Preview

Should Security Architecture Should Be Divided?

Good Essays
Open Document
Open Document
805 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Should Security Architecture Should Be Divided?
Pradeep Kumar Chagantipati
Cuw id: F00437246
Security Architecture:
Explain why a security architecture should be “layered.”
The Technology is also one of the key factor in information security program as companies carry most of their function electronically which exposes them to many security threats. In this information security program, for an effective architecture we should provide layered security program in order to provide multiple levels of defense. This is firmly known as Defense-in-depth.
Defense-in-depth:
In this, our information or data environment is divided into multiple digital zones and provides protection to each and every layer in the network. These layers of the network includes gateway, server and client servers. A gateway

You May Also Find These Documents Helpful

  • Better Essays

    To properly secure an information system means protecting its files and other confidential information from misuse. The current speed of technological growth requires ever evolving security measures to follow these developments. As the members of Team “A” set out to address this need, it was necessary to discuss the requirements. The foundation of all concrete security plans require a detailed knowledge of all current systems, the tools needed to accomplish security needs and employee training. The implementation of these requirements will be outlined within a final Security Presentation.…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Politics of Muscle

    • 403 Words
    • 2 Pages

    "The Politics of Muscle" by Gloria Steinem is an essay arguing the difference in strength between men and women. Steinem starts her essay by stating how she grew up in a generation where women didn't participate in a lot, if any, sport activities. She goes on to say that she believes this is the reason why women of her generation believe that it's not what the female body does, but how it looks. Steinem feels that women always seemed to be owned in some degree as the means of reproduction. She believes that women are made to feel ashamed of their strength and that "only when women rebel against patriarchal standards does female muscle become more accepted." (pg 372)…

    • 403 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    This multi-layered security plan for Richman Investments will provide a short overview of the security tactics that will be applied at each level of the IT infrastructure.…

    • 1234 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Identify any hardware or programming that may be basic – Ultimately the security of the framework will be a basic segment to keep up business and individual records guaranteed. There are a considerable measure of programming choices available, for instance, McAfee or Symantec that offers a framework protection bundle that consolidates Anti-disease security, Network Firewall, Password organization, Anti-Spam Technology, data encryption and data fortification. The last will be a major instrument to setup remembering the true objective to keep up supervision of data in case of hard plate crash or any emergency that requires a structure restore.…

    • 605 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    INDP Final Project

    • 1793 Words
    • 4 Pages

    References: Banathy, A., Panozzo, G., Gordy, A., & Senese, J. (2013, July). A Layered Approach to Network Security. Retrieved from http://www.industrial-ip.org/en/knowledge-center/solutions/security-and-compliance/a-layered-approach-to-network-security…

    • 1793 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    This domain needs strict security controls given the risks and threats of connecting to the internet. This domain is where all data travels into and out of the IT infrastructure. A security solution for unauthorized access through the LAN-to-WAN domain is to apply strict security monitoring controls for intrusion detection and prevention.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Nt2580 Project 1

    • 492 Words
    • 2 Pages

    When you create a multi-layered security plan, you must look at all of the domains of the IT infrastructure. Once you look at the security of each you must then increase the security on each of those seven domains. A security increase will help the overall security of the system and create a multi-layered security plan.…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Project 1

    • 300 Words
    • 2 Pages

    A DMZ network has been set up to add another layer of security. A DMZ is layered defense created to limit access deeper into the network. Connected to that particular firewall is the addition of a storage router, that makes it now three routers in the network diagram as oppose to the two routers in the as-is diagram. To ensure software countermeasures, the deployment of anti-virus and firewall software for servers and computers are implemented. Anti-virus software for servers would operate at the database layer while other antivirus and software firewalls would operate at the client layer. The use of a personal firewall protects each of the client machines, creating a virtual layer.…

    • 300 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NT2580 Project part 1

    • 606 Words
    • 3 Pages

    Safety of data and information is a real important aspect of a company. Before we can create an outline for general security solutions we must first define what is needed. I recommend that we use a multi-layered security plan. There are a total of seven domains of an IT infrastructure including user domain, workstation domain, LAN domain, LAN-to-WAN domain, WAN domain, remote access domain, and system/application domain.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Mis 589 Unit 7

    • 943 Words
    • 4 Pages

    Each computer in the network has software that operates at each of the layers and performs the functions required by those layers. Each layer in the network uses a formal…

    • 943 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    BIS Week 3 Assignment

    • 446 Words
    • 2 Pages

    There are countless steps that can be taken to safeguard a company’s data systems against intrusions. The company can update POS (Point-of-Sales) systems to EMV (Euro pay, MasterCard, and Visa) technological standards, implementing “layering” encryption and tokenization, and utilizing outsourced penetration tests to access and report on company’s current information security strength.…

    • 446 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Csia 301 - Syllabus

    • 4678 Words
    • 19 Pages

    describe the necessity of secure architecture in information systems analyze the role of security models and architectures and their relationship to information security explain the…

    • 4678 Words
    • 19 Pages
    Good Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Attacks, threats, and vulnerabilities in a typical IT infrastructure …

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Security is a fundamental aspect of any network infrastructure. The goal is to always have the most up to date programs and protocols to ensure the protection of the network. No aspect is too small to over look. That could mean the difference between a secure network and a compromised network. The best way to achieve this is to break down every level and approach each one as a separate entity and secure it. Then you can modify it to suit the needs of your network.…

    • 1508 Words
    • 7 Pages
    Good Essays
  • Good Essays

    I previously identified several types of attacks, threats and vulnerabilities that exist with your multilayered network. I have now been charged with the responsibility of developing a strategy to deal with these risks as well as a plan to mitigate each risk to reduce the impact that each will have on your organization.…

    • 1443 Words
    • 6 Pages
    Good Essays