Richman Investments |
Richman Internet Infrastructure Security Management Upgrade |
ITT Technical Institute NT2580 Course Project |
Based on the premises that Richman has 5000 employees throughout the main office and several branch offices, this document dictates research solutions and details the appropriate access controls including policies, standards, and procedures that define who users are, what they can do, which resources they can access, and which operations they can perform on a system. |
Final Project
I. Richman Internet Infrastructure Security Management Upgrade
A. Purpose
Based on the premises that Richman has 5000 employees throughout the main office and several branch offices, this document dictates research solutions and details the appropriate access controls including policies, standards, and procedures that define who users are, what they can do, which resources they can access, and which operations they can perform on a system.
II. Basic Authentication Procedures and Standards, (Who users are.)
A. Trinity-Three-factor Authentication Method replaces Basic Authentication
It is my view the Administrator’s responsibility is to provide secure communications by adding layers of security at all levels to assure the amount of protection for company’s valuable assets. Richman will provide its employees a new method of authentication I call Trinity. It is a three-factor authentication method requiring updated laptops and new Apple IPhone. Since Microsoft has stopped support for Microsoft Windows Operating System XP, and 87 % of our current systems require upgrade to Windows 7. We should take advantage of the newest technologies available to our Corporation. Trinity is a three-factor authentication combines” “something that you know” (password – PIN), with “something that you have” (hardware- token, mobile phone) and/or “something that you are” (biometric technologies), to make sure that the person is who he/she claims to be.”(1)
1.
References: Entrust (2014),” Entrust Identityguard” Retrieved from: http://www.entrust.com/ Pearl Echo Software (2014).” Pearl Echo.Suite” Retrieved from: http://www.pearlsw.com/ SANS.ORG(2014),”Two Factor Authentication” Retrieved from: http://www.sans.org/reading-room System Administration, Networking, and Security Institute or SANS.org (2001) “View Employee Internet Use Report (PDF)” retrieved from http://www.sans.org/security-resources/policies/internet.php