Premium Essay

Nt 2580 Project Part 1

In:

Submitted By taptap21
Words 1912
Pages 8
NT 2580 Intro to Info Security
Project part 1
December 8, 2015

Headquarters
Phoenix, AZ

Branch 1 Branch 2 Branch 3
Atlanta, GA Chicago, IL Cincinnati, OH
User Domain * Have employees sign confidential agreement * Introduce an AUP acceptable use policy * Have HR verify an employee’s identity with background checks * Conduct security awareness training * Enable content filtering and antivirus scanning * Restrict access to only info needed to perform job * Track and monitor abnormal behavior of employees
Workstation Domain * Implement workstation log on ids and password * HR must define proper access controls for workers based on jobs * IT security must then assign access rights to systems, apps, and data * IT director must ensure workstation conforms to policy * Implement second level test to verify a user’s right to gain access * Start periodic workstation domain vulnerability tests to find gaps * Define workstation application software vulnerability window policy * Use content filtering and antivirus scanning at internet entry and exit * Mandate annual security awareness training
LAN Domain * Setup of user LAN accounts with logon ID and password access controls * Make sure wiring closets, data centers , and computer rooms are secure * Define strict access control policies * Implement second level identity check * Define a strict software vulnerability window policy * Use WLAN network keys that require a password for wireless access * Implement encryption between workstation and WAP

LAN to WAN Domain * IP routers and ACLs * IP stateful firewalls * Demilitarized zone * Intrusion detection system * Intrusion prevention system * Proxy servers * Web content filter * Email content filter and quarantine system *

Similar Documents

Premium Essay

Nt 2580 Project Part 1

...To create an effective multi-layer security plan, all seven of the domains of the IT infrastructure must be addressed. An improvement on each of the domains will help to fight against an attacker. For this part of the project we will address five of the domains. Probably the best place to start beefing up security is with the user domain. Most attacks on security are from users. You cannot allow users to have simple passwords. A complex password is paramount to defending the user domain. A complex password is at least eight characters, uses a mix of upper and lower case letters, and contains special characters such as an @ or $. Passwords need to be changed regularly as well. They should be change every so many months and users should not be able to use a password twice in a year. In the LAN domain we need to protect against malicious emails. Users should know better than to open suspect emails at work, but a reminder could not hurt. Spam filters are extremely important so that user do not get as many suspect emails. In the workstation domain we need to make sure our workstations are protected. Internet security or at least antivirus should be used an all workstations. It seems like a no brainer in this day and age, but we still need to ensure it is implemented. Another way to secure our workstations is to encrypt the hard drives. We should also deactivate all media ports. In the WAN domain we need to set up firewalls. The firewalls we block things our company does not...

Words: 335 - Pages: 2

Free Essay

Capacoty Analysis

...Electronics and Communication Engineering at National Institute of Technology, Rourkela is an authentic piece of work carried out by them under my guidance and supervision. To the best of my knowledge, the matter in this thesis has not been submitted to any other University / Institute for the award of any Degree. Prof. Poonam Singh Department of Electronics and Communication National Institute of Technology, Rourkela Date: ACKNOWLEDGEMENT It would not have been possible to complete and write this project thesis without the help and encouragement of certain people whom we would like to deeply honour and value their gratefulness. We would like to highly appreciate the constant motivation and encouragement shown by our supervisor and guide Prof. Poonam Singh, Department of Electronics and Communication Engineering during the project and writing of the thesis. Without her guidance and help, it would not have been possible to bring out this thesis and complete the project. We also express our gratitude towards Dr. Sukadev Meher , HOD, Department of Electronics and Communication, for his selfless support and help offered whenever needed, especially for the usage of laboratories. Other professors of...

Words: 6556 - Pages: 27

Free Essay

Machine Learning

...Cambridge, Massachusetts London, England c 2012 Massachusetts Institute of Technology All rights reserved. No part of this book may be reproduced in any form by any electronic or mechanical means (including photocopying, recording, or information storage and retrieval) without permission in writing from the publisher. MIT Press books may be purchased at special quantity discounts for business or sales promotional use. For information, please email special sales@mitpress.mit.edu or write to Special Sales Department, The MIT Press, 55 Hayward Street, Cambridge, MA 02142. A This book was set in L TEX by the authors. Printed and bound in the United States of America. Library of Congress Cataloging-in-Publication Data Mohri, Mehryar. Foundations of machine learning / Mehryar Mohri, Afshin Rostamizadeh, and Ameet Talwalkar. p. cm. - (Adaptive computation and machine learning series) Includes bibliographical references and index. ISBN 978-0-262-01825-8 (hardcover : alk. paper) 1. Machine learning. 2. Computer algorithms. I. Rostamizadeh, Afshin. II. Talwalkar, Ameet. III. Title. Q325.5.M64 2012 006.3’1-dc23 2012007249 10 9 8 7 6 5 4 3 2 1 Contents Preface 1 Introduction 1.1 Applications and problems . 1.2 Definitions and terminology 1.3 Cross-validation . . . . . . . 1.4 Learning scenarios . . . . . 1.5 Outline . . . . . . . . . . . 2 The 2.1 2.2 2.3 2.4 xi 1 1 3 5 7 8 11 11 17 21 24 24 25 26 27 28 29 33 34 38 41 48 54 55 63...

Words: 137818 - Pages: 552

Free Essay

Green

...No. Nama Perguruan Tinggi AKADEMI AKUNTANSI PGRI JEMBER Nama Pengusul Sisda Rizqi Rindang Sari Program Kegiatan Judul Kegiatan 1 PKMK KUE TART CAENIS ( CANTIK, ENAK DAN EKONOMIS) BERBAHAN DASAR TAPE 2 AKADEMI FARMASI KEBANGSAAN Nensi MAKASSAR AKADEMI KEBIDANAN CITRA MEDIKA SURAKARTA AKADEMI KEBIDANAN GIRI SATRIA HUSADA AKADEMI KEPERAWATAN KERTA CENDIKA SIDOARJO AKADEMI KEPERAWATAN KERTA CENDIKA SIDOARJO AKADEMI KEPERAWATAN KERTA CENDIKA SIDOARJO Putri Purnamasari PKMK LILIN SEHAT AROMA KURINDU PANCAKE GARCINIA MANGOSTANA ( PANCAKE KULIT MANGGIS ) 3 PKMK 4 Latifah Sulistyowati PKMK Pemanfaatan Potensi Jambu Mete secara Terpadu dan Pengolahannya sebagai Abon Karmelin (Karamel Bromelin) : Pelunak Aneka Jenis Daging Dari Limbah Nanas Yang Ramah Lingkungan, Higienis Dan Praktis PUDING“BALECI”( KERES) MAKANAN BERSERATANTI ASAM URAT 5 Achmad PKMK Zainunddin Zulfi 6 Dian Kartika Sari PKMK 7 Radita Sandia PKMK Selonot Sehat (S2) Diit untuk Penderita Diabetes 8 AKADEMI PEREKAM Agustina MEDIK & INFO KES Wulandari CITRA MEDIKA AKADEMI PEREKAM MEDIK & INFO KES Anton Sulistya CITRA MEDIKA AKADEMI PEREKAM Eka Mariyana MEDIK & INFO KES Safitri CITRA MEDIKA AKADEMI PEREKAM MEDIK & INFO KES Ferlina Hastuti CITRA MEDIKA AKADEMI PEREKAM Nindita Rin MEDIK & INFO KES Prasetyo D CITRA MEDIKA AKADEMI PEREKAM MEDIK & INFO KES Sri Rahayu CITRA MEDIKA AKADEMI PERIKANAN YOGYAKARTA PKMK Kasubi Wingko Kaya Akan Karbohidrat...

Words: 159309 - Pages: 638