Preview

itt security final paper

Better Essays
Open Document
Open Document
1085 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
itt security final paper
Proposal for Intranet and
Extranet Security

5/5/2013

Richman Investing is one of the top leading investing firms in the United States. In order to stay on top of the competition a few things have to be implemented. Accessing Richman’s intranet and extranet is one of many nice features about the company. Securing these ways to access the network is more than just saying which sites users can and cannot access. It is encrypting data, setting passwords, physically locking doors, and many other very important security measures that need to be thought of. Being 100 percent safe and secure is not achievable but if we follow these steps Richman Investing will be more secure and will remain number one in the United States when it comes to investing.
Every business has an Acceptable Use Policy(AUP), whether or not they inform the users of it is a different story. When people give out an AUP, they need to enforce it. The worst user is an uniformed user. An AUP states what a user can and cannot do on the network. This is what should not be allowed:
No downloading executable from software sites; as this may be infected with any type of virus that could further do damage to our network.

No access to Facebook or any other type of social networking. This is because this will slow down production.

No remote connections from systems that fail to meet the set requirement. This is because any computers that do not have updates installed may be another security threat.

No accessing unauthorized internal resources or information from external sources This is to make sure we follow the internal use policy.
A password by definition is, a secret word or phrase known only to a restricted group. Make sure users are not physically displaying passwords on the monitor or anywhere an unauthorized user can find it. If an unauthorized user finds a password, that person is held personally responsible. Be sure to enforce strong passwords

You May Also Find These Documents Helpful

  • Good Essays

    The User Domain will enforce an acceptable use policy (AUP) to define what each user can and cannot do with any company data shall he or she have access to it. As well as with company users, any outside contractor or third-party representatives shall also need to agree and comply with the AUP. All users must be properly identified and sign this AUP prior to gaining any access whatsoever to the company network. No exceptions. Any violation will be taken up with company executives and/or the authorities to assess further punitive action.…

    • 471 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    lab 4

    • 451 Words
    • 2 Pages

    Internet use at Richman is only authorized to conduct Company business only. Internet use can easily allow hackers to see confidential Company information and allow viruses. This allows the hackers to get passwords and other important things. Which is why we want the staff at Richman’s to only use the internet for business only and business only sites. Employees can only check their business…

    • 451 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    The following document outlines Richman Investments security measures for IT infrastructure. There are many components that make up the Richman Investments network, and so there should be a multi-layered security solution to protect it. The server room has been located in the central part of the building, and will be physically protected by electronic door locks with keypad combination access. There are a limited number of personnel who will have access to this room in order to decrease the potential for tampering. Each of these personnel will have their own access code, and a digital log will be kept of all access.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Scope this policy applies to all Richman Investments employees, contractors, vendors and agents with a Richman Investments-owned or personally-owned computer or workstation used to connect to the Richman Investments network. This policy applies to remote access connections used to do work on behalf of Richman Investments, including reading or sending email and viewing intranet web resources. Remote access implementations that are covered by this policy include, but are not limited to: frame relay, DSL, ISDN, SSH, VPN, dial-in modems, and cable modems, etc.…

    • 438 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Assignment 4 Nt2580

    • 485 Words
    • 2 Pages

    1. Will be the responsibility of Richman Investments employees, affiliates, vendors and agents with remote access privileges to Richman Investment's corporate network to ensure that their remote access connection is given the same consideration as the user's on-site connection to Richman Investment.…

    • 485 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 2207 Words
    • 9 Pages

    They may even share their login id and password with others. It is better if the IT members create software which asks certain questions before they log into the data.…

    • 2207 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Richman Investment needs and new enterprise encryption strategy. This is for a more secure network. They are wanting to grow to 10,000 employees worldwide. Richman Investment wants to operate out of 20 different countries in the future. This is very easy to do but to have a secure network there are many things that would have to happen which will make this more difficult to do. Have a secure network takes a lot of work and has to be monitored 24 hours a day 7 days a week. There are many different ways to go about this topic the one I am going to pick is a public key infrastructure (PKI).…

    • 444 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Unit 9 Assignment 1

    • 582 Words
    • 2 Pages

    - Ensure compliance requirements of this policy concerning data at rest and role-holders access to managed networks, systems and servers…

    • 582 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Nt2580 Final Project

    • 1848 Words
    • 6 Pages

    Based on the premises that Richman has 5000 employees throughout the main office and several branch offices, this document dictates research solutions and details the appropriate access controls including policies, standards, and procedures that define who users are, what they can do, which resources they can access, and which operations they can perform on a system. |…

    • 1848 Words
    • 6 Pages
    Better Essays
  • Good Essays

    To secure the network and ensure a degree of protection from external intrusion, the first step is to ensure it is a private network and each host in the different remote locations is part of the private network; this minimizes the intrusion from public networks. Through the use of firewalls in the central computer network enforces authentication of all users in the network thus minimizing internal and external unauthorised access (Stallings, 2007).…

    • 349 Words
    • 2 Pages
    Good Essays
  • Good Essays

    You Decide Assignment

    • 755 Words
    • 4 Pages

    As a company grows , changes and new policies are created to fit the fast pace industry that we live in today. And as a part of your IT staff, I 've collected some information that can help the company, with implementing a new policy when it comes with computer use. From legal reasons, virus attacks, to our network systems and services, we all need to be aware and cautious about this as a whole. The material I 'll be covering today will include all of the issues brought up by our CEO, CFO, and General Manager. In addition, an explanation on general use ownership, security and proprietary information, and unacceptable use, will be discussed.…

    • 755 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The scope of this policy includes all users who have access to company-owned or company-provided computers or require access to the corporate network and/or systems. This policy applies not only to employees, but also to guests, contractors, and anyone requiring access to the corporate network. Public accesses to the company’s externally-reachable systems, such as its corporate website or public web applications, are specifically excluded from this policy.…

    • 1461 Words
    • 6 Pages
    Good Essays
  • Good Essays

    strong passwords and trend analysis to ensure only those authorized are able to access sensitive…

    • 3990 Words
    • 15 Pages
    Good Essays
  • Powerful Essays

    use software to block connections to web sites deemed off limits for employees. This is a…

    • 1201 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Remote access services are enabled on some but not all of the machines. SSH port open, attacker might try to access the SSH by bruteforcing. once the attacker cracked the SSH, they can conduct MITM for the remote access.…

    • 1647 Words
    • 7 Pages
    Powerful Essays