Preview

IS 3230Unit 4 Assignment 1

Satisfactory Essays
Open Document
Open Document
439 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IS 3230Unit 4 Assignment 1
IS 3230
Unit 4 Assignment 1 Implementation of an Organization-Wide Security Plan
Looking at the network diagram provided I determined that the user, workstation, LAN, LAN-to-WAN, and system/application domains involved in the company should be redesigned to implement better access controls to provide multi-layered security. The most important access control implementation would be the user domain where the company should put emphasis on training; how to recognize social engineering attacks, how to create strong passwords, and how often they should be changed. The workstation domain should focus security via virus and malware scanning, operating system patching, and other types of application-level firewalls. To achieve a multi-layered security approach in the LAN domain I would recommend using an intrusion detection system (IDS) and an intrusion prevention system (IPS) to prevent unauthorized access. Security for the LAN-to-WAN domain should be implemented through the use of a firewall or DMZ to also prevent unauthorized access into the company’s network.
Finally, the system/application domain would require virtual testing of everything before any implementation, hardening of all servers, and keeping up with patches and updates regularly after testing has been completed. Some of the more efficient ways to implement better access controls in a company would start with the proper level of authorization policies including physical controls for facilities. The authorization policy would appropriate entry system access controls that specify what areas are to be locked at all times and what type of locking mechanism should be implemented. It would also include the implementation of secondary locks on specific equipment and storage cabinets within the facility, and training goals on the recognition and prevention of social engineering attacks. Authorization policies will also include access controls for data by specifying which data should be encrypted, they would

You May Also Find These Documents Helpful

  • Better Essays

    Tipton, H. F., & Krause, M. (n.d, n.d n.d). Access Control Principles and Objectives. Retrieved November 29, 2013, from cccure.org: https://www.cccure.org/Documents/HISM/003-006.html…

    • 1902 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Unit 2 Lan

    • 272 Words
    • 2 Pages

    Define a LAN-to-WAN, Internet, and Web surfing AUP that restricts usage of the company’s Internet connection and permits the company to monitor usage of the corporate Internet connection. Carefully evaluate the implications of each policy and how implementations might impact the IT infrastructure, both positively and negatively. Weigh the benefits and the disadvantages of each method. Consider whether or not a proposed solution causes an interruption to the legitimate users and how it might bring security at the expense of preventing a perfectly legitimate…

    • 272 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Remote Access Control Policy: Richman Corporation Authorization Rules: Controls will be configured to ensure access is approved for only company/corporate employees. These controls will be set up based off of the position (job roles) of the employees to ensure they can only access what is required to allow them to perform their duties. The policy will include group membership policies as well as authority-level policies. The employee access will be assigned to the appropriate groups and authority- level policies.…

    • 328 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    When specifying security policies for an enterprise, setting security on an individual-by-individual basis provides the tightest and most personalized security. The tradeoff, however, is the increased amount of administration effort in setting up the security and maintaining it on an ongoing basis. You have been brought in as a consultant from Smith Systems Consulting to advise Riordan Manufacturing on what it will take to establish adequate enterprise security policies. You will need to prepare a 3-5 page paper that highlights why they should establish separation of duties via role assignment and how this will provide safeguards to protecting the data in their information systems.…

    • 651 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    It244 R Appendix E

    • 650 Words
    • 3 Pages

    Describe the policies for securing the facilities and the policies of securing the information systems. Outline the controls needed for each category as relates to your selected scenario.…

    • 650 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Dec 17, 2013 IS3120 Unit1 Unit 1 Assignment 1 The Johnson Company is a small business that provides networking components and services. They are in need of new methods of communication for reaching out to new customers, standing out from other businesses, meeting existing customer needs, and keeping customers informed of news and updates. The Johnson Company still uses analog phone lines and still takes customer orders by hand. Their only current method of advertising is an ad in the yellow pages. They have reached out to our IT consulting firm to help them update their current business processes and communications…

    • 352 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    IS3340-Unit 2-Assignment 2

    • 1549 Words
    • 6 Pages

    b. Emergency Access i. WU HIPAA Security Policy requires procedures to ensure that access to a system that contains EPHI and is used to provide patient treatment is made available to any caregiver in the case of an emergency if the denial or strict access to that EPHI could inhibit or negatively affect patient care. During extreme emergency conditions, RO would rely upon BJH electronic access to the IMPAC electronic medical record as well as BJH Health Informations Management (HIM) for access to the physical medical record.…

    • 1549 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    IS3220 Assignment 3

    • 980 Words
    • 4 Pages

    As part of the network security team, we will be proving IDI with a network security plan to mitigate the vulnerabilities that have been discovered. A secure site will be set up with network intrusion detection and network protection systems will be available to access via the internal network. Policies will be presented for remote access and the use of VPN. Also contained within this report will be strategies for hardening the network and mitigating risks. An updated network layout with increased network security to meet the current needs will be included.…

    • 980 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The user domain is the employees who access the organization network and IT infrastructure. There should be a policy in place that defines what the employee can do inside the organization. A employee handbook would be beneficial and should list all of the guidelines and procedures. Many smack threats can be avoided by the lack of knowledge and security violations. Reminders like emails and periodic meetings can help employees be more aware about threats and technology updates. If there is a security violation the employee should be under watch and have a meeting with their supervisor. Employee’s daily usage should also be supervised periodically to…

    • 347 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Unit 8 Assignment 1: Organized Cybercrimes IS 3350 Victor Sabani ITT Technical Institute October 28, 2014…

    • 276 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    o Access controls is an important part of security in any business setting. This insures the protection of sensitive materials from being access from unauthorized users as well as keeping in-house materials in-house and not distributed to unauthorized personnel.…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Access Control is an important part of any business. Anytime a business is under construction it will be more vulnerable to threats and attacks. Construction will need more protection because of the ability to gain easier access to a building because of the open areas within the building. Certain areas in a building are a target for attacks. Some areas are higher risk because of the information or high-value assets within the building. Access Control is the best way to wing out some threats and minimize other threats. Each individual at an access point will have several types of protection such as gates, lighting, cameras, detectors, sensors and other devices that can check individuals thoroughly and make sure each one is authorized to be in the building. Keeping individuals out that have no authorization can lower threats and minimizes chances of damage occurring externally. Access control will work from the outside in to protect a business.…

    • 1456 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Network Final

    • 358 Words
    • 2 Pages

    Security Security document: Session 8 Laura Abraham Telecommunications Networks: CIS 313-DL Security will be implemented throughout different areas of the network:…

    • 358 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Reseta

    • 1504 Words
    • 7 Pages

    XX Agency INTERIM POLICY DOCUMENT | | | | | |Network Security Management | |…

    • 1504 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    Security and unauthorized decryption and access (also known as hacking) are running a perpetual race for primacy. This aforementioned primacy switching hands alternately, white-hat, black-hat, white-hat, black-hat, etc., It is because of this back and forth evolutionary process that a company cannot have just a good security policy for the moment, but the must have a security policy that is scalable and has the growth potential to keep pace with the next new powerful threats that are poised to come down the pike inevitably.…

    • 1124 Words
    • 5 Pages
    Better Essays