Wednesday, May 6, 2020
Essay about Proposal Network Security - 1217 Words
The organization had just secured a government contract worth millions of dollars. The sensitive nature of the information requires the company evaluate and address security measures. With any network, there are many threats, both internal and external, that can result in loss of productivity, loss of data and even theft of information. I will address several of these threats and propose measures to ensure a protected environment and to mitigate these risks. Vulnerability Assessment Entry to the office area is controlled by physically keyed doors. Employees work in an open cubical environment and have the ability to physically secure paperwork and personal items but not computer equipment. All computer systems run a currentâ⬠¦show more contentâ⬠¦A number of building security solutions are on the market that make use of magnetic key cards and card readers that are controlled by a central management and logging system. This allows the organization to easily control access to the whole or parts of the facility while logging access attempts for security audits. Any visitors to the facility should be required to check in at reception, be escorted, by an employee, while on the premises and not be left unattended at any time. Another good practice is too physically secure all computers. Desktop computers usually come with locking mechanisms to insure unauthorized personnel do not steal hard drives or other key parts. Laptop compu ters should be fastened to desks with cable locks to insure they are not picked up and taken while left unattended. Another external security risk is via the Internet into the network. For this, we can place a firewall into service to protect against hackers, denial of service attacks, and other external threats. This will also protect data from being stolen virtually and can also aid in ensuring effective service. Sometimes hackers will get into an email system and use it as a proxy for spam email, this will result in getting added to a blacklist and having emails not get through to a lot of intended recipients.Show MoreRelatedNetwork Security Proposal1733 Words à |à 7 PagesJoe Bailey ITS-2120 Network Security Proposal Introduction Fixem Orthopedic Therapy is a physical therapy facility that treats people who are recovering from various musculoskeletal surgeries. The company is based in Southern Maryland and consists of three separate offices: one in Brandywine, one in Indian Head, and an office that was recently built in Waldorf. These offices connect to each other through WAN links, and they are also capable of connecting to local doctorsââ¬â¢ offices which allowsRead MoreEssay about Technical Security Policy Proposal for Small Company1064 Words à |à 5 PagesTicTek Inc is a small company with about a hundred employees and one facility. The company sells home security electronics online. The devices are manufactured by a third party company and shipped to TicTek, whereupon they are warehoused until they are purchased through the companyââ¬â¢s website. The warehouse staff prepares and ships customer orders in the same facility which houses the office staff and management. TicTek has a few major stockho lders, but the majority of the companyââ¬â¢s stock is ownedRead MoreRemote Access And Using Extensible Authentication Protocol Essay1129 Words à |à 5 Pagesdata outside the office which presents many security challenges. Not only is the end user accessing your network resources and potentially sensitive data, but they are many times doing so from a public network which the admin has no control over and is open to others who may have malicious intent. These connections clearly need to be properly secured in order provide end users secure network connections. To secure remote connections, a virtual private network (VPN) will created using the Routing andRead MoreRequest For Proposal Rfp ( Rfp )1271 Words à |à 6 PagesREQUEST FOR PROPOSAL (RFP) WIRELESS COMP COMPANY REAPER MACHINES 2335 LENOX ST. CHARLOTTE, NC, 28056 8/11/2014 TABLE OF CONTENTS 1. SUMMARY AND BACKGROUND 2 2. PROPOSAL GUIDELINES 2 3. PROJECT PURPOSE AND DESCRIPTION 3 4. PROJECT SCOPE 3 5. PROPOSAL AND PROJECT TIMELINE 4 6. BUDGET 5 7. PROPOSAL EVALUATION CRITERIA 6 1. SUMMARY AND BACKGROUND Death Comm is currently accepting proposals to develop, design, launch, and host a new Wireless Network within their building. TheRead MoreImpact Of Legislation On Vanderbilt University Medical Center1234 Words à |à 5 PagesImpact of Legislation on Vanderbilt University Medical Center Ebony S. Spann Security Policy Analysis (CSIA 412) March 29, 2015 Abstract With the Age of technology advancing, the more cyber-attacks are occurring. Many of our information are on computer networks and we like to think that our information is well protect. But how protected is our information? Cybersecurity bills are introduced in Congress almost every year. These bills regularly imply to permit organizationsRead MoreEssay on Access Control FInal Project1199 Words à |à 5 Pagesï » ¿ITT Technical institute ââ¬â isc program Project: Access Control Proposal IS3230 - Access Control Bernard Downing David Crenshaw /2014 1 INTRODUCTION 1.1 Title of the project Access Control Proposal Project for IDI 1.2 Project schedule summary The project will be a multi-year phased approach to have all sites (except JV and SA) on the same hardware and software platforms. 1.3 Project deliverables â⬠¢ Solutions to the issues that specifies location of IDI is facing â⬠¢ Plans to implement corporate-wideRead MoreModelling Of Scada Networks By Implementing The Dbsy Modelling Method, And Risk Assessment997 Words à |à 4 PagesIMPLICATION OF DBSY ON SCADA NETWORKS RESEARCH ADVISORS: DR. PAVOL ZAVARSKY SHIREESHA KATAM {skatam@student.concordia.ab.ca}- ID: 130526 DECEMBER 03, 2014 1 Research Statement This research proposal is focused on modelling of SCADA networks by implementing the DBSy modelling method, and risk assessment. 2 Problem Statement SCADA and ICS are the Critical Infrastructures, Which Operates a number of significant resources including fuel, energy, water, airports, and biotech and run many day-day utilitiesRead MoreInformation Technology And The Health Systems1301 Words à |à 6 PagesInformation Technology (IT) Initiative Proposal As the business analyst for the Health Systems, Inc., I had was afforded the opportunity to conduct an analysis on the current information technology systems. Upon recognizing and discovering several issues within the Health Systems, Inc. existing information technology systems, my team and I are preparing resolutions for each and every one of them. In addition to these resolutions, we will incorporate an Information Security and Assurance platform as wellRead MoreThe System Development Life Cycle1357 Words à |à 6 Pageswith respect to the IIS and its data. In addition, the security policy should include appropriate procedures to ensure local site data and software are properly managed. The IIS applications such as general reader, general user, and site manager need to be created to support the objectives of the policies (Arzt, 2007). In addition, this proposal will apply the System development Life Cycle (SDLC) in developing information security policy. A. Process: This project will attempt to address privacyRead MoreMetric Multistandard Components Case 3 Corp.: Essay1177 Words à |à 5 PagesWith 22,000 customers, 48,800 cataloged parts, and 150 employees working in five U.S. locations and an office in Germany, the last thing John Bellnier needs is an unreliable network. Yet thatââ¬â¢s exactly what he contended with for years as IT manager at Metric Multistandard Components Corp. (MMCC). MMCC may still be classified as a small business by some standards, but this small-to-medium business (SMB) definitely has been a big-time success story in its industry. MMCC was founded in 1963
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.