Security Implementation Plan – Aegis Technologies Group
Donald Hanlin
12 August 2012
Table of Contents Project Outline 4 Company Description: 4 Recognized Benefits: 4 Information Security Coverage 6 Risk Management: 6 Human Resources Security: 7 Physical Security: 8 Environmental Security: 8 Mobile Security: 9 Security Assessment 10 Risk Assessment: 10 1. Denial of Service Attacks 10 2. Phishing 10 3. Spoofing 11 4. Virus 11 5. Worm 12 Intrusion Detection and Prevention: 12 Access Control 14 Requirements: 14 1. Access Levels: 14 2. Access Groups: 14 Security Mechanisms: 15 1. Physical Security Mechanisms: 15 2. System …show more content…
It checks for connection speed and static on the line to ascertain the best route for the packet to take to reach its destination. Acting as a gateway between networks, routers make sure that data is delivered to its proper destination. The second purpose of a router is to ensure that data does not go where it is not permitted. By acting as a virtual network traffic cop, routers keep data and specifically large files from being distributed to all machines on a network, which could potentially cripple the network (Hill, …show more content…
(2005). SSH, The Secure Shell: The Definitive Guide. Sebastopol, CA: O’Reilly Media, Inc.
Bradley, T. (2012). Protect Yourself From Phishing Scams. Retrieved July 23, 2012, from http://netsecurity.about.com/od/security101/a/phishprotect.htm
Buchanan, S. (2002). Digital Signatures and Public Key Encryption. Retrieved July 31, 2012, from http://afongen.com/writing/pke/
Business Dictionary (n.d.). Definition of Risk Management. Retrieved July 16, 2012, from http://www.businessdictionary.com/definition/risk-management.html Cisco (n.d.). Strategies to Protect Against Distributed Denial of Service (DDos) Attacks. Retrieved July 23, 2012, from http://www.cisco.com/en/US/tech/tk59/technologies_white
_paper09186a0080174a5b.shtml
Collins, J. (n.d.). Protection against viruses. Retrieved July 23, 2012, from http://www
.akamarketing.com/protection-against-viruses.html
Davis, T. (2012). Physical and Environmental Security (ISO 9). Retrieved July 17, 2012, from https://wiki.internet2.edu/confluence/display/itsg2/Physical+and+Environmental+
Security+%28ISO+9%29
Debian.org (2011). LDAP + Kerberos. Retrieved July 31, 2012, from http://wiki.debian.org/