Preview

Remote Access Control Policy for Richmond Investments

Satisfactory Essays
Open Document
Open Document
302 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Remote Access Control Policy for Richmond Investments
Remote Access Control Policy for Richman Investments

Authorization- Richman Investments must define rules as to who has access to which computer and network resources. My suggestion is that RI implements either a group membership policy or an authority-level policy to achieve this. Group policy would allow the administrator to assign different privileges to different groups. The admin would then assign different individual users to those different groups. So the users permissions would depend on the permissions of the group they were a member of. With authority-level policy the admin would assign different permissions to individual users based on their position and authority level within the company and what access that position requires.

Identification- Richman Investments needs to assign a unique identifier to each user in order to have accurate records of who is accessing, or trying to access, what applications, which network resource, and what data. The most common ID is the username, account number, or PIN

Authentication- In order to keep the remote access to Richman Investments secure, there must be proof that the person trying to gain access to the network remotely is the same person who has been granted access by identification. To do this RI can choose one of the following knowledge type authentications: PIN, password, or passphrase along with one of the following ownership type of authentication: smart card, key, badge, or token. Using a combination of ownership authentication and knowledge authentication proves to offer better security.

Accountability- Richman Investments must hold users responsible for what they do on the system. Log files can be used to detect, prevent, or monitor access to the system. Due to all the different privacy laws, RI must also secure its data. This will involve how data is retained i.e storage, how media is disposed of, and following compliance requirements.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    lab 4

    • 451 Words
    • 2 Pages

    Internet use at Richman is only authorized to conduct Company business only. Internet use can easily allow hackers to see confidential Company information and allow viruses. This allows the hackers to get passwords and other important things. Which is why we want the staff at Richman’s to only use the internet for business only and business only sites. Employees can only check their business…

    • 451 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    The following document outlines Richman Investments security measures for IT infrastructure. There are many components that make up the Richman Investments network, and so there should be a multi-layered security solution to protect it. The server room has been located in the central part of the building, and will be physically protected by electronic door locks with keypad combination access. There are a limited number of personnel who will have access to this room in order to decrease the potential for tampering. Each of these personnel will have their own access code, and a digital log will be kept of all access.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    It244 R Appendix E

    • 650 Words
    • 3 Pages

    Describe the policies for securing the facilities and the policies of securing the information systems. Outline the controls needed for each category as relates to your selected scenario.…

    • 650 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Sr-Rm-022 Section 2

    • 930 Words
    • 4 Pages

    Use of Single-Sign-On (SSO) in conjunction with the enterprise Active Directory server will be the first step to securing the system. This will only allow those that have a defined HR role to access the system. Within the application multiple roles will also be defined. These roles will have different access levels and can be assigned to enterprise personnel active directory accounts as needed. (Active Directory Single Sign-on (SSO) and LDAP Integration: Okta.) Active directory implementation will allow segmentation of the HR system to only allow views into what is needed. For example allowing the HR Director access to all employee records across the company, but preventing the IT Director from viewing any personnel records but those that report to him. Active directory also is user friendly and only requires the users to remember a single network user name and password in order to access all applications across the enterprise. It also increases security, allows for better reporting, and centralized password support by a service desk. If this is not already an enterprise standard, it should be changed as quickly as…

    • 930 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    In the WAN domain, we need to have firewalls set up to filter all incoming traffic. A firewall will stop all traffic not wanted on the Richman Investments network.…

    • 337 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    IS3340-Unit 2-Assignment 2

    • 1549 Words
    • 6 Pages

    vi. Each user and workforce member must ensure that their assigned User Identification is appropriately protected and only used for legitimate access to networks, systems, or applications. If a user or workforce members believes their user identification has been comprised, they must report that security incident to the appropriate Security Officer…

    • 1549 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    In this Multi-Layered Security Plan, I will provide information on how to better improve the security of each domain and protect the data of Richman Investments. We shall secure all ports for incoming and outgoing traffic, only allowing the information that is needed through certain ports and to conduct business fast and efficiently. We will also be using the latest and most updated firewall protection and anti-virus software to add a better degree of security. This will be implemented throughout the entire company and we will inform all employees of this MLS plan.…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The Internal Use Only data classification standard of Richman Investments has many different infrastructures domains that are affected via internal use only data classification. More than all others, the three infrastructures that are affected the most are the User Domain, Workstation Domain and the LAN Domain.…

    • 285 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS3440 project part 1

    • 305 Words
    • 2 Pages

    Now for creating users and groups there will be no special permissions in order to “create” them but when it comes to the specific users and groups there will be. The Web Administrators will have their own permissions and groups, the Linux administrators will have their own users and group, and the Security Analyst will have their own groups. I think that there should be a group set up so that all departments can talk with each only to help each other and inform each other of certain things. The Security group I feel should have access to the maintenance group so that they can get regular updates and patches, and to the Web Admin group so they can apply the updates/patches. Web and Linux groups will not have access to the Security so that way no one can go in and change anything with security. The Web admin and Linux admin will have permissions for each other so they can make changes that are needed but they will only have certain permissions for that, for example, Linux will not be able to go in to Web Admin and change how the website looks and Web Admin can’t go in to Linux and change how things run.…

    • 305 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Unit 4 Assignment 2

    • 717 Words
    • 3 Pages

    1. It is the responsibility of Richman investments employees, contractors, vendors and agents with remote access privileges to Richman investments's corporate network to ensure that their remote access connection is given the same consideration as the user's on-site connection to Richman investments.…

    • 717 Words
    • 3 Pages
    Powerful Essays
  • Powerful Essays

    The specific purpose of this paper is to describe the authentication process and to describe how this and other information security considerations will affect the design and development process for new information systems.…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Access Control Policy

    • 833 Words
    • 3 Pages

    Describe how and why authentication credentials are used to identify and control access to files, screens, and systems. Include a discussion of the principles of authentication such as passwords, multifactor authentication, biometrics, and single-sign-on.…

    • 833 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Consistent standards for network access and authentication are critical to the company’s information security and are often required by regulations or third-party agreements. Any user accessing the company’s computer systems has the ability to affect the security of all users of the network. An appropriate Network Access and Authentication Policy reduces the risk of a security incident by requiring consistent application of authentication and access standards across the network.…

    • 1461 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Reifman believes that this security, along with the service's ability to let companies decide who should have access to what information, is crucial to corporate adoption of IM.…

    • 484 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    F UNCTION POINT ANALYSIS C ounting Function Points Reference Guide IFPUG CPM Version 4.2 this application; and is dependent upon the user’s external business view of the application. Boundary Rules: • The boundary is determined based on the user's point of view. The focus is on what the user can understand and describe. • The boundary between related applications is based on separate business functions as seen by the user, not on technological concerns.…

    • 4118 Words
    • 17 Pages
    Powerful Essays