Preview

Security Implementation Plan Paper

Best Essays
Open Document
Open Document
4393 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Security Implementation Plan Paper
CS651-1203A-02 – Computer Systems Security Foundations Phase 5 IP
Security Implementation Plan – Aegis Technologies Group
Donald Hanlin
12 August 2012

Table of Contents Project Outline 4 Company Description: 4 Recognized Benefits: 4 Information Security Coverage 6 Risk Management: 6 Human Resources Security: 7 Physical Security: 8 Environmental Security: 8 Mobile Security: 9 Security Assessment 10 Risk Assessment: 10 1. Denial of Service Attacks 10 2. Phishing 10 3. Spoofing 11 4. Virus 11 5. Worm 12 Intrusion Detection and Prevention: 12 Access Control 14 Requirements: 14 1. Access Levels: 14 2. Access Groups: 14 Security Mechanisms: 15 1. Physical Security Mechanisms: 15 2. System
…show more content…
It checks for connection speed and static on the line to ascertain the best route for the packet to take to reach its destination. Acting as a gateway between networks, routers make sure that data is delivered to its proper destination. The second purpose of a router is to ensure that data does not go where it is not permitted. By acting as a virtual network traffic cop, routers keep data and specifically large files from being distributed to all machines on a network, which could potentially cripple the network (Hill, …show more content…
(2005). SSH, The Secure Shell: The Definitive Guide. Sebastopol, CA: O’Reilly Media, Inc.
Bradley, T. (2012). Protect Yourself From Phishing Scams. Retrieved July 23, 2012, from http://netsecurity.about.com/od/security101/a/phishprotect.htm
Buchanan, S. (2002). Digital Signatures and Public Key Encryption. Retrieved July 31, 2012, from http://afongen.com/writing/pke/
Business Dictionary (n.d.). Definition of Risk Management. Retrieved July 16, 2012, from http://www.businessdictionary.com/definition/risk-management.html Cisco (n.d.). Strategies to Protect Against Distributed Denial of Service (DDos) Attacks. Retrieved July 23, 2012, from http://www.cisco.com/en/US/tech/tk59/technologies_white
_paper09186a0080174a5b.shtml
Collins, J. (n.d.). Protection against viruses. Retrieved July 23, 2012, from http://www
.akamarketing.com/protection-against-viruses.html
Davis, T. (2012). Physical and Environmental Security (ISO 9). Retrieved July 17, 2012, from https://wiki.internet2.edu/confluence/display/itsg2/Physical+and+Environmental+
Security+%28ISO+9%29
Debian.org (2011). LDAP + Kerberos. Retrieved July 31, 2012, from http://wiki.debian.org/

You May Also Find These Documents Helpful

  • Satisfactory Essays

    In this Multi-Layered Security Plan, I will provide information on how to better improve the security of each domain and protect the data of Richman Investments. We shall secure all ports for incoming and outgoing traffic, only allowing the information that is needed through certain ports and to conduct business fast and efficiently. We will also be using the latest and most updated firewall protection and anti-virus software to add a better degree of security. This will be implemented throughout the entire company and we will inform all employees of this MLS plan.…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    • Your summary should be written in a concise and clear manner that summarizes your policy for readers.…

    • 470 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Due in Week Nine: Write 3 to 4 paragraphs giving a bottom-line summary of the specific measureable goals and objectives of the security plan, which can be implemented to define optimal security architecture for the selected business scenario.…

    • 4827 Words
    • 20 Pages
    Powerful Essays
  • Satisfactory Essays

    NT 2580 Introduction To Information Security Teacher : Mr. Timothy Tacker Unit 10 Assignment 1 Examine Real-World Applications of Security Standards ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++…

    • 493 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    For the recommendations on the tiered architecture I suggest three-tier architecture. This architecture is the most common. It consists of three tiers; a presentation tier, a logic tier, and a data tier…

    • 429 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    In the WAN domain, enforce encryption, and VPN tunneling for remote connections. Configure routers, and network firewalls to block Ping requests to reduce chance of Denial of Service attacks. Deployment of…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    This paperwork of IT 244 Week 1 Individual Introduction to the Information Security Policy Appendix C comprises:…

    • 396 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Over the past few years the economy in the United States has taken a downturn. It has been so bad, that some businesses were not able to survive. However, Microsoft Corporation (Microsoft) was not one of those companies. The fiscal strength of Microsoft played a large part in providing the company with the ability and resources to survive the difficult financial markets (Microsoft Corporation, 2009). As a result of the outstanding financial position of the company, Microsoft chose to implement a strategic planning initiative in which the company would repurchase its stock. The $40 billion program would result in increased quarterly dividends and a return to shareholders of close to $14 billion (Microsoft Corporation, 2009).…

    • 1336 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Often Information Technology Directors overlook that information security is more of a people issue rather than a technology issue. We rely heavily on people’s awareness, ethics and behavior, and an understanding of what they want to achieve is essential to accomplish the goals of business. This includes the employees that deliver services and the customers that take advantage of them, as well as the senior executives that outline the budgets.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Security Breach Plan Paper

    • 1576 Words
    • 7 Pages

    Patient privacy and security is one of the most important aspects of the St. Johns Hospital code of conduct, they take pride in the sound policies and procedures set to maintain customer confidentiality. Each employee is held to a high standard of maintaining the highest level of privacy and confidentiality when it comes to patient health information (PHI). This paper will outline the plan that St. John’s hospital has created in case of a security breach or security threat in the facility. The primary cause of a security breach is usually related to the people or business side of and organization (Rhoades, MBA, RHIA, CHPS, CPHIMS, FHIMA, 2009).…

    • 1576 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Safeguarding Case Study

    • 378 Words
    • 2 Pages

    Therefore, it is Chris’s duty as a teaching assistant to follow the procedures regarding suspected abuse.…

    • 378 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Nevidjon, B., Erickson, J. I., (2001). The nursing shortage: Solutions for the short and long…

    • 946 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Safeguarding Case Study

    • 615 Words
    • 3 Pages

    1. Leroy may be the victim of neglect as there is evidence that his parents are persistently failing to meet his basic physical and psychological needs and that this is likely to cause impairment to his health and development. HM Government (2006). Maccoby and Martin (1983) assert that a child may suffer neglect if that child’s needs form a low priority within the family unit. In addition to neglect, Leroy may well be the experiencing emotional abuse. Emotional abuse involves the “persistent maltreatment of a child such as to cause severe and persistent effect on their emotional development.” HM Government (2006:39). This may include conveying a feeling of worthlessness; being unloved; inappropriate expectations of a child’s ability or level of responsibility, which are out of kilter with that child’s age and stage and being witness to the maltreatment and abuse of others.…

    • 615 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The journey of quality improvement is a responsibility of all those involved in patient care. At The Women’s Hospital (TWH) at Saint Joseph East (SJE) it was decided that a change in culture would be needed and focus was directed on decreasing the length of stay (LOS) for maternity patients. Quality process improvement is a formal approach to the analysis of performance and systematic efforts through a team approach to improve the outcomes for patients and staff (Spath, 2013).…

    • 804 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    While both of the above elements of the question complement each other, without understanding the main purpose of security management, which is in itself is multifaceted in nature, and ideally to be successful should be employed throughout all aspects of a business, as can be seen…

    • 1598 Words
    • 7 Pages
    Powerful Essays