Premium Essay

Network Security Plan

In:

Submitted By capstun2020
Words 3365
Pages 14
The survey conducted of Corporation Tech existing hosts, while using NetWitness Investigator found that the company does not have a properly configured DMZ which exposes an organizations external services to the internet. Adding an additional layer to the security LAN will help the organization against any outside hackers. Another issue found was that the company did not have secure remote access to their computers while away from the organization. Granting access on a per-user basis only to those who have a bona fide need to access the network remotely. Implementing a remote access to the organizations computers while keeping it secure via firewalls and VPN server will ensure protection from outside intruders. I recommend that you install a VPN server as well as Remote access security. One firewall with Network Address Translation (NAT) this will add to the security that will not be visible outside of the organization and another firewall without NAT which will be visible outside of the organization.

Network Security Plan
Purpose
Computer and network security incidents have become a fact of life for most organizations that provide networked information technology resources including connectivity with the global Internet. Current methods of dealing with such incidents are at best piecemeal relying on luck, varying working practices, good will and unofficial support from a few individuals normally engaged in central network or systems support. This approach undoubtedly leads to inefficiencies and associated problems with respect to: * · Duplicated effort * · Inappropriate actions * · Poor co-ordination * · Confusion - No obvious authority, identifiable responsibilities or overall management * · Tardy incident detections and resolution times * · Missed, unreported or ignored

Similar Documents

Premium Essay

Network Security Plan

...Network Security Plan For a general security solution plan at Richman Investments, this report will give an outline of the needed multi-layered security plan for the entire network including all branch offices. There are many risks that are involved with any network, good planning and policies put into place can mitigate security flaws. The multi-layer security solution can be a useful guideline to start and sustain these security measures within the company. The following topics for security planning will be discussed in a brief and general detail are; User Domain, Workstation Domain, LAN Domain, LAN-to-WAN Domain, Remote Access Domain, WAN Domain, and System/Application Domain. There are many different and unique threats to all domains listed; this report only covers a small portion of ways to mitigate such threats, risks, and vulnerabilities. User Domain In the first layer of the multi-layer security is the user domain. For any user within the company accessing the network on any given workstation or portable device, that user is subjected to the acceptable use policy (AUP). Users are the greatest risk to any network and proper assessment of user policies and the Global Policy configurations need to be well thought out and enforced by these policies. Under this AUP, if violated can be subjected to employee dismal or grounds for punishment actions. Users can be disgruntled employees and can cause serious issues to the network if they have access to sensitive information...

Words: 1254 - Pages: 6

Premium Essay

Solutions of This Questions

...5: IT Security, crime, Compliance, and Continuity Multiple Choice 1. ______ refers to viruses, Trojan horses, spyware, and other types of disruptive, destructive, or unwanted programs. a) Bad program b) Hacking c) Malware d) Zombie computer 2. Social networks and cloud computing increase vulnerabilities by providing _____. a) a single point of failure b) an easy way to steal data c) an easier way for data to be read over networks d) extra security over a network 3. _______ is a deceptive attempt to steal a person’s confidential information by pretending to be a legitimate organization such as PayPal. a) Inquiry b) Lying c) Phishing d) Polling 4. Some essential defenses against malware and botnet defenses include all of the following except: a) antivirus software b) constant monitoring by a human c) intrusion detection systems d) intrusion prevention systems 5. ______ fraud refers to the deliberate misuse of the assets on one’s employer for personal gain. a) Occupational b) Human c) Malicious d) Accidental 6. One of the worst and most prevalent crimes is/are _____. a) phishing b) viruses c) identity theft d) malware 7. Physical control is an example of what category of control? a) Application b) Basic c) Major d) General 8. Network Security measures involve ___ types of defenses referred to as layers. a) 4 b) 3 c) 10 d) 5 9. _____ is a type of security protocol...

Words: 399 - Pages: 2

Premium Essay

Next Generation Firewall

...Final Project Next Generation Firewall By: Edward Caudill Submitted as partial fulfillment of the requirements for the Bachelors of Computer Science Independence University April, 2015 Copyright ( 2015 Edward Caudill This document is copyrighted material. Under copyright law, no parts of this document may be reproduced without the expressed permission of the author. Approval Page INDEPENDENCE UNIVERSITY As members of the Final Project Committee, we certify that we have read the document prepared by __________________ entitled ________________________________________ and recommend that it be accepted as fulfilling the Capstone requirement for the Degree of ________________________________________ ____________________________________________________________Date: _________ Name of Course Instructor ____________________________________________________________Date: _________ Associate Dean Signature ____________________________________________________________Date: _________ Senior Associate Dean Signature I hereby certify that I have read this document prepared under my direction and recommend that it be accepted as fulfilling the dissertation requirement. ____________________________________________________________Date: __________ Course Instructor Abstract Taking advantage of a vulnerability (i.e., an identified weakness), in a...

Words: 3381 - Pages: 14

Premium Essay

Ananth

...5: IT Security, crime, Compliance, and Continuity Multiple Choice 1. ______ refers to viruses, Trojan horses, spyware, and other types of disruptive, destructive, or unwanted programs. a) Bad program b) Hacking c) Malware d) Zombie computer 2. Social networks and cloud computing increase vulnerabilities by providing _____. a) a single point of failure b) an easy way to steal data c) an easier way for data to be read over networks d) extra security over a network 3. _______ is a deceptive attempt to steal a person’s confidential information by pretending to be a legitimate organization such as PayPal. a) Inquiry b) Lying c) Phishing d) Polling 4. Some essential defenses against malware and botnet defenses include all of the following except: a) antivirus software b) constant monitoring by a human c) intrusion detection systems d) intrusion prevention systems 5. ______ fraud refers to the deliberate misuse of the assets on one’s employer for personal gain. a) Occupational b) Human c) Malicious d) Accidental 6. One of the worst and most prevalent crimes is/are _____. a) phishing b) viruses c) identity theft d) malware 7. Physical control is an example of what category of control? a) Application b) Basic c) Major d) General 8. Network Security measures involve ___ types of defenses referred to as layers. a) 4 b) 3 c) 10 d) 5 9. _____ is a type of security protocol...

Words: 399 - Pages: 2

Premium Essay

Week 3 Chapter 5

...5: IT Security, crime, Compliance, and Continuity Multiple Choice 1. ______ refers to viruses, Trojan horses, spyware, and other types of disruptive, destructive, or unwanted programs. a) Bad program b) Hacking c) Malware d) Zombie computer 2. Social networks and cloud computing increase vulnerabilities by providing _____. a) a single point of failure b) an easy way to steal data c) an easier way for data to be read over networks d) extra security over a network 3. _______ is a deceptive attempt to steal a person’s confidential information by pretending to be a legitimate organization such as PayPal. a) Inquiry b) Lying c) Phishing d) Polling 4. Some essential defenses against malware and botnet defenses include all of the following except: a) antivirus software b) constant monitoring by a human c) intrusion detection systems d) intrusion prevention systems 5. ______ fraud refers to the deliberate misuse of the assets on one’s employer for personal gain. a) Occupational b) Human c) Malicious d) Accidental 6. One of the worst and most prevalent crimes is/are _____. a) phishing b) viruses c) identity theft d) malware 7. Physical control is an example of what category of control? a) Application b) Basic c) Major d) General 8. Network Security measures involve ___ types of defenses referred to as layers. a) 4 b) 3 c) 10 d) 5 9. _____ is a type of security protocol...

Words: 399 - Pages: 2

Free Essay

Security Monitoring

...Security Monitoring Mobin Bahrami University of Phoenix Information Systems Risk Management CMGT/442 June 22, 2012 Brian Hoff Intro Security monitoring is an important factor in keeping any organization network safe as various attacks are on a rise. A company constantly must practice monitory techniques to keep their data safe. " The first step is to scan the internal and external environment and identify information technology risks before they become a problem. The key is to be proactive rather than reactive" (Marilyn Greenstein). Different organization consist of many applications that require a certain level of security measures and risk assessment. To determine the associated risks within an organization each application needs to be thoroughly reviewed. Also risks may vary between internal and external applications. Many organizations remain profitable and grow by creating a good mixture of information technology and e-commerce. E-commerce focuses mainly on the product marketing and Internet sales, while information technology (IT) team handle all aspects of the organizations network. Malicious attacks, natural disasters, and internal breach are all good cause to maintain a security monitoring system. Network Security Systems Security event monitoring involves monitoring activities that occur on a computer system such as, recording information and analyzing recorded data to identify any potential risks. Organizations must have a secure network to stay in...

Words: 1035 - Pages: 5

Premium Essay

How to Plan for Security

...How to Plan for Security i). Statement of Policy This policy statement seeks to address the optimum and responsible use of the wireless local area network WLAN facility available at the university in relation to specific network security issues. The issue of concern in this policy is the promotion of responsible use of the WLAN facility among the university’s student and workers. The strategy aims at preventing security problems that may arise from the misuse and malicious exploitation of the facility by people granted approval to access the university’s WLAN information systems. a) Scope and Applicability The scope of this policy statement covers the hardware, software and access protocols associated with the WLAN use by students and workers at the university. The policies adopted will seek to regulate access permissions for the users of the WLAN facility and to promote responsible use in line with policies outlined in this policy document and by industry standards and legal requirements of use. b) Definition of Technology Address The WAN is available for use by the students and workers within the university. The WLAN facility provides access to information systems meant to facilitate the learning and worker needs by providing information access and software platforms. c) Responsibilities The administration and management of the WLAN facility is the responsibility of appointed network administrators at the university’s faculty of Information and Communication Technology. The...

Words: 1907 - Pages: 8

Premium Essay

It Security

...CHaPTer Firewall Fundamentals 2 T O SOME NETWORK ADMINISTRATORS, A FIREWALL is the key component of their infrastructure’s security. To others, a fi rewall is a hassle and a barrier to accomplishing essential tasks. In most cases, the negative view of fi rewalls stems from a basic misunderstanding of the nature of fi rewalls and how they work. This chapter will help dispel this confusion. This chapter clearly defi nes the fundamentals of fi rewalls. These include what a fi rewall is, what a fi rewall does, how it performs these tasks, why fi rewalls are necessary, the various fi rewall types, and fi ltering mechanisms. Once you understand these fundamentals of fi rewalls, you will able to look beyond the unschooled opinions, common mythology, and marketing hype surrounding them, and the crucial benefi ts of effective fi rewall architecture will become clear. Like any tool, fi rewalls are useful in solving a variety of particular problems and in supporting essential network security. Chapter 2 Topics This chapter will cover the following topics and concepts: • What a fi rewall is • Why you need a fi rewall • How fi rewalls work and what they do • What the basics of TCP/IP are • What the types of fi rewalls are • What ingress and egress fi ltering is • What the types of fi rewall fi ltering are • What the difference between software and hardware fi rewalls is • What dual-homed and triple-homed fi rewalls...

Words: 15354 - Pages: 62

Premium Essay

Nt1310 Unit 3 Assignment 1 Network Security Plan

...A Case Project (Network Security Plan) - Acme Corporation Network infrastructure design for two campuses located in Atlanta and Cincinnati The following will be required • Unshielded Twisted Pair (UTP) Cables • Shielded Twisted Pair (STP) Cable • Coaxial Cable • Fiber Optic Cable • Cable Installation Guides • Unshielded Twisted Pair (UTP) Cable > In this network we will use CAT5 and CAT6 patch. These closets should be used in the server room of the location at Atlanta location and we shall also create one at the Cincinati location due to the big number of hanging wires that we shall use. >Wireless networks are much more susceptible to unauthorized use than cabled networks. We should encrypt the network by putting a password to keep out unauthorized access that may lead to network attacks. Using passwords and assigning privilege levels is a simple way of providing terminal access control in any network. To provide an additional layer of security, particularly for passwords that cross...

Words: 1177 - Pages: 5

Premium Essay

Technology

...CHaPTer Firewall Fundamentals 2 T O SOME NETWORK ADMINISTRATORS, A FIREWALL is the key component of their infrastructure’s security. To others, a fi rewall is a hassle and a barrier to accomplishing essential tasks. In most cases, the negative view of fi rewalls stems from a basic misunderstanding of the nature of fi rewalls and how they work. This chapter will help dispel this confusion. This chapter clearly defi nes the fundamentals of fi rewalls. These include what a fi rewall is, what a fi rewall does, how it performs these tasks, why fi rewalls are necessary, the various fi rewall types, and fi ltering mechanisms. Once you understand these fundamentals of fi rewalls, you will able to look beyond the unschooled opinions, common mythology, and marketing hype surrounding them, and the crucial benefi ts of effective fi rewall architecture will become clear. Like any tool, fi rewalls are useful in solving a variety of particular problems and in supporting essential network security. Chapter 2 Topics This chapter will cover the following topics and concepts: • What a fi rewall is • Why you need a fi rewall • How fi rewalls work and what they do • What the basics of TCP/IP are • What the types of fi rewalls are • What ingress and egress fi ltering is • What the types of fi rewall fi ltering are • What the difference between software and hardware fi rewalls is • What dual-homed and triple-homed fi rewalls...

Words: 15354 - Pages: 62

Premium Essay

It456 Db2

... Security Architecture Design IT456_DB2 Security architecture is an important aspect of any security system safeguarding an organizations data, employee/client demographic information and many other vital data. Deployment of an effective scalable network security system requires proper design according to the risk analysis and employing security principles in best practices and maintaining a satisfactory level of compliance. www.disa.mil/.../mil Should any of the key areas of the security infrastructure be compromised it will have devastating effects on the reliability, availability, viability of operational abilities and integrity of data. As well the system vulnerabilities are more easily. Attacks are carried out on these compromised infrastructures including industrial espionage, revenge, financial gain, and terrorism. ISSA.com/security Some of the principles used in the design of a secure Infrastructure are compartmentalization of information, principle of least privilege, weakest link, defense in depth, authentication password security, antivirus, packet filtering,, firewalls, policies both permitting and restricting activities, DMZ’s and designing the security around and for the most critical systems. Do not forget the ever more important intrusion detection...

Words: 727 - Pages: 3

Premium Essay

Wgu Itsecurity Capstone

...Capstone Project Cover Sheet Capstone Project Title: ABC Inc. Firewall upgrade Report Student Name: Michael Wakefield Degree Program: BS- IT Security Mentor Name: Dave Huff Signature Block Student’s Signature Mentor’s Signature Table of Contents Capstone Summary 3 Review of Other Work 13 Rationale and Systems Analysis 19 Goals and Objectives 25 Project Deliverables 28 Project Plan and Timelines 30 Project Development…………………………………………………………………………………………………………………………….31 Additional Deliverables………………………………………………………………………………………………………………………….35 Conclusion…………………………………………………………………………………………………………………………………………….35 References 37 Appendix 1: Competency Matrix 38 Appendix 2: Cisco ASA 5555-X Firewall Specifications…………………………………………………………….40 Appendix 3: ABC Inc. Project Schedule…………………………………………………………………………………….44 Appendix 4: High-Availability Design Screenshots……………………………………………………………………45 Appendix 5: Screenshots of inside to outside access; outside to DMZ access; NAT rules and configurations; and performance graphs and performance results….........................................51 Capstone Report Summary Internet of Everything (IoE) and “Big Data” equates to competitive advantages to the modern business landscape. Numerous white papers are circulating on the Internet highlighting the business case supporting the IoE initiative. For instance, in a white paper conducted by Cisco Inc. on the Value Index of IoE in 2013 reported the following: ...

Words: 9337 - Pages: 38

Free Essay

Firewall Security Project

...Bose Insurance Services Firewall Security Project Business Requirement and proposed Solution Report CIS 343 July 10, 2013 Dr. Table of Contents Executive Summary 3 Introduction/Background and History 4 Issues faced and specific needs to be solved by installing upgrades 5 Projects Assumptions and Constraints 7 Business Requirement ….………………………..………………………………………..8 Definition of Terms ….……………………………..……………………………………..9 Project Scope...……………………………………..……………………………………10 References…………………………………………..……………………………………13 Executive Summary The objective of this paper is to educate both the senior management of Allen & Bose Insurance Inc. on the network security threats that exist with our current network design. The enclosed report presents an analysis on Allen & Bose Insurance Services current security posture and highlights the issues we have face over the past year as well as industry best practices and recommended updates we should make to our network security design that will protect the organization from the myriad of security threats that are out there. Introduction/Background and History Allen & Bose Insurance Services has become a dynamic and intricate player in the automotive and home insurance market. The company has grown from 25 employees in one office to over 225 employees in 3 offices. In the early days the computer systems that were used were on a close network of networked computing systems...

Words: 1848 - Pages: 8

Premium Essay

Fundamental of Network

...Fundamentals of Networks Alhaji Mansary University of Phoenix Integrative Network Design Project Part 3 Prof, Marjorie Marque 12/12/12. Kudler Fine Foods Network: Final Introduction Kudler Fine Foods is on their way to upgrading their present network infrastructure with better wireless technology that will provide an improved communication medium both for the stores and employees. This will help maximizing the company’s profits with the aid of the new systems and servers performance. The new inventory system will let a store’s POS system to alert the warehouses that they need to ship more products already when the store is running low in stock. This will eliminate or at least make the man-hours needed in checking the stock. VoWLAN (Voice over WLAN) is the one to provide all the communications needed to be done by taking or making calls while providing the services needed by the customers by using the same medium. Other technological Advances will provide real-time network analysis and security monitoring which will bring overall benefits to the Kudler Company. Network Overview Kudler’s network infrastructure is now becoming very old. The stores are on separate networks so the bus network topology that they have does not allow effective communication already. This is a major problem because of the fact of lacking central location for network servers and backups or security set-up. This is the reason an enterprise wireless WAN is being rolled...

Words: 3022 - Pages: 13

Premium Essay

Information and Technology

...marketing; while IT teams can handle any and all aspects of the organizations network. Security is becoming more important to organizations, as various attacks are on a rise. Natural disasters, malicious attacks, internal breach, and loss of team members, are all good cause to maintain strong security monitoring systems. The paper that follows will address security monitoring systems that should be conducted in the Cellular Phone Organization (CPO) with both Internal IT and e-commerce applications. Network Security Systems Organizations must have a secure network, in order to stay in business. There are many types of variations of ways to secure the network of an organization, and each must cater the type of business. The internal network is comprised of all servers, applications, data, and equipment used within the organization. The security of the internal network must consist of a mixture of both hardware and software. The Cellular Phone Organization employs 150 associates in an appropriate sized building. There are three teams: Customer Care; Tech Support: and Sales. There is also a Human Resources Team and Management team, for perspective departments. The company works primarily through a LAN/WAN set up, and work is performed primarily over the web. CPO must keep personal information safe, as they are trusted by each customer. CPO must also keep the information held within the facility and network safe, belonging to their employees. The Human Resource Team and Management...

Words: 1127 - Pages: 5