Preview

NT2580 Project part 1

Good Essays
Open Document
Open Document
562 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
NT2580 Project part 1
Marcy Shelton
NT 2580, Guzman
Project Part 1, Multi-Layered Security Plan:
Muliti-Layered Security Plan
1. USER DOMAIN:
A. User awareness/policies.
i. By conducting security awareness training, you can educate the user/employee on the policies and standards. Also make the user/employee aware of the violation consequences if the said policies and standards are broken. To further implement this security awareness plan, follow up by sending out reminder/updates in a bi-weekly email and flyer handout.
B. Restrict user access.
i. By restricting user access, only allowing the user/employees enough access to successfully do and complete their job/tasks; you can prevent user destruction.
2. WORKSTATION:
A. Enable password protection and system lockout.
i. By enabling password protection on all workstations and implementing a three try timeout/lockout on an un-successful entered password, you can protect your company from unauthorized users trying to gain access by password hacking.
B. Protect all CD, DVD’s, and USB ports.
i. Deactivate all CD, DVD, and USB ports; then enable an automatic antivirus scan for the CD’s, DVD’s, and USB ports to prevent any harmful, or malicious files that may be on the drives.
3. LAN:
A. Define strict access control policies, standards, procedures, and guidelines.
i. By implementing a second level identity check to gain access to sensitive systems, applications, and data; you can protect from unauthorized access to the systems, applications, and data.
B. Implement encryption between workstations and WAP to maintain confidentiality.
i. By implementing the encryption between workstations and WAP you can protect the confidentiality of data transmissions.
4. LAN-WAN:
A. Apply strict security monitoring controls for intrusion detection and prevention.
i. With this security plan being implemented, you can monitor inbound IP traffic anomalies and prevent malicious-intent traffic that may try to intrude and harm your system.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    You must demonstrate the various methods for using the runas utility to allow administrators to reduce the exposure of administrative accounts.…

    • 322 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 1 Case Study

    • 825 Words
    • 4 Pages

    When configuring windows networking, two major approaches are valid to secure all the network resources, the workgroup approach and the Domain approach. The workgroup approach is simply to create a windows peer-to-peer network with a decentralized security system. This workgroup security approach…

    • 825 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Finally, the system/application domain would require virtual testing of everything before any implementation, hardening of all servers, and keeping up with patches and updates regularly after testing has been completed. Some of the more efficient ways to implement better access controls in a company would start with the proper level of authorization policies including physical controls for facilities. The authorization policy would appropriate entry system access controls that specify what areas are to be locked at all times and what type of locking mechanism should be implemented. It would also include the implementation of secondary locks on specific equipment and storage cabinets…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1. What vulnerabilities exist for this workgroup LAN based on the advisories? List five of them.…

    • 290 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Hollis IS3230 Unit 3 Lab3

    • 766 Words
    • 4 Pages

    2. Describe one way to help prevent unauthorized users from logging onto another person’s user account and accessing his/her data.…

    • 766 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Nt2580 Unit 2 Lab 1

    • 581 Words
    • 3 Pages

    With Google, it’s a little more complicated. There didn't used to be a single locker but now the Big G has taken care of that one with the launch of the Google Drive. You get 5GB of space plus 1GB of Picasa storage for free along with any space in your Docs and Gmail section. There's an apparent maximum storage space on the Google Drive itself up to 100GB but you can rent more space from…

    • 581 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    ____ authentication can be used in a Windows domain environment or on a Linux system to authenticate users and computers.…

    • 817 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    If we watch these specific areas closer and implement some user policies, I’m certain that we can normalize as well as reduce security threats to our network and in turn, will make our company a more productive and profitable…

    • 285 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt2580 Project 1

    • 492 Words
    • 2 Pages

    In the workstation domain, we need to make sure that all workstations have antivirus and malware protection installed on them. Laptops and portable devices are very vulnerable to theft…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 331 Words
    • 2 Pages

    Solution: Create a recurring change of passwords, say once every few months, for your company. Have the passwords require a combination of numbers and letters, as well as a special character.…

    • 331 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The User Domain is the most important because the user can easily create a problem within the network, therefore can be considered the weakest link. The user domain defines the people who access an organizations network and IT infrastructure. In the user domain you will find an acceptable use policy, also known as an AUP. An AUP defines what a user can and cannot do within the organization. Some of the don’ts include but are not limited to malicious emails to and from other co-workers, breaking security policies by entering co-workers workstations, inappropriate web browsing that can lead to viruses, as well as uploading and downloading music,…

    • 501 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    ISA 650 Final Exam Paper

    • 4435 Words
    • 18 Pages

    73. Requires the creation of computer security plans, and the appropriate training of system users or…

    • 4435 Words
    • 18 Pages
    Satisfactory Essays
  • Good Essays

    NT2580 Unit 1

    • 578 Words
    • 3 Pages

    The first domain that would be affected is the User Domain. The User Domain defines the people who access an organization’s information system. One of the roles and tasks is that the user can access systems, applications, and data depending upon their defined access rights. Inside the User domain is where the user would find the acceptable user policy or AUP. The AUP defines what users are allowed to do within the organization-owned IT assets. The User Domain is considered the weakest and most affected domain. One reason why is that it has a lack of user awareness. Another reason is that when users are downloading various content and different files, they generally do not conform to the established security guidelines. To protect from these issues, there should be enabled content filtering as well as automatic antivirus scans. A way to protect from an user doing Employee blackmail or extortion is to enable intrusion detection system/intrusion prevention system (IDS/IPS) monitoring. The monitoring will examine the IP data streams for inbound and outbound traffic.…

    • 578 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Bat1 Task 1

    • 1280 Words
    • 6 Pages

    IT staff can diminish security breaches by developing effective ways to teach clinical staff about securing their workstations when not in use. Mandatory in-service and power point presentations would be an effective way to do this. The importance of workstation security, not accessing another employee's computer while in use and not using another employee's password should be discussed. Along with how doing so would be in violation of company policy and the HIPAA Privacy Act. Disciplinary action should also be discussed.…

    • 1280 Words
    • 6 Pages
    Good Essays
  • Good Essays

    The importance of this is to keep sensitive information for getting out to the world. There is a lot of hacker software that can penetrate a company’s network and get into the database that contains sensitive material. The one thing to prevent any of this from happening is to get a good network security system that can pretty much block off any intrusion to the firewall. But it is everyone’s job to prevent their passwords from getting out. Don’t write down your password anywhere that can be visible for anyone to see. Plus when you come up with a password make sure it something that it is not easy to crack. There are many network systems that require you to use certain number of characters to prevent passwords from being compromised. These are just some of the ways that you can prevent unauthorized access to passwords and the benefits of having a secure network system.…

    • 1251 Words
    • 6 Pages
    Good Essays