Preview

It255 Project Part 1

Better Essays
Open Document
Open Document
634 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
It255 Project Part 1
IT255 Project Part 1

Richman Investments Security Plan Outline
User Domain:
• Restrict access to data and applications to the required users and groups.
• Review and Revise user conduct and security polices every six months.
• Conduct annual security training seminars with system users and staff.
• Track and monitor employee behaviors.
Conducting annual security training for the user in the user domain will cover the Acceptable Use Policy (AUP). Informing the users will be of what is acceptable and unacceptable use of the system. This layer also needs constant monitoring.
Workstation Domain:
• In house testing of operating system updates prior to user workstation deployment.
• Strict access control policies and procedures for user access to system and data.
• 72 Day password renewal for workstation and 180 day user password renewal.
• Content filtering and anti-virus scanning of all incoming data. Quarantine of unknown file types.
Securing a user workstation with approved updates will help prevent potential system corruption and in house data from being exposed. This domain is also vulnerable and also needs constant monitoring.
LAN Domain:
• Proper identification and two key turners to be granted access to Data Centers and wiring closets with 24/7 CCTV monitoring.
• Periodic LAN vulnerability assessments.
• Define strong access control policies.
Keeping our LAN under lock and key prevent tampering of with the networks hardware. Access to the LAN devices is the easiest way to compromise a network. By also applying strict monitoring controls and current security updates are excellent security measures to implement.
LAN to WAN Domain:
• Disable ping, probing, and port scanning of exterior devices.
• Strict monitoring for intrusion detection on inbound IP traffic.
• Apply file monitoring and scanning of traffic from unknown sources.
Monitoring traffic will help for see intrusions into the network. Any traffic that is out of the ordinary will



References: David Kim., and Michael G. Solomon. Fundamentals of Information Systems Security , 2012: Sudbury, MA 2012 Pyle, N. (2009, September 01). Designing and implementing a pki: Part i design and planning. Retrieved from Symantec. (2008, August 28). How to: Set up multi-layered security. Retrieved from http://www.pcworld.com/article/141361/article.html

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Defining policies for every domain of an IT infrastructure breaks down in depth how each entity should be properly used. The policies should also identify the key players that will play a key role in ensuring optimum use of all devices, as well as establishing and maintaining security throughout the process of information traveling through the Infrastructure. Here are some best practices to keep in mind when defining policies for a few of the domains within the infrastructure:…

    • 545 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It255 Assignment 8

    • 309 Words
    • 2 Pages

    The Internet is vulnerable to myriads kinds of attacks, due to vulnerabilities in the TCP-IP protocol, and no global flow control mechanisms. The two problems lead to many TCP exploits and the horrible DDoS attacks. We have devised a method of incrementally upgrading the network infrastructure at the transport level that solves the above problems and makes the network significantly more resilient to attacks, particularly the DDoS attack. The approach uses "hardened routers", routers that can do simple cryptographic functions (encryption, signatures) on all packets flowing in the network, as well as to participate in a hierarchical control network.…

    • 309 Words
    • 2 Pages
    Good Essays
  • Good Essays

    We can start with the Application layer. The Application layer provides the interface to the user. First the end user should be subjected to a background check to ensure against any potential malicious or questionable acts in the users past. Then the end user should be properly trained in the use of the computer and the proper protocols to access the network. Updates should be made frequently to keep the user up to date. When the user is in the network, make sure that any unnecessary devices, USB ports and any back doors are disabled. You also want to make sure that all files and emails and downloadable attachments are all thoroughly scanned prior to downloading. Finally, be sure to ensure content filtering, and restrict the end user to only what pertains to their primary function.…

    • 1508 Words
    • 7 Pages
    Good Essays
  • Good Essays

    practitioner to set and enforce key security policies at the Active Directory Forrest, Domain, and…

    • 3838 Words
    • 17 Pages
    Good Essays
  • Satisfactory Essays

    Information Technology

    • 760 Words
    • 4 Pages

    ____ presents a comprehensive information security model and has become a widely accepted evaluation standard for the security of information systems.…

    • 760 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lock the servers into their own room with keycard or fingerprint access only. Only authorized IT staff shall have access. Management, vendors and all other authorized guest shall be escorted by an authorized IT staff member. Video surveillance should be maintained and monitored at all access…

    • 424 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Jutta Joachim and Andrea Schneiker Security Dialogue 2012 43: 495 DOI: 10.1177/0967010612463488 The online version of this article can be found at: http://sdi.sagepub.com/content/43/6/495…

    • 10783 Words
    • 44 Pages
    Powerful Essays
  • Powerful Essays

    Cyber Warfare/Motivations

    • 1841 Words
    • 8 Pages

    Krutz, Ronald L.; Russell Dean Vines (2003). The Information Security Systems Prep Guide (Gold Edition ed.). Indianapolis, IN: Wiley.…

    • 1841 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Term Paper Sec 402

    • 1192 Words
    • 5 Pages

    One of the key roles and equipment that needs to be monitors is our servers that monitor our security software on it. This would detail a 24 hours monitoring.…

    • 1192 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Network Perimeter: Network perimeter is defined as the boundary between a privately-owned network, and the public network. The idea between network perimeters is that the assets of a network and the hardware and any other element of the network can be monitored and controlled from outside the organization. The concept of this trend was vital because it was quite necessary to defend the internal assets of the organization. There are numerous systems that organizations are trying to implement to help with this new trend. The belief of the organization is that there is a possibility of ensuring that the assets within the network are managed in such a way that it eliminates all the possible threats. The latest trend in setting up network perimeter is adopting of remote access.…

    • 366 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Security

    • 1340 Words
    • 6 Pages

    References: University of Phoenix. (2011). Introduction to Security. Retrieved from University of Phoenix, SEC360 website.…

    • 1340 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Bloom Design Group’s

    • 2994 Words
    • 12 Pages

    References: Merkow, M., & Breithaupt, J. (2006). Information security: Principles and practices. Upper Saddle River, NJ: Pearson/Prentice Hall.…

    • 2994 Words
    • 12 Pages
    Better Essays
  • Best Essays

    The issue-specific security policy was the main focus for this research paper. An analysis of the policy itself was conducted and also a set of guidelines were developed that comply with this policy. The components of the policy and how organisations would use them were looked into.…

    • 3522 Words
    • 15 Pages
    Best Essays
  • Powerful Essays

    [6] Pfleeger, Charles P., and Shari Lawrence. Pfleeger. Security in Computing. Fourth ed. Upper Saddle River, NJ: Prentice Hall, 2007. Print.…

    • 5810 Words
    • 24 Pages
    Powerful Essays
  • Good Essays

    Internet Disadvantages

    • 1255 Words
    • 6 Pages

    The main reason that people watch the news, and look through various sources of information is to make sure that their homes are safe from possible nuisances in the neighborhood or from severe weather. When working with a network, a series of computers tied together, there are new and dangerous hazards that can go unnoticed. Viruses and security breaches by hackers are a few of the hazards that they may encounter.…

    • 1255 Words
    • 6 Pages
    Good Essays