanted network access

b. Monitor inbound IP traffic, more specifically looking for inbound transmissions that show signs of malicious intent

c. Run all networking hardware with up to date security patches, and operating systems

6) WAN Domain

a. Enforce encryption, and VPN tunneling for remote connections

b. Configure routers, and network firewalls to block Ping requests to reduce chance of Denial of Service attacks

c. Enforce antivirus scanning of email attachments

i. Isolate found malicious software (virus, Trojans, etc.) when found

d. Deployment of redundant internet connections to maximize availability

(Kim & Solomon)

7) Remote Access Domain

a. Establish strict user password policies, as well as lockout policies to defend against brute force attacks

b. Require the use of authorization tokens, have a real-time lockout procedure if token is lost, or stolen

c. Encrypt the hard drives of company computers, laptops and mobile device to prevent the loss of sensitive data

Works Cited

Kim, D., & Solomon, M. G. Part 1: The Need for Information Security. In Fundamentals of Information Systems Security. Jones & Bartlett



Cited: Kim, D., & Solomon, M. G. Part 1: The Need for Information Security. In Fundamentals of Information Systems Security. Jones & Bartlett Learning.

You May Also Find These Documents Helpful

  • Good Essays

    It244 R Appendix E

    • 650 Words
    • 3 Pages

    Describe the policies for securing the facilities and the policies of securing the information systems. Outline the controls needed for each category as relates to your selected scenario.…

    • 650 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    a) Physical Security - Is intended to detect and deter unauthorized personnel from gaining access.…

    • 1152 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    When developing a multi-layered security plan, you must increase security on each of the domains. Increasing the security on each of the seven domains will increase the overall security of the system and create a multi-layered security plan.…

    • 337 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    We will educate employees on how to properly secure information by user ID and password management training. Instructing them on how to…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt2580 Project 1

    • 492 Words
    • 2 Pages

    When you create a multi-layered security plan, you must look at all of the domains of the IT infrastructure. Once you look at the security of each you must then increase the security on each of those seven domains. A security increase will help the overall security of the system and create a multi-layered security plan.…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    When developing a multi-layered security plan, you must look at each of the seven domains of the IT infrastructure and increase security on each of those domains. The seven domains are user domain, workstation domain, LAN domain, LAN to WAN domain, WAN domain, and remote access domain. Increasing the security on each of those seven domains will increase the overall security of the system and create a multi-layered security plan.…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NT2580 Project part 1

    • 562 Words
    • 3 Pages

    i. By conducting security awareness training, you can educate the user/employee on the policies and standards. Also make the user/employee aware of the violation consequences if the said policies and standards are broken. To further implement this security awareness plan, follow up by sending out reminder/updates in a bi-weekly email and flyer handout.…

    • 562 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    lesson10

    • 285 Words
    • 2 Pages

    Which of the following policy modifications would make it harder for intruders to penetrate user passwords by a brute force attack?…

    • 285 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    ISA 650 Final Exam Paper

    • 4435 Words
    • 18 Pages

    73. Requires the creation of computer security plans, and the appropriate training of system users or…

    • 4435 Words
    • 18 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Fcs 006

    • 856 Words
    • 4 Pages

    9. ____ software, such as that shown in the accompanying figure, can control which devices can be connected to an employee computer. a. Data-leakage prevention c. Professional firewall b. Device authentication d. Network quarantine…

    • 856 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Acct 505

    • 743 Words
    • 3 Pages

    d. Implementation of better security measures for data protection, identity protection and ensuring that company resources are not misused…

    • 743 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    This process includes the creation of a strong password and an account lockout policy is created, logon hours are assigned, a ticket expiration policy is created, and clock synchronization tolerance to prevent replay attacks is set just to name…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Chapter 2 Assessment

    • 264 Words
    • 1 Page

    1) Which of the following is not a goal of a secure environment? C) All required information is available to users.…

    • 264 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    There are several possible threats that can affect the integrity of any organizational network. Many of these threats can come internally from the users of the system. Internal attacks can be intentional, accidental, or simple human error. Some examples of accidental infection can come from a user opening an email containing a virus, installing new software, altering desktop configuration, visiting precarious web sites, leaving the area of their desktop without logging out of their account, or simply losing or leaving their personal wireless device unattended. Organizations should have specific policies covering each of these topics defined within their security plan document. Also, standard operating procedures should be available for technicians to follow whether performing day to day tasks, or responding to an incident.…

    • 959 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Discovering Computers 2008 Chapter 9 Computer Security, Ethics and Privacy 1 2 Chapter 10 Objectives Describe the types of computer security risks Discuss the types of devices available that protect computers from system failure Identify ways to safeguard against computer viruses, worms, Trojan horses, botnets, denial of service attacks, back doors, and spoofing Explain the options available for backing up computer resources Discuss techniques to prevent unauthorized computer access and use Identify safeguards against hardware theft and vandalism Explain the ways software manufacturers protect against software piracy Define encryption and explain why it is necessary Identify risks and safeguards associated with wireless communications Recognize issues related to information accuracy, rights, and conduct Discuss issues surrounding information privacy Discuss ways to prevent health-related disorders and injuries due to computer use 3 Computer Security Risks…

    • 2181 Words
    • 25 Pages
    Powerful Essays

Related Topics