Preview

NT2580 Project part 1

Good Essays
Open Document
Open Document
562 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
NT2580 Project part 1
Marcy Shelton
NT 2580, Guzman
Project Part 1, Multi-Layered Security Plan:
Muliti-Layered Security Plan
1. USER DOMAIN:
A. User awareness/policies.
i. By conducting security awareness training, you can educate the user/employee on the policies and standards. Also make the user/employee aware of the violation consequences if the said policies and standards are broken. To further implement this security awareness plan, follow up by sending out reminder/updates in a bi-weekly email and flyer handout.
B. Restrict user access.
i. By restricting user access, only allowing the user/employees enough access to successfully do and complete their job/tasks; you can prevent user destruction.
2. WORKSTATION:
A. Enable password protection and system lockout.
i. By enabling password protection on all workstations and implementing a three try timeout/lockout on an un-successful entered password, you can protect your company from unauthorized users trying to gain access by password hacking.
B. Protect all CD, DVD’s, and USB ports.
i. Deactivate all CD, DVD, and USB ports; then enable an automatic antivirus scan for the CD’s, DVD’s, and USB ports to prevent any harmful, or malicious files that may be on the drives.
3. LAN:
A. Define strict access control policies, standards, procedures, and guidelines.
i. By implementing a second level identity check to gain access to sensitive systems, applications, and data; you can protect from unauthorized access to the systems, applications, and data.
B. Implement encryption between workstations and WAP to maintain confidentiality.
i. By implementing the encryption between workstations and WAP you can protect the confidentiality of data transmissions.
4. LAN-WAN:
A. Apply strict security monitoring controls for intrusion detection and prevention.
i. With this security plan being implemented, you can monitor inbound IP traffic anomalies and prevent malicious-intent traffic that may try to intrude and harm your system.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    As The Organization

    • 338 Words
    • 2 Pages

    Proper management of user accounts will ensure the information and access to devices on the network confidential.…

    • 338 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    IS3110 Quiz 6 2015

    • 600 Words
    • 2 Pages

    These are related to malware and Viruses. Users can bring malware from home on Universal Serial Bus (USB) flash disks. They can accidentally download malware from Web sites. They can also install malware from malicious e-mails. The primary protection is to ensure that you install antivirus (AV) software. Additionally, you need to update AV signatures regularly. You can’t depend on the users to keep their signatures up to date. Instead, you must take control of the process. Many AV…

    • 600 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Nt2580 Project 1

    • 492 Words
    • 2 Pages

    When you create a multi-layered security plan, you must look at all of the domains of the IT infrastructure. Once you look at the security of each you must then increase the security on each of those seven domains. A security increase will help the overall security of the system and create a multi-layered security plan.…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Hollis IS3230 Unit 3 Lab3

    • 766 Words
    • 4 Pages

    2. Describe one way to help prevent unauthorized users from logging onto another person’s user account and accessing his/her data.…

    • 766 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Bat1 Task 1

    • 1280 Words
    • 6 Pages

    IT staff can diminish security breaches by developing effective ways to teach clinical staff about securing their workstations when not in use. Mandatory in-service and power point presentations would be an effective way to do this. The importance of workstation security, not accessing another employee's computer while in use and not using another employee's password should be discussed. Along with how doing so would be in violation of company policy and the HIPAA Privacy Act. Disciplinary action should also be discussed.…

    • 1280 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    2. Provide continuous intrusion detection and surveillance at the restricted area boundary and actual resource. Use posted sentries when IDS is not installed or not operational.…

    • 19110 Words
    • 62 Pages
    Powerful Essays
  • Powerful Essays

    Ljb Annual Report Sample

    • 1189 Words
    • 5 Pages

    Employees being hired should go through a background check and drug testing to verify that any issues have been addressed and resolved. While this will ensure a higher quality of individuals, an internal control to password protect each individual user will hold accountability for computing activities.…

    • 1189 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Workplace Violence

    • 1113 Words
    • 5 Pages

    * Secure the workplace. Where appropriate to the business, install video surveillance, extra lighting, and alarm systems and minimize access by outsiders through identification badges, electronic keys, and guards.…

    • 1113 Words
    • 5 Pages
    Good Essays
  • Good Essays

    The importance of this is to keep sensitive information for getting out to the world. There is a lot of hacker software that can penetrate a company’s network and get into the database that contains sensitive material. The one thing to prevent any of this from happening is to get a good network security system that can pretty much block off any intrusion to the firewall. But it is everyone’s job to prevent their passwords from getting out. Don’t write down your password anywhere that can be visible for anyone to see. Plus when you come up with a password make sure it something that it is not easy to crack. There are many network systems that require you to use certain number of characters to prevent passwords from being compromised. These are just some of the ways that you can prevent unauthorized access to passwords and the benefits of having a secure network system.…

    • 1251 Words
    • 6 Pages
    Good Essays
  • Good Essays

    * All the changes being done in the system of the organization can be traced out as the person who is using the system will have to login with the given user credentials, henceforth it protects the sensitive…

    • 665 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    People will always be tempted to go onto the network and to browse the web on their own. Employees can dowload music or videos and possibly games which hand affect the security contols sometimes when those who don’t have authorized access to the network, they will continuously try to attempt to connect. Its best to notify anyone who is authorized on the network to know that there is an unauthorized attempt to log in. there are created policies that are made just to inform employees of risk managing and prevention. Notify are very important to the workstation. All employees must be able to know when there is authentication failure. Viewing log files can show all the security events which allow an administrator to check into it and find he root causes.…

    • 564 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Why do we need a Security Policy? This is without a doubt the first measure that must be taken to reduce the risk of the unacceptable use of any of our information resources. A security policy is the first step towards enhancing our security. We need security so that we can inform staff on the various aspects of their responsibilities, inform staff on the general use of company resources, explain to staff how sensitive information and large quantities of money should be handled, and inform staff of the meaning of acceptable use. The development of the security policy is highly beneficial to us as it will turn all staff members into participants in the…

    • 676 Words
    • 2 Pages
    Good Essays
  • Good Essays

    As mentioned in our text, there are two ways to address security issues. First, the technical approach in which computer software and monitoring is used to monitor and control websites being visited or information being copied. Second, the communication methods and partnership and control by the Human Resources department. Because not all possible risks could be addressed by the use of technology there is also a great need to control the flow of information and proprietary technology by implementing policy. A bank for example could implement a security access policy following a “need to know” plan where only if necessary an employee could have access to data or information. The bank could also create an expectation of zero privacy where all files or devices on a company network whether owned or provided by the employee are subject to scanning or monitoring, and finally the automatic acceptance that devices such as peripheral blockers may be in place in order to avoid data extraction or movement. In regards to a new employee versus an employee who has given notice, a new employee could have restricted access that is only opened slowly as they acquire responsibilities and an employee leaving the firm depending on his level of access, the firm may opt to take his termination effective immediately.…

    • 592 Words
    • 3 Pages
    Good Essays
  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    Conducting annual security training for the user in the user domain will cover the Acceptable Use Policy (AUP). Informing the users will be of what is acceptable and unacceptable use of the system. This layer also needs constant monitoring.…

    • 634 Words
    • 3 Pages
    Better Essays
  • Good Essays

    IS3220 Assignment 3

    • 980 Words
    • 4 Pages

    In the interest of business continuity, remote access will be utilized. User wishing access to internal network assets will only be able to access said assets with the use of a company issued laptop. We will make use of MAC address filtering to allow remote users access to the internal network via VPN. Each of the remote access laptops will have been loaded with VPN and have the MAC address added to the list on the MAC address filter. Users will be able to login to the VPN by using their local username and password. By making use of a VPN connection, users should be able to easily access the network assets. VPN connections are protected by SSL encryption which provides communication security over the internet. Each of the remote access laptops will be encrypted with McAfee safeboot encryption and all local data will remain encrypted until a valid login is entered. McAfee safeboot encryption requires additional login information to access the IDI internal network.…

    • 980 Words
    • 4 Pages
    Good Essays