Preview

Multi-Layered Security Plan Outline

Satisfactory Essays
Open Document
Open Document
447 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Multi-Layered Security Plan Outline
MULTI-LAYERED SECURITY PLAN OUTLINE
User Domain
Risk, Threat, or Vulnerability
Lack of user awareness
• Conduct security awareness training display security awareness posters, insert reminders in banner greetings, and send e-mail reminders to employees.
User apathy toward policies
• Conduct annual security awareness training, implement acceptable use policy, update staff manual and handbook, discuss dring performance reviews.
Workstation Domain
Risk, Threat, or Vulnerability
Unauthorized access to workstation
• Enable password protection on workstations for access. Enable auto screen lockout for inactive time.
Unauthorized access to systems, applications, and data
• Define strict access control policies, standards, procedures, and guidelines. Implement a second-level test to verify a user’s right to gain access.
LAN Domain
Risk, Threat or Vulnerability
Unauthorized access to LAN
• Make sure wiring closets, data centers, and computer rooms are secure. Do no allow anyone access without proper ID.
Unauthorized access to systems applications, and data
• Defines strict access control policies, standards, procedures, and guidelines. Implement second-level identity check to gain access to sensitive systems, applications, and data.
LAN-to-WAN Domain
Risk, Threat or Vulnerability
Unauthorized network probing and port scanning
• Disable ping, probing, and port scanning on all exterior IP devices within the LAN-to-WAN Domain. Ping uses the Internet Control Message Protocol
Unauthorized access through the LAN-to-WAN Domain
• Apply strict security monitoring controls for intruustion detection and prevention. Monitor for inbound IP traffic anomalies and malicious-intent traffic. Block traffic right away if malicious
Remote Access Domain
Risk, Threat or Vulnerability
Brute-force user ID and password attacks
• Establish user ID and password policies requiring periodic changes (i.e., every 30 or 60 days). Passwords must be

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Lock the servers into their own room with keycard or fingerprint access only. Only authorized IT staff shall have access. Management, vendors and all other authorized guest shall be escorted by an authorized IT staff member. Video surveillance should be maintained and monitored at all access…

    • 424 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    Each workstation will be set up to automatically lock the screen after 3 minutes of no use. Employees will be trained on how to keep their workstations and network credentials secure. Under no circumstances are employees to use flash drives or any type of external…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Finally, the system/application domain would require virtual testing of everything before any implementation, hardening of all servers, and keeping up with patches and updates regularly after testing has been completed. Some of the more efficient ways to implement better access controls in a company would start with the proper level of authorization policies including physical controls for facilities. The authorization policy would appropriate entry system access controls that specify what areas are to be locked at all times and what type of locking mechanism should be implemented. It would also include the implementation of secondary locks on specific equipment and storage cabinets…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Block all ports that are not in use by our network and monitor all inbound and outbound traffic, keeping a close eye on the inbound to detect threats before they become a threat. Place firewalls and anti-malware software at this point and route all workstation traffic through main servers to better protect the network as a whole.…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt2580 Project 1

    • 492 Words
    • 2 Pages

    In the WAN domain, we need to make sure that all firewalls are set up on the network to filter all traffic. A firewall can stop all traffic coming on to our system that is not meant or not wanted on the network.…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Implementing remote access will allow employees to telecommute which can bring down overhead costs and allow users the flexibility of accessing data outside of the office. In order to protect the data as well as users, audits and access control lists are to be implemented. Access Control allows the identity of the user to determine whether or not they are able to access certain file systems. In order for access control to work properly every user attempting to access the data will need to be entered into the system. Placing passwords on individual files will also provide an added layer of protection.…

    • 689 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 1 Assignment

    • 711 Words
    • 3 Pages

    During operation, the system uses the access control rules to decide whether access requests consumers shall be approved or disapproved. Resources include individual files or items data, computer programs, computer devices and functionality provided by computer applications. Examples of consumers are computer users, computer programs and other devices on the…

    • 711 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Corporation Tech will face many security risks with their current network. The user domain is the single most vulnerable part of any network and as such poses the most obvious security risk. To mitigate risks involving the users is to implement policies and training to educate the user on proper use and security best practices. By educating the user on security practices such as secure passwords, safe web surfing, and securing their workstations, many potential attacks can be avoided. Policies and training are also necessary because they can be used as evidence when taking administrative action against a user or intruder in the event the system or data information is compromised.…

    • 612 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NT2580 Project part 1

    • 562 Words
    • 3 Pages

    i. By enabling password protection on all workstations and implementing a three try timeout/lockout on an un-successful entered password, you can protect your company from unauthorized users trying to gain access by password hacking.…

    • 562 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 33

    • 595 Words
    • 3 Pages

    If you use a computer at home the most efficient and important step to help your computer to protect by turning on your firewall.…

    • 595 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Make sure that I am aware of, and follow, my settings health, safety and security procedures before I start work.…

    • 356 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Ip Networking

    • 327 Words
    • 2 Pages

    The LAN domain includes all data closets and physical as well as logical elements of the LAN. This domain needs strong security, being that it is the entry and exit points to the wide area network, and makes private information easily accessible to anyone. Users will be screened and authorized by the IT department head and given a special access code. The biggest threat to the LAN domain is unauthorized access. This will be monitored closely to make sure all policies are being followed.…

    • 327 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Comply with statutory requirements, safety notices and warning notices displayed within the workplace and/or on equipment.…

    • 713 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Health and Safety

    • 263 Words
    • 2 Pages

    Employer/Manager: Planning safety and security. Providing information about safety and security. Updating systems and procedures.…

    • 263 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Internal Use Only

    • 373 Words
    • 2 Pages

    1. User Domain: This Domain is where only one user will have access to it. This can be configured to internal use only. By default, the IT department tries to maintain a certain level of Security for this, so that nobody can access from the outside, only the IT Department can grant access privilege for Remote Access Point. The User Domain will enforce an acceptable use policy (AUP) to define what each user can and cannot do with any company data that he or she has access to. Also, every user on the company is responsible for the security of the environment. Violation of the AUP can be grounds for immediate dismissal and/or legal actions.…

    • 373 Words
    • 2 Pages
    Satisfactory Essays