Preview

Multi Layered Security Plan

Satisfactory Essays
Open Document
Open Document
506 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Multi Layered Security Plan
Multi Layered Security Plan
Richman Investments
1) General
This MLS plan will give a brief overview of the security strategies that will be implemented at each level of the IT infrastructure.
In this Multi Layered Security Plan we will describe how we will improve the security of each domain and how to protect our information. We will update all firewalls on the infrastructure and secure our ports that are open and stop incoming traffic that is malicious. All anti-virus software will be updated throughout the company. All IT employees will be informed about the new MLS Plan that we putting into effect once the Senior management approves it.
2) User Domain
a. The usage of security awareness training to instruct employees of Richman Investments security policies
We have to train the employees on the protection of their user IDs and login information to the companies system. Show the employees how to create a better password and security questions and not to write there passwords down on sticky notes to help remember. Making them aware of friends, family, or people that ask questions out of the ordinary, because the questions could possibly your security questions or part of your password. The user only has three attempts and they are locked out and will have to see a admin to be unlocked.
b. Auditing of user activity
We will watch how the users go about their daily activities on the company’s internet/network and make notes on what we see to be as an opposing threat to the company itself. Monitoring how much bandwidth is being used and for what, also if any employee tries to load out of company software or use flash drives from home will be locked out immediately and then be questioned about it.
3) Workstation Domain
a. The usage of antivirus and anti-malware programs on each user computer
b. Strict access privileges to corporate data
c. Deactivation of media ports
4) LAN Domain
a. Utilizing network switches
b. WPA 2 encryption to wireless access

You May Also Find These Documents Helpful

  • Satisfactory Essays

    -In reference to previous network plan U1A1 a firewall will be in place in the LAN/WAN Domain & System/Application Domain to protect internal network from potential external threats.…

    • 565 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    | * OS Level * Patch history Configuration hardening Desktop access, Application access * File Access * File Storage * VPN Authentication Browsing * Emails * Backups…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    This MLS Plan will describe how the IT department will improve the security of each domain and how to protect the company’s information. The IT department will update all firewalls on the infrastructure and make sure to secure all ports that are open. This will help stop incoming traffic that is malicious. Another protection utilized will be anti-virus software,…

    • 1234 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    When creating a multi-layered security plan, I would look at all seven domains of the IT infrastructure and then increase the security on each of those domains because that will increase the security for the whole plan. In the user domain, this is the quickest way for the system to be compromised the users. So I would implement complex passwords including eight or more characters, both upper and lower case, and use of at least one special character. Passwords will also need to be changed every 90 days and the same password cannot be used again for three calendar years. In the workstation domain, I would make sure that each workstations, whether desktop or laptop has some security on it like antivirus and malware protection installed. Laptops can be very vulnerable for loss or theft, which would make me install an encrypted hard drive so if it is stolen the data can only be retrieved by the owner. For the LAN domain, just train all users about email scams. I would guess that most users know not to access suspicious emails when on our system but I would still implement to the users a quick training course. Then I we should add spam filters this will help get rid of most of the junk email. In the LAN-to-WAN domain, we need to shut down the File Transfer Protocol (FTP) server we have running and switch it over to use secure FTP so that only users allowed on our system can access our FTP server. In the WAN domain, we need to make sure that we have firewalls set up on our network that will filter all incoming traffic. This firewall will stop all traffic coming on to our system that is not meant or not wanted our network. In the Remote Access Domain, we need to establish strict user password policies, as well as lockout policies to defend against brute force attacks, require the use of authorization tokens have a real-time lockout procedure if token is lost, or stolen. The last domain is System/Application domain we need to…

    • 449 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    When developing a multi-layered security plan, you must look at each of the seven domains of the IT infrastructure and increase security on each of those domains. Increasing the security on each of those seven domains will increase the overall security of the system and create a multi-layered security plan.…

    • 512 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    NT2580 Project part 1

    • 606 Words
    • 3 Pages

    Safety of data and information is a real important aspect of a company. Before we can create an outline for general security solutions we must first define what is needed. I recommend that we use a multi-layered security plan. There are a total of seven domains of an IT infrastructure including user domain, workstation domain, LAN domain, LAN-to-WAN domain, WAN domain, remote access domain, and system/application domain.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Nt2580 Final Project

    • 1848 Words
    • 6 Pages

    It is my view the Administrator’s responsibility is to provide secure communications by adding layers of security at all levels to assure the amount of protection for company’s valuable assets. Richman will provide its employees a new method of authentication I call Trinity. It is a three-factor authentication method requiring updated laptops and new Apple IPhone. Since Microsoft has stopped support for Microsoft Windows Operating System XP, and 87 % of our current systems require upgrade to Windows 7. We should take advantage of the newest technologies available to our Corporation. Trinity is a three-factor authentication combines” “something that you know” (password – PIN), with “something that you have” (hardware- token, mobile phone) and/or “something that you are” (biometric technologies), to make sure that the person is who he/she claims to be.”(1)…

    • 1848 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Is 411 Study Guide

    • 305 Words
    • 2 Pages

    Privileged Access Agreement (PAA) - Page 220 – Contractors and temporary workers sign this type of document.…

    • 305 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    You Decide Assignment

    • 755 Words
    • 4 Pages

    As a company grows , changes and new policies are created to fit the fast pace industry that we live in today. And as a part of your IT staff, I 've collected some information that can help the company, with implementing a new policy when it comes with computer use. From legal reasons, virus attacks, to our network systems and services, we all need to be aware and cautious about this as a whole. The material I 'll be covering today will include all of the issues brought up by our CEO, CFO, and General Manager. In addition, an explanation on general use ownership, security and proprietary information, and unacceptable use, will be discussed.…

    • 755 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Aup Definition

    • 554 Words
    • 3 Pages

    I have identified the methods to mitigate risk and to minimize exposure to threats or vulnerabilities.…

    • 554 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    There are many ways to tighten up security when it comes to network security, but the most important part of the security in the actual user. If the user is not trained on the system and does not know ones regulations of the company then security is out the door. First and for most, the personal must continues training on the systems that they will have access to. Then there system must be prepared for the environment that they will be placed in. If the policy allows access to facebook then the server address won’t be blocked. If they don’t allow any other programs, software, or web sites then for work, then the computer must be set up for that purpose of working only. That is how one lowers the threat level on the user’s level. For authentication, authorization, and accounting the IT department must stay on top of their duties and have the passwords changed every so often. The IT team must also give the correct level of access to the person that is due it. And continue with follow ups on the system to insure that all is still well. For prevention they must try and stay one step ahead of the intruders. They must think like the hackers and try and get through their systems. For responding to intrusions a company should have a response team or a Disaster Recovery Team in place to act in cases of intrusions. There should be back systems in place to as not hinder the company day to day operation. Files should be backed up in a timely manner also. But a system is never fully…

    • 310 Words
    • 2 Pages
    Good Essays
  • Good Essays

    internal and external users to whom access to the organization’s network, data or other sensitive…

    • 3990 Words
    • 15 Pages
    Good Essays
  • Satisfactory Essays

    Microsoft

    • 369 Words
    • 2 Pages

    Network security training for all staff is required by the center’s liability insurance policy. As specified by our insurance carrier, Universal Pro Inc., each staff member will be assigned to one of three training levels. General users must complete multiple one-hour Level 1 classes to be held onsite at the art center. Department managers will be assigned to a one-day Level 2 training session on basic system administration and security management. The center’s two network managers and all technical staff must complete a two-day Level 3 security training seminar at the offices of Brookstone Network Consulting. Level 3 training will be supplemented with ongoing monthly education on emerging network threats.…

    • 369 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Attacks from the Insiders

    • 1029 Words
    • 5 Pages

    One of the most common concerns in putting together a comprehensive information security plan is to have a watchful eye on your own team members and fellow employees within the company. The people on the inside are the one’s who are granted the most access in the first place, therefore taking the appropriate precautions concerning them is of the utmost importance.…

    • 1029 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    The path for risk management and the security panels consumed by a corporation are offered by information security strategy and architecture, which is very important to any companies and organizations. The security architecture would need to define the way that obligation would be accomplished in the numerous regions of the corporate. Furthermore, the security architecture must report past activities that have affected the company’s information properties. These incidences designate areas that may need larger safekeeping controls. Fresh intimidations may compel differences in the security design and supplementary controls. The safekeeping design must also integrate with the current technology substructure and postulate assistance in inaugurating the appropriate risk controls needed for the corporate to accomplish its business firmly.…

    • 1522 Words
    • 7 Pages
    Powerful Essays