Preview

IT255 Project 1

Satisfactory Essays
Open Document
Open Document
663 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IT255 Project 1
Part I

The following outline presents the fundamental solutions for the safety of data and information that belongs to Richman Investments. As part of the general security plan of the organization the IT department puts together a proposal to provide multi-layered security strategies that can be applied at every level of the IT structure. The plan will lay out the importance of improving and safeguarding the levels of each domain and the process of protecting the information of the organization.

User Domain
At Richman Investments the personnel is accountable for the appropriate use of IT assets. Therefore, it is in the best interest of the organization to ensure employees handle security procedures with integrity. It is essential to create a strong AUP (Acceptable Use Policy) procedure and as part of the process, require employees sign an agreement to guarantee they understand and conform to implemented rules and regulations. In addition, the company will conduct security awareness training, annual security exercises, notices about securing information, and constant reminders security is everyone’s responsibility.

Workstation Domain
The plan to secure the workstation domain enforces a strong password policy on each workstation and also enables screen lockout protection for inactive times. Keeping all workstations with an up to date antivirus is essential. Furthermore, content filtering features will arrange access of specific domain names according to AUP definitions. In addition, workstations will have up-to-date application software and security patches conferring to company guide lines. As part of the workstation security strategy IT will disable the auto-play feature and will enable automatic scan for any external devices that may be connected to the machine. This measure will ensure the content is secure.

LAN Domain
A priority to the LAN domain is proper security of physical equipment. Only authorized personnel are allowed to gain access into...

You May Also Find These Documents Helpful

  • Better Essays

    To properly secure an information system means protecting its files and other confidential information from misuse. The current speed of technological growth requires ever evolving security measures to follow these developments. As the members of Team “A” set out to address this need, it was necessary to discuss the requirements. The foundation of all concrete security plans require a detailed knowledge of all current systems, the tools needed to accomplish security needs and employee training. The implementation of these requirements will be outlined within a final Security Presentation.…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    lab 4

    • 451 Words
    • 2 Pages

    Create a simple Internet OR e-mail use policy for Richman Investments that defines the acceptable and unacceptable use of Internet and e-mail access at Richman. Go to the SANS website at http://www.sans.org/security-resources/policies/ to view sample policies.…

    • 451 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    This multi-layered security plan for Richman Investments will provide a short overview of the security tactics that will be applied at each level of the IT infrastructure.…

    • 1234 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Looking at the network diagram provided I determined that the user, workstation, LAN, LAN-to-WAN, and system/application domains involved in the company should be redesigned to implement better access controls to provide multi-layered security. The most important access control implementation would be the user domain where the company should put emphasis on training; how to recognize social engineering attacks, how to create strong passwords, and how often they should be changed. The workstation domain should focus security via virus and malware scanning, operating system patching, and other types of application-level firewalls. To achieve a multi-layered security approach in the LAN domain I would recommend using an intrusion detection system (IDS) and an intrusion prevention system (IPS) to prevent unauthorized access. Security for the LAN-to-WAN domain should be implemented through the use of a firewall or DMZ to also prevent unauthorized access into the company’s network.…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    POS421 Week 5 Individual

    • 1789 Words
    • 5 Pages

    In the Week 4, a domain model was created for Company Beta. When the domain model was created, it was thought to cover all the security concerns associated with the information contained on the network. Unfortunately, this is not the case. Recently, there has been some compromising activity to allow sensitive information to possibly get into the wrong hands. To help aid in eliminating the possibility of this occurring again, the entire domain model will be re-evaluated. This will provide security enhancements that are not present in the current domain model. In order to re-evaluate the current domain model, there are several aspects that we will have to discuss. These aspects include the type of domain model used for current domain model, the affects subnets may or may not have, how a new domain model can provide better security, how to improve the domain name system, the Internet domain name and its effect on the DNS name-resolution process, and can ISDN be improved. In addition, it will also be noted how domain controllers can be utilized to provide the company with adequate expansion in the future due to user population increase.…

    • 1789 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Data Classification Standards help Richman Investments to consistently define how this organization should handle and secure our various types of data. This report will focus on the internal use only data and how each of these domains are affected by these standards. Internal use only data refers to information that may or may not be confidential. It is imperative that our organization keep this information in house and away from the public and realize the Domains that need to be addresses with these rigid standards. The three standards that are at the top of the list for our company that will be directly affected are the User, Work Station, and LAN Domains.…

    • 789 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Continuing of Richman Investments has expanded with more offices, locations and clients, which the needs of protection for assets are greater. I have decided to implement the following policy for removable media: Richman Investments staff may only use Richman Investments’ removable media in their work computers. Richman Investments removable media may not be connected to or used in computers that are not owned or leased by the Richman Investments without explicit permission of the Richman Investments IT manager. Sensitive information should be stored on removable media only when required in the performance of your assigned duties or when providing information required by other state or federal agencies. When sensitive information is stored on removable media, it must be encrypted in accordance with the Richman Investments’ Acceptable Encryption Policy. Security assurance and user-friendly sites are required if Richman Investments is to be successful at attracting customers to their Internet sites. It is therefore important to be able to understand the business requirements and be able to translate these into a public network presence with security in mind. The Digital revolution of the 21st Century has not been achieved without its consequences. Real time business requirements and economic drivers have forced rapid changes to the methods used to conduct business-to-business and business to client communication. The Internet has now become a convenient and economic deployment medium for global business. For Richman Investments Computer User’s Policy, although employees are given PCs so they can deliver the task that they are assigned, it must be understood that these PCs are property of Richman Investments and must not be abused for personal use. Computer resources are expensive and so offensive material must not be…

    • 1444 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    In this Multi-Layered Security Plan, I will provide information on how to better improve the security of each domain and protect the data of Richman Investments. We shall secure all ports for incoming and outgoing traffic, only allowing the information that is needed through certain ports and to conduct business fast and efficiently. We will also be using the latest and most updated firewall protection and anti-virus software to add a better degree of security. This will be implemented throughout the entire company and we will inform all employees of this MLS plan.…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Assignment 4 Nt2580

    • 485 Words
    • 2 Pages

    3. Below are the following policies for details of protecting information when accessing the corporate network when referencing the remote access methods, and acceptable use of Richman Investment's network:…

    • 485 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    The Workstation Domain is also another domain infrastructure that has great reason to be affect by internal use only data because this is where the user connects to the our network. The reason that this can cause security threats and other problems is because this domain can be connected via a personal laptop or even a cell phone or other mobile device.…

    • 285 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The second domain is the workstation, which is a vital part to you internal use as it is your access to the network. With this we have our users at our workstations getting on the network via the NIC (Network Interface Card) to actually get into the LAN. To get into these workstations, there needs to be some type of security such as analog like Passwords and IDs or Biometrics like thumb prints or Swipe Cards.…

    • 387 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Unit 4 Assignment 2

    • 717 Words
    • 3 Pages

    The purpose of this policy is to define standards for connecting to Richman investment’s network from any host. These standards are designed to minimize the potential exposure to Richman investments from damages which may result from unauthorized use of Richman investments resources. Damages include the loss of sensitive or company confidential data, intellectual property, damage to public image, damage to critical Richman investments internal systems, etc.…

    • 717 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    NT2580 Project part 1

    • 606 Words
    • 3 Pages

    Safety of data and information is a real important aspect of a company. Before we can create an outline for general security solutions we must first define what is needed. I recommend that we use a multi-layered security plan. There are a total of seven domains of an IT infrastructure including user domain, workstation domain, LAN domain, LAN-to-WAN domain, WAN domain, remote access domain, and system/application domain.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 4 Assignment 1

    • 333 Words
    • 1 Page

    For the workstation domain, password policies should be in place in the event a user does not do what they should. The workstations should be set up to require a certain complexity of passwords, as well as an inactivity timeout and failed password lockout to prevent brute force attacks. Each workstation should also have regular OS patches in place, as well as an up-to-date antivirus and application based firewall. This can be accomplished by setting up the proper GPOs in Active Directory for enforcement across the entire domain.…

    • 333 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    The work station domain is the second layer in the infrastructure. This is also affected by the internal use only standard. In this layer the user can access the network and any applications or information on the system with proper credentials. This requires a user login and password set up or some other form of authentication such as CAC card. This is to be done before the person can access any information. This is a set up that can help stop people from getting information that there not supposed to have access to.…

    • 288 Words
    • 2 Pages
    Satisfactory Essays