Preview

Multi-Layered Security Plan Outline

Satisfactory Essays
Open Document
Open Document
447 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Multi-Layered Security Plan Outline
MULTI-LAYERED SECURITY PLAN OUTLINE
User Domain
Risk, Threat, or Vulnerability
Lack of user awareness
• Conduct security awareness training display security awareness posters, insert reminders in banner greetings, and send e-mail reminders to employees.
User apathy toward policies
• Conduct annual security awareness training, implement acceptable use policy, update staff manual and handbook, discuss dring performance reviews.
Workstation Domain
Risk, Threat, or Vulnerability
Unauthorized access to workstation
• Enable password protection on workstations for access. Enable auto screen lockout for inactive time.
Unauthorized access to systems, applications, and data
• Define strict access control policies, standards, procedures, and guidelines. Implement a second-level test to verify a user’s right to gain access.
LAN Domain
Risk, Threat or Vulnerability
Unauthorized access to LAN
• Make sure wiring closets, data centers, and computer rooms are secure. Do no allow anyone access without proper ID.
Unauthorized access to systems applications, and data
• Defines strict access control policies, standards, procedures, and guidelines. Implement second-level identity check to gain access to sensitive systems, applications, and data.
LAN-to-WAN Domain
Risk, Threat or Vulnerability
Unauthorized network probing and port scanning
• Disable ping, probing, and port scanning on all exterior IP devices within the LAN-to-WAN Domain. Ping uses the Internet Control Message Protocol
Unauthorized access through the LAN-to-WAN Domain
• Apply strict security monitoring controls for intruustion detection and prevention. Monitor for inbound IP traffic anomalies and malicious-intent traffic. Block traffic right away if malicious
Remote Access Domain
Risk, Threat or Vulnerability
Brute-force user ID and password attacks
• Establish user ID and password policies requiring periodic changes (i.e., every 30 or 60 days). Passwords must be

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Lock the servers into their own room with keycard or fingerprint access only. Only authorized IT staff shall have access. Management, vendors and all other authorized guest shall be escorted by an authorized IT staff member. Video surveillance should be maintained and monitored at all access…

    • 424 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    The following document outlines Richman Investments security measures for IT infrastructure. There are many components that make up the Richman Investments network, and so there should be a multi-layered security solution to protect it. The server room has been located in the central part of the building, and will be physically protected by electronic door locks with keypad combination access. There are a limited number of personnel who will have access to this room in order to decrease the potential for tampering. Each of these personnel will have their own access code, and a digital log will be kept of all access.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Finally, the system/application domain would require virtual testing of everything before any implementation, hardening of all servers, and keeping up with patches and updates regularly after testing has been completed. Some of the more efficient ways to implement better access controls in a company would start with the proper level of authorization policies including physical controls for facilities. The authorization policy would appropriate entry system access controls that specify what areas are to be locked at all times and what type of locking mechanism should be implemented. It would also include the implementation of secondary locks on specific equipment and storage cabinets…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IT255 Project 1

    • 663 Words
    • 2 Pages

    At Richman Investments the personnel is accountable for the appropriate use of IT assets. Therefore, it is in the best interest of the organization to ensure employees handle security procedures with integrity. It is essential to create a strong AUP (Acceptable Use Policy) procedure and as part of the process, require employees sign an agreement to guarantee they understand and conform to implemented rules and regulations. In addition, the company will conduct security awareness training, annual security exercises, notices about securing information, and constant reminders security is everyone’s responsibility.…

    • 663 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In the user domain, the weak link is the user. Simple passwords can be a major problem so you must use complex passwords with eight or more characters, upper and lower case, and special characters. Passwords will be changed monthly and the same password cannot be used within a twelve month period.…

    • 337 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    We will educate employees on how to properly secure information by user ID and password management training. Instructing them on how to…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Corporation Tech will face many security risks with their current network. The user domain is the single most vulnerable part of any network and as such poses the most obvious security risk. To mitigate risks involving the users is to implement policies and training to educate the user on proper use and security best practices. By educating the user on security practices such as secure passwords, safe web surfing, and securing their workstations, many potential attacks can be avoided. Policies and training are also necessary because they can be used as evidence when taking administrative action against a user or intruder in the event the system or data information is compromised.…

    • 612 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NT2580 Project part 1

    • 562 Words
    • 3 Pages

    i. With this security plan being implemented, you can monitor inbound IP traffic anomalies and prevent malicious-intent traffic that may try to intrude and harm your system.…

    • 562 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 33

    • 595 Words
    • 3 Pages

    If you use a computer at home the most efficient and important step to help your computer to protect by turning on your firewall.…

    • 595 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Week 8 Paper

    • 2205 Words
    • 6 Pages

    Limiting access control to NextGard’’s operating systems should be top priority. Attackers need a means to connect to a network to gain access to information, if their means to access the network it block then NextGard’s information and data is greater secured. Implementing a Access Control List is a set of specifies entries given to a trustee that tells an operating system which access rights each user has to a particular network system object such as a directory. The access control list is a secure measure used to limit the user’s ability to read, write, and make changes to files, and documents.…

    • 2205 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Ip Networking

    • 327 Words
    • 2 Pages

    The LAN domain includes all data closets and physical as well as logical elements of the LAN. This domain needs strong security, being that it is the entry and exit points to the wide area network, and makes private information easily accessible to anyone. Users will be screened and authorized by the IT department head and given a special access code. The biggest threat to the LAN domain is unauthorized access. This will be monitored closely to make sure all policies are being followed.…

    • 327 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Comply with statutory requirements, safety notices and warning notices displayed within the workplace and/or on equipment.…

    • 713 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Health and Safety

    • 263 Words
    • 2 Pages

    Employer/Manager: Planning safety and security. Providing information about safety and security. Updating systems and procedures.…

    • 263 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Internal Use Only

    • 373 Words
    • 2 Pages

    1. User Domain: This Domain is where only one user will have access to it. This can be configured to internal use only. By default, the IT department tries to maintain a certain level of Security for this, so that nobody can access from the outside, only the IT Department can grant access privilege for Remote Access Point. The User Domain will enforce an acceptable use policy (AUP) to define what each user can and cannot do with any company data that he or she has access to. Also, every user on the company is responsible for the security of the environment. Violation of the AUP can be grounds for immediate dismissal and/or legal actions.…

    • 373 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Make sure that I am aware of, and follow, my settings health, safety and security procedures before I start work.…

    • 356 Words
    • 2 Pages
    Good Essays