Project 1: Multi-Layered Security Plan

Satisfactory Essays
Classification Description: (MLS) Multi-Layered Security

Introduction

Protecting sensitive or confidential data is paramount in many businesses. In the event such information is made public, businesses may face legal or financial ramifications. At the very least, they will suffer a loss of customer trust. In most cases, however, they can recover from these financial and other losses with appropriate investment or compensation

Having information of different security levels on the same computer systems poses a real threat. It is not a straight-forward matter to isolate different information security levels, even though different users log in using different accounts, with different permissions and different access controls (Red Hat, Inc. 2006).

Below I have listed the IT infrastructure of Richman Investments along with recommendations in each infrastructure on levels of security that should be implemented for a more secure network.

IT Infrastructure Affected

1. User Domain: The people who access an organization’s information system.

* The first thing that should be implemented is a mandatory Computer Security training session to educate the users on the proper use of work computers.

2. Workstation Domain: Users (most) connecting to the IT infrastructure.

* The workstation domain comes with its own problems such as unauthorized access to the system, the way to fix this problem would be to implement access policies and guidelines.

3. LAN Domain: A collection of computers connected to one another or to a common connection medium.

* Implement second or third level identity check to gain access to sensitive systems, applications, and date. Keep all hardware in a secure location with access only with proper ID.

4. LAN-to-WAN Domain: Link between the Wide Area Network (WAN) and the Internet.

* Conduct post configuration penetration tests of the layered security solution within the LAN-to-WAN Domain. Test



References: 1. Red Hat, Inc. (2006). Red Hat Enterprise Linux Deployment Guide: Multi-Layered Security. Retrieved from http://www.centos.org/docs/5/html/Deployment_Guide-en-US/sec-mls-ov.html <July 8, 2013> 2. Kim D. & Solomon G. M., (2012). Fundamentals of Information Systems Security: The Seven Domains of a Typical IT Infrastructure (1st ed.), 15-33. Burlington, MA.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt2580 Project 1 Multi Layered Security Plan NT2580 Project Part 1: Multi-Layered Security Plan When developing a multi-layered security plan, you must look at each of the seven domains of the IT infrastructure and increase security on each of those domains. Increasing the security on each of those seven domains will increase the overall security of the system and create a multi-layered security plan. In the user domain, one of the easiest ways for the system to be compromised is through the…

    • 512 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Multi Layered Security Plan Richman Investments 1) General This MLS plan will give a brief overview of the security strategies that will be implemented at each level of the IT infrastructure. In this Multi Layered Security Plan we will describe how we will improve the security of each domain and how to protect our information. We will update all firewalls on the infrastructure and secure our ports that are open and stop incoming traffic that is malicious. All anti-virus software will be updated…

    • 506 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Project Part 1 Multi Layered Security Plan Richman Investments 1) General This MLS plan will give a brief overview of the security strategies that will be implemented at each level of the IT infrastructure. 2) User Domain a. The usage of security awareness training to instruct employees of Richman Investments security policies b. Auditing of user activity 3) Workstation Domain a. The usage of antivirus and antimalware programs on each user computer b. Strict access…

    • 299 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Smurfett 7/12/13 Multi-Layered Security Plan When developing a multi-layered security plan, you must look at each of the seven domains of the IT infrastructure and increase security on each of those domains. The seven domains are user domain, workstation domain, LAN domain, LAN to WAN domain, WAN domain, and remote access domain. Increasing the security on each of those seven domains will increase the overall security of the system and create a multi-layered security plan. In the user domain…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    refer to opportunity cost as true downtime cost. It usually measures the loss of productivity experienced by an organization due to downtime. One of the most important things that information security professionals try to protect is their organization’s reputation and brand image. Companies that suffer from security breaches and malicious attacks that expose any assets are likely to face serious negative consequences in the public eye. In the popular usage and in the media, the term hacker often describes…

    • 1126 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Edward Jones NT2580 Project When creating a multi-layered security plan, I would look at all seven domains of the IT infrastructure and then increase the security on each of those domains because that will increase the security for the whole plan. In the user domain, this is the quickest way for the system to be compromised the users. So I would implement complex passwords including eight or more characters, both upper and lower case, and use of at least one special character. Passwords will…

    • 449 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Project Part 1: Multi-Layered Security Plan Upgrade- Establish endpoint security updates (Antivirus, Malware protection). Upgrade all desktop and laptop Operating Systems. Once all systems are running on the same system, it will be easier to set up security protocols across the board. Make sure Patch updates are being made regularly, set up a specified time frame to check for and install new patches and updates. Virtualize the Browser- Give user machines a virtualized instance of a pre-configured…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Multi-Layered Security

    • 350 Words
    • 2 Pages

    Project part 1 When developing a multi-layered security plan you need to look at all seven domains of a typical IT infrastructure and check if they need to be increases.one of the weakest link in IT infrastructure In the user domain, one of the easiest ways for the system to be compromised is through the users. Simplicity of user’s passwords can be a major problem so we need to implement complex passwords including eight or more characters, both upper and lower case, and use of at least one special…

    • 350 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    In this Multi-Layered Security Plan, I will provide information on how to better improve the security of each domain and protect the data of Richman Investments. We shall secure all ports for incoming and outgoing traffic, only allowing the information that is needed through certain ports and to conduct business fast and efficiently. We will also be using the latest and most updated firewall protection and anti-virus software to add a better degree of security. This will be implemented throughout…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    MULTI-LAYERED SECURITY PLAN OUTLINE User Domain Risk, Threat, or Vulnerability Lack of user awareness • Conduct security awareness training display security awareness posters, insert reminders in banner greetings, and send e-mail reminders to employees. User apathy toward policies • Conduct annual security awareness training, implement acceptable use policy, update staff manual and handbook, discuss dring performance reviews. Workstation Domain Risk, Threat, or Vulnerability Unauthorized…

    • 447 Words
    • 2 Pages
    Satisfactory Essays