...1. Executive Summary 2 2. Introduction 3 2.1 Company Overview 3 2.2 Security Policy Overview 4 2.3 Security policy goals 4 2.3.1 Confidentiality 4 2.3.2 Integrity 5 2.3.3 Availability 5 3. Disaster Recovery Plan 6 3.1 Risk Assessment 6 3.1.1Critical Business Processes 7 3.1.2 Internal, external, and environmental risks 7 3.2 Disaster Recovery Strategy 8 3.3 Disaster Recovery Test Plan 8 3.3.1 Walk-throughs 8 3.3.2 Simulations 9 3.3.3 Checklists 9 3.3.4 Parallel testing 9 3.3.5 Full interruption 9 4. Physical Security Policy 10 4.1 Security of the building facilities 10 4.1.1Physical entry control 10 4.1.2 Security offices, rooms and facilities 11 4.13.Isolated delivery and loading areas 12 4.2 Security of the information systems 12 4.2.1Workplace protections 12 4.2.2Unused ports and cabling 13 4.2.3 Network/server equipment 13 4.2.4 Equipment maintenance 13 4.2.5 Security of laptops/roaming equipment 13 5. References 14 Executive Summary The objective of this proposal is to present the information security policy created for Bloom Design Group. The issue of a company’s network security continues to be crucial because the results of data loss or significant system failure can be disastrous for a company. An alarming number of companies fail to realize how vulnerable their network is to internal, external, and environmental risks. One of the top priorities of an organization should be maintaining...
Words: 3568 - Pages: 15
...organizations have found ways to grow and remain profitable, by creating a good mixture of e-commerce and IT. E-commerce can cover a range of areas, but focus mainly on internet sales and product marketing; while IT teams can handle any and all aspects of the organizations network. Security is becoming more important to organizations, as various attacks are on a rise. Natural disasters, malicious attacks, internal breach, and loss of team members, are all good cause to maintain strong security monitoring systems. The paper that follows will address security monitoring systems that should be conducted in the Cellular Phone Organization (CPO) with both Internal IT and e-commerce applications. Network Security Systems Organizations must have a secure network, in order to stay in business. There are many types of variations of ways to secure the network of an organization, and each must cater the type of business. The internal network is comprised of all servers, applications, data, and equipment used within the organization. The security of the internal network must consist of a mixture of both hardware and software. The Cellular Phone Organization employs 150 associates in an appropriate sized building. There are three teams: Customer Care; Tech Support: and Sales. There is also a Human Resources Team and Management team, for perspective departments. The company works primarily through a LAN/WAN set up, and work is performed primarily over the web. CPO must keep personal information...
Words: 1127 - Pages: 5
...Design a Layered Security Strategy for an IP Network Infrastructure Lab Assessment Questions & Answers 1. Explain why a layered security strategy helps mitigate risk and threats both external and internal. Multiple layers can be used to secure internal threats like keeping employees from accessing inappropriate material, update and patch workstations and run current anti-virus/malware on workstations daily. The layers also help mitigate external threats like hackers by using firewalls and shutting traffic out of the internal network. 2. Why is it a good idea to put shared servers and services on a DMZ when both internal and external users need access? When you have a DMZ there are two firewalls to protect the internal network from external threats. The necessary servers can be placed between the two in order to allow access from either side through strict firewalls while still allowing very little external traffic into the internal zone. The outermost firewall can allow a certain set of traffic to come in and access the servers. The inner most firewall blocks access into the intranet while allowing internal users to access the information on the servers. 3. What recommendations do you have for the future e-commerce server and deployment in regards to physical location and back-end security for privacy data and credit card data? I would place the e-commerce server in the DMZ with the private and credit card data stored inside the internal network. The commerce...
Words: 475 - Pages: 2
...Individual Assignment: Security Monitoring Activities CMGT/442 Introduction Information Technology (IT) and E-commerce have been on a constant up-rise, over the past couple of decades. Many organizations have found ways to grow and remain profitable, by creating a good mixture of e-commerce and IT. E-commerce can cover a range of areas, but focus mainly on internet sales and product marketing; while IT teams can handle any and all aspects of the organizations network. Security is becoming more important to organizations, as various attacks are on a rise. Natural disasters, malicious attacks, internal breach, and loss of team members, are all good cause to maintain strong security monitoring systems. The paper that follows will address security monitoring systems that should be conducted in the Cellular Phone Organization (CPO) with both Internal IT and e-commerce applications. Network Security Systems Organizations must have a secure network, in order to stay in business. There are many types of variations of ways to secure the network of an organization, and each must cater the type of business. The internal network is comprised of all servers, applications, data, and equipment used within the organization. The security of the internal network must consist of a mixture of both hardware and software. The Cellular Phone Organization employs 150 associates in an appropriate sized building. There are three teams: Customer Care; Tech Support: and Sales. There is also a Human...
Words: 1199 - Pages: 5
...Design a Layered Security Strategy for an IP Network Infrastructure NaTasha Scott Dr. Danielle Babb CIS 534 Advanced Network Security Design March 6, 2014 1. Block diagram design of a layered security solution 2. A written function overview of your design Lab Assessment Questions and Answers for Lab 8 1. Explain why a layered security strategy helps mitigate risk and threats both external and internal. Multiple layers can be used to secure internal threats like keeping employees from accessing inappropriate material, update and patch workstations and run current anti-virus/malware on workstations daily. The layers also help mitigate external threats like hackers by using firewalls and shutting traffic out of the internal network. 2. Why is it a good idea to put shared servers and services on a DMZ when both internal and external users need access? When you have a DMZ there are two firewalls to protect the internal network from external threats. The necessary servers can be placed between the two in order to allow access from either side through strict firewalls while still allowing very little external traffic into the internal zone. The outermost firewall can allow a certain set of traffic to come in and access the servers. The inner most firewall blocks access into the intranet while allowing internal users to access the information on the servers. 3. What recommendations do you have for the future e-commerce server and deployment in regard to physical...
Words: 779 - Pages: 4
...network they will use and what kind network devices it will need. Each internal and external networking component will you give information on what needs to be connected from inside and outside from your computer. Security must be carefully handle firewalls and vpns must be secured for your network to be secured from hackers and that your data protectect from any kind attack. When it comes choosing which network you will need, local area network (LAN) is office environment network. LAN network consists sharing resources, for your company files and printers. Usually LAN network not expensive and can be build with not expensive components.LAN network has big adavantage to hold thousands users with wired connection which can also include wireless connection for users who travel and need wireless connection. The internal and external networking components are important, so company computers can work properly on the network. Internal components can include Intel wireless LAN card which gives you ability getting connected to network wirelessly and PCI Ethernet card gives you ability getting to internet through network cable. External components comes with hubs which are network devices that communicated devices that on the network. Bridges are networking devices that connect networks. Sometimes it is necessary to divide networks into subnets to reduce the amount of traffic on each larger subnet or for security reasons. Routers has been used at any companies for networking from small...
Words: 1618 - Pages: 7
... | |Internal Control Evaluation | |LJB Company | | | To whom to be submitted: Prof. Kim Chung By whom to be submitted: Md.Tanvir Apon Submission Date: 02/09/2014 Table of Contents |S/L. |Description |Page No. | |1. |Preface |3 | |2. |LGB Company: Internal Control Evaluation |4-6 | |3. |References |7 | Preface This appraisal is being offered to the president of the LJB Company as a recommendations for the modifications of IPO planning and internal control of this company since they are intended to go public...
Words: 823 - Pages: 4
...SECURITY SECTOR REFORM Before I proceed, please allow me to give a sincere opinion on Lt Gen Gaudencio S. Pangilinan AFP (Ret) regarding his lecture on Security Sector Reform. These are what I think that makes Gen Pangilinan a good lecturer/speaker. He is a subject matter expert, knows the subject well, and can expand beyond basic concepts readily found in books. He communicates well and is very dedicated in what he is doing. Nothing new about Security Sector Reform (SSR) as we all know that SSR is a concept that was first developed in the 1990s in Eastern Europe. Since it has no fixed definition and no single model of a security sector exists, SSR generally refers to a process to reform or rebuild a state's security sector. In my opinion, the best definition for SSR is from the United Nations’ point of view. UN considers that security sectors usually include structures, institutions and personnel responsible for the management, provision and oversight of security. These would include defense, law enforcement, corrections, intelligence services and institutions responsible for border management, customs and civil emergencies. In some cases, elements of the judicial sector responsible for cases of alleged criminal conduct and misuse of force are included. The security sector should also include management and oversight bodies and, in some instances, may involve informal or traditional security providers. From my point of view, for the past 20 years and the many...
Words: 665 - Pages: 3
...Associate Level Material Appendix D The Three Models of Physical Security Directions: Read and study the description of an office building’s physical layout and its current security features in Part I. Then, answer the questions in Part II. Part I: Office Building Description A six foot fence secures the outer perimeter. Video surveillance is active on the north fence and inactive on the south. A manned guard station permits entrance into the outer perimeter from the west; an unmanned and unlocked gate permits entrance from the east. No Trespassing signs are posted at intervals upon the perimeter fence; Employees only is posted on the gate. Visitors must obtain a pass at the guard station. The outer perimeter contains the parking lot and office building. The perimeter has two light posts that, when functioning, illuminate the entire parking lot. Currently, the light post on the south side is not functioning. The office building exterior has three outer doors and one window. The first door is marked with an Employees Only sign and requires a badge for access. The second door is the main entrance for visitors and is manned by a guard, who requires a visitor’s pass for admittance. The third door is an emergency exit only and is clearly marked. Any attempt to gain access through the first door without a badge, the second door without a pass, or the third door at all, results in alarm activation and guard response. The window is locked from within; any attempt...
Words: 666 - Pages: 3
...States has been compelled to cooperate with IFRS. To portray the challenges involved, one large United States company, Clark Corporation, will be explored. At the close of the 2010 financial year, Clark Corporation’s external auditors strongly recommended that they prepare its financial statements using IFRS by January 1, 2012. However, Clark Corporation will encounter various challenges in migrating from depreciating the building under GAAP to IFRS. The component depreciation method is defined as “a method of calculating depreciation where separate items of a building with different useful lives are depreciated on different schedules” (Financial Dictionary, 2011). Although there are many benefits of the IFRS depreciation method, there are also numerous challenges that Clark Corporation will face from the gaps between current accounting practices and the new reporting system. One internal control challenge in migrating from the U.S. GAAP depreciation method to the IFRS depreciation method is the incompatibility between the systems. There are various internal controls in the U.S. GAAP reporting system that must be altered for the new reporting system, IFRS. First, the preventative controls in the U.S. GAAP system are effective to restrict the user from performing unauthorized actions but it may not be effective in the IFRS information system. For instance, due to the incompatibility between the systems, this control may block an account that is necessary to access in IFRS. Another...
Words: 1527 - Pages: 7
...Martin November 6, 2011 Case Study #1 Building the Foundation – Security Assessments As the security manager of a major corporation tasked with creating the initial security assessment and auditing program for the company, the first step in developing proposals for the security services would be conducting a comprehensive survey (policies, procedures and operations) of the entire facility to identify the critical factors affecting the security of the premises (Broder, 2006). The next step would be to analyze the vulnerabilities and recommend protection which is cost-effective (Broder, 2006). To start, establishing policies and procedures which define the mission of the security department should be the bare minimum in the role of the security department. These would include the following: * Protection against internal and external theft (to prevent embezzlement, fraud, burglary, robbery, industrial espionage and theft of trade secrets and proprietary information) * Developing access-control procedures (to protect the perimeter of the facility and other sensitive areas) and anti-intrusion systems * Establishing lock-and-key control procedures * Establishing a workplace violence program * Controlling the movement of people on the premises * Reviewing security personnel hiring and deploying * Establishing emergency and disaster recovery plans * Identifying the resources needed and available for the security program to operate efficiently * Developing...
Words: 802 - Pages: 4
...Unit Assignment 2: Impact of a Data Classification The Internal Use Only data classification standard of Richman Investments has many different infrastructures domains that are affected via internal use only data classification. More than all others, the three infrastructures that are affected the most are the User Domain, Workstation Domain and the LAN Domain. The reason why the User Domain infrastructure is one of the most affected infrastructures is because the User Domain infrastructure is the infrastructure that allows users to access the network. This is a problem because many users do not fully understand everything, all the time and thus is bound to make a mistake sooner or later. With so many users on our network, this is probably the most vulnerable domain infrastructures in our network. The Workstation Domain is also another domain infrastructure that has great reason to be affect by internal use only data because this is where the user connects to the our network. The reason that this can cause security threats and other problems is because this domain can be connected via a personal laptop or even a cell phone or other mobile device. The final infrastructure domain that is greatly affected is the LAN domain. The reason that this domain infrastructure is affected by internal use only data is because this domain is the open domain available companywide, to anybody in the building or even near the building via a wireless device. If we watch these specific areas...
Words: 280 - Pages: 2
...Threats and Risks Assessment The determination of natural, man-made, and technological risks is the responsibility of security management and security personnel. Threats and risks are vital to determine to lessen the damages caused to assets within the organization. Retail organizations have many assets that are needed to be protected from threats and risks in order to maintain quality customer service. The threats and risks can either be caused from the inside threats or outside threats. The most common risks that are present in retail organizations are fires, internal and external thefts, and burglaries. Threats and vulnerabilities are managed and determined by security officials on a daily basis to ensure proper protocols are being upheld when risks present themselves. Retail Threat and Risk Assessment The determination of threats and risks that affect all organizations, not just specific organizations, must first be made by using a threat and vulnerability assessment and risk analysis. “The first step in a risk management program is a threat assessment. A threat assessment considers the full spectrum of threats for any given facility/location. The assessment should examine supporting information to evaluate the likelihood of occurrence for each threat” (National Institute of Building Sciences, 2012). The threats and vulnerabilities within the organization are discovered and then a risk analysis is used to determine which risks are most likely to be present within...
Words: 1136 - Pages: 5
...Allen & Bose Insurance Services Firewall Security Project Business Requirement and proposed Solution Report CIS 343 July 10, 2013 Dr. Table of Contents Executive Summary 3 Introduction/Background and History 4 Issues faced and specific needs to be solved by installing upgrades 5 Projects Assumptions and Constraints 7 Business Requirement ….………………………..………………………………………..8 Definition of Terms ….……………………………..……………………………………..9 Project Scope...……………………………………..……………………………………10 References…………………………………………..……………………………………13 Executive Summary The objective of this paper is to educate both the senior management of Allen & Bose Insurance Inc. on the network security threats that exist with our current network design. The enclosed report presents an analysis on Allen & Bose Insurance Services current security posture and highlights the issues we have face over the past year as well as industry best practices and recommended updates we should make to our network security design that will protect the organization from the myriad of security threats that are out there. Introduction/Background and History Allen & Bose Insurance Services has become a dynamic and intricate player in the automotive and home insurance market. The company has grown from 25 employees in one office to over 225 employees in 3 offices. In the early days the computer systems that were used were on a close network of networked computing...
Words: 1848 - Pages: 8
...expanding business. The description below describes the key steps involved in developing a WAN for Acme Manufacturing. The company has six different buildings in six different locations throughout the world which need to be networked collectively. All the remote locations need to be able to communicate effectively with the main headquarters which is located in Atlanta, Georgia. The two buildings which house the headquarters are located across the street from each other. One building is used solely for corporate operations while the other building is used for staffing the sales and engineering department. Network Topology The best choice for the company would be to use a LAN with routers and Ethernet cables. This is a logical choice because the speeds of the network will be far superior and will help to reduce the total cost of the network. The three distribution buildings are located in Chicago, Phoenix, and New York. It is not feasible to run cabling to theses locations due to cost, so using T3 leased lines to communicate is the recommended method to connect the buildings with headquarters. The plant facility building is located in China. Using satellites to communicate to the headquarters network will work best because of the large distance between the buildings. Using these recommendations will allow all the different buildings to stay connected in a WAN which will help ensure smooth operations of the business. This will help the business perform daily needs such as placing...
Words: 1444 - Pages: 6