Preview

Jamel McBean s NET 240 Chp 8 Design Scenario

Good Essays
Open Document
Open Document
460 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Jamel McBean s NET 240 Chp 8 Design Scenario
Jamel McBean Consulting LLC.

Client: ElectroMyCycle
Date: 6/19/15
Project: Net 240 Design Scenario Chapter 8

1. What are ElectroMyCycle’s most important assets that must be protected with security mechanisms? Servers
Routers
Switches
PC’s/Workstations
The Physical Building

2. What are the biggest security risks that ElectroMyCycle faces?
The biggest risks are from tech savvy vendors and customers applying a DOS attack amongst other types of attacks and internal non – compliance. VPN’s also can pose a viable threat if infiltrated. Wireless network, server farms, etc.

3. Design a high-level security policy for ElectroMyCycle.

Purpose: This document describes a required minimal security configuration for all routers and switches connecting to a production network or used in a production capacity at or on behalf of ElectroMyCycle
Scope: All employees, contractors, consultants, temporary and other workers at Cisco and its subsidiaries must adhere to this policy. All routers and switches connected to ElectroMyCycle production networks are affected.
Policy:
The enable password on the router or switch must be kept in a secure encrypted form. The router or switch must have the enable password set to the current production router/switch password from the device’s support organization.
The following services or features must be disabled:
TCP small services
UDP small services
All source routing and switching
All web services running on router
Cisco discovery protocol on Internet connected interfaces
Telnet, FTP, and HTTP services
Auto-configuration
The following services must be configured:
NTP configured to a corporate standard source
Password-encryption

All routing updates shall be done using secure routing updates.
Access control lists must be used to limit the source and type of traffic that can terminate on the device itself.
Access control lists for transiting the device are to be added as business needs arise.
Each router must have the following statement

You May Also Find These Documents Helpful

  • Satisfactory Essays

    APM Jakub Orlando and Kristin Catucci, reached out the DM Joe Losos about the violation of the company policy. APM Kristin Catucci advised DM Joe Losos to contact ER, regarding proper disciplinary action that should be taken. DM joe Losos reached out to AMP Jakub Orlando and Kristin Catucci, stating that, ER representative Amanda Prich, recommended the disciplinary action to be a final write up. DM Joe Losos issued the final written warning on March 17th,…

    • 246 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    IT255 Project 1

    • 663 Words
    • 2 Pages

    A priority to the LAN domain is proper security of physical equipment. Only authorized personnel are allowed to gain access into...…

    • 663 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Step4 – After successful login you can easily change the settings of the router using the web interface.…

    • 570 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    2. Another SMTP Server security threat is denial-of-service also known as DoS. This attack will shut off access to your site. The attacker will increase traffic on your site. The increased traffic will cause your site to become unresponsive and shut down. (Hampton, 2011)…

    • 487 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Identify risks that could lead to an information security breach, Identify vulnerabilities in system security, software operation, network design or employee procedures that could lead to a network failure.…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    It 244 Appendix B

    • 3468 Words
    • 14 Pages

    Due in Week Nine: Write 3 to 4 paragraphs giving a bottom-line summary of the specific measureable goals and objectives of the security plan, which can be implemented to define optimal security architecture for the selected business scenario.…

    • 3468 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    Unit 3 assignment 1

    • 479 Words
    • 2 Pages

    This policy applies to all Richman Investments employees, contractors, vendors and agents with a Richman Investments owned or personally-owned computer or workstation used to connect to the Richman Investments network. This policy applies to remote access connections used to do work on behalf of Richman Investments including reading or sending email and viewing intranet web resources and wireless devices.…

    • 479 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    IT-241 Appendix G

    • 369 Words
    • 2 Pages

    Only allows access to a device if its MAC address matches that of a pre-approved list on the router.…

    • 369 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The very first thing you should need to do with your connection is to change the password and it was quite easy as you just need to login the router settings page and change the password that is impossible…

    • 367 Words
    • 2 Pages
    Good Essays
  • Good Essays

    lab 5

    • 718 Words
    • 3 Pages

    Secured VLAN deployment for devices that meet this standard and cannot meet more intelligent solutions such as security posture assessment.…

    • 718 Words
    • 3 Pages
    Good Essays
  • Better Essays

    The problem comes in finding and fixing these problems. Depending on how big or small the weakness is determines how detrimental the risk is. After reviewing the infrastructure of Aircraft Solutions, I was able to determine that there were a few things that would put their system in a vulnerable state and potentially put their system at risk. The two areas where they are most vulnerable are the hardware and the policy. The first vulnerable area is the hardware of the firewalls that are not being used appropriately to protect the network against breaches in the networks architecture and hierarchy. Without the firewall in place it exposes the network (LAN) to any malicious internal as well as external attacks. These attacks can lead to the compromising of any of the company’s data.…

    • 870 Words
    • 4 Pages
    Better Essays
  • Good Essays

    | Describe ways to protect hardware, software and data and minimise security riskThere are steps to prevent threats to system and information: access to information sources should be allowed with Username and password/PIN selection. The system set up on password strength; how and when to change passwords (monthly); online identity/profile; Real name, pseudonym; what personal information to include, who can see the information; Respect confidentiality, avoid inappropriate disclosure of…

    • 793 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Ing Life

    • 572 Words
    • 3 Pages

    Securing Internet connection a variety of overlapping security mechanisms will be equipped to guarantee the security of the Internet connection. Common mechanisms include: firewalls, packet filters, physical security, audit logs, authentication and authorization. At the same time, technicians also need to implement packet filters to prevent the Internet routers from the DoS attacks. DoS attacks…

    • 572 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The scope of this policy includes all users who have access to company-owned or company-provided computers or require access to the corporate network and/or systems. This policy applies not only to employees, but also to guests, contractors, and anyone requiring access to the corporate network. Public accesses to the company’s externally-reachable systems, such as its corporate website or public web applications, are specifically excluded from this policy.…

    • 1461 Words
    • 6 Pages
    Good Essays
  • Good Essays

    This was done as part of the ADSL Router and Cisco configuration Controller. The composition contained in the composition of ADSL factors. DHCP is created in the ADSL Router at the same time we will stop using DHCP server that is part of Windows Server 2008. The operating systems for the security of wireless networks are configured using WPA2 / WPA Mixed type. MAC made pass through a filter to allow only certain devices to connect to the Internet through various wireless networks white list their own MAC addresses. ADSL Router has also integrated firewall protection. This is configured with the default selections. It has an access point also some parental controls to prevent some of the sites. It is configured…

    • 914 Words
    • 4 Pages
    Good Essays