Preview

Multi Layered Security Plan

Good Essays
Open Document
Open Document
299 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Multi Layered Security Plan
Project Part 1

Multi Layered Security Plan

Richman Investments

1) General

This MLS plan will give a brief overview of the security strategies that will be implemented at each level of the IT infrastructure.

2) User Domain

a. The usage of security awareness training to instruct employees of Richman Investments security policies

b. Auditing of user activity

3) Workstation Domain

a. The usage of antivirus and antimalware programs on each user computer

b. Strict access privileges to corporate data

c. Deactivation of media ports

4) LAN Domain

a. Utilizing network switches

b. WPA 2 encryption to wireless access points

c. Securing server rooms from unauthorized access

5) LAN to WAN Domain

a. Closing off unused ports via a firewall to reduce the chance of unwanted network access

b. Monitor inbound IP traffic, more specifically looking for inbound transmissions that show signs of malicious intent

c. Run all networking hardware with up to date security patches, and operating systems

6) WAN Domain

a. Enforce encryption, and VPN tunneling for remote connections

b. Configure routers, and network firewalls to block Ping requests to reduce chance of Denial of Service attacks

c. Enforce antivirus scanning of email attachments

i. Isolate found malicious software (virus, Trojans, etc.) when found

d. Deployment of redundant internet connections to maximize availability

(Kim & Solomon)

7) Remote Access Domain

a. Establish strict user password policies, as well as lockout policies to defend against brute force attacks

b. Require the use of authorization tokens, have a real-time lockout procedure if token is lost, or stolen

c. Encrypt the hard drives of company computers, laptops and mobile device to prevent the loss of sensitive data

Works Cited

Kim, D., & Solomon, M. G. Part 1: The Need for Information Security. In Fundamentals of Information Systems Security. Jones & Bartlett



Cited: Kim, D., & Solomon, M. G. Part 1: The Need for Information Security. In Fundamentals of Information Systems Security. Jones & Bartlett Learning.

You May Also Find These Documents Helpful

  • Good Essays

    Acct 505

    • 743 Words
    • 3 Pages

    d. Implementation of better security measures for data protection, identity protection and ensuring that company resources are not misused…

    • 743 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    For the systems/application domain, we must strengthen our servers. This will be done by shutting off access to unused ports and services. This will provide less ways onto our system. Our servers must have the latest patches and…

    • 337 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Configure routers and firewalls to deny all ping requests to reduce chances of DOS attacks and setup redundant internet connections to increase availability. Scanning of all email for malicious software and isolate anything that is…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt2580 Project 1

    • 492 Words
    • 2 Pages

    For the systems/application domain, we must lessen chances for attacks on our servers. This shall be done by figuring out which ports and services are not being used and shutting them off. This gives hackers less ways onto our system. Also needed is to make sure all servers have the latest patches and updates. These updates provide the latest security patches with less likelihood of vulnerabilities.…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In the workstation domain, we need to make sure that each of the workstations, whether desktop or laptop, has to have antivirus and malware protection installed on them. Express strict access control polices and standards. And mandate annual security awareness training for all employees…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NT2580 Project part 1

    • 562 Words
    • 3 Pages

    i. With this security plan being implemented, you can monitor inbound IP traffic anomalies and prevent malicious-intent traffic that may try to intrude and harm your system.…

    • 562 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    lesson10

    • 285 Words
    • 2 Pages

    Which of the following account lockout policy modifications could you make to ensure that user passwords cannot be intercepted by analyzing capture packets?…

    • 285 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    AIS Review Sheet

    • 2832 Words
    • 12 Pages

    3) Authentication: Verifying the identity of the person or device attempting to access the system.…

    • 2832 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    References: Kim, D., & Solomon, M. G. (2012). Fundamentals of Information Systems SecuritY. Sudbury: Jones & Bartlett Learning.…

    • 651 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    ISA 650 Final Exam Paper

    • 4435 Words
    • 18 Pages

    73. Requires the creation of computer security plans, and the appropriate training of system users or…

    • 4435 Words
    • 18 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Fcs 006

    • 856 Words
    • 4 Pages

    9. ____ software, such as that shown in the accompanying figure, can control which devices can be connected to an employee computer. a. Data-leakage prevention c. Professional firewall b. Device authentication d. Network quarantine…

    • 856 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    This process includes the creation of a strong password and an account lockout policy is created, logon hours are assigned, a ticket expiration policy is created, and clock synchronization tolerance to prevent replay attacks is set just to name…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Attacks, threats, and vulnerabilities in a typical IT infrastructure …

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Better Essays

    There are several possible threats that can affect the integrity of any organizational network. Many of these threats can come internally from the users of the system. Internal attacks can be intentional, accidental, or simple human error. Some examples of accidental infection can come from a user opening an email containing a virus, installing new software, altering desktop configuration, visiting precarious web sites, leaving the area of their desktop without logging out of their account, or simply losing or leaving their personal wireless device unattended. Organizations should have specific policies covering each of these topics defined within their security plan document. Also, standard operating procedures should be available for technicians to follow whether performing day to day tasks, or responding to an incident.…

    • 959 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Discovering Computers 2008 Chapter 9 Computer Security, Ethics and Privacy 1 2 Chapter 10 Objectives Describe the types of computer security risks Discuss the types of devices available that protect computers from system failure Identify ways to safeguard against computer viruses, worms, Trojan horses, botnets, denial of service attacks, back doors, and spoofing Explain the options available for backing up computer resources Discuss techniques to prevent unauthorized computer access and use Identify safeguards against hardware theft and vandalism Explain the ways software manufacturers protect against software piracy Define encryption and explain why it is necessary Identify risks and safeguards associated with wireless communications Recognize issues related to information accuracy, rights, and conduct Discuss issues surrounding information privacy Discuss ways to prevent health-related disorders and injuries due to computer use 3 Computer Security Risks…

    • 2181 Words
    • 25 Pages
    Powerful Essays

Related Topics