Project Part 1 Variable Layered Protection P Essay

п»ї

Multi-Layered Security Strategy

By

Daniel P. Medina

[email protected] com

Student ID#: 13953944

Associate of Technology degree in Network Devices Administration

Paper posted in incomplete fulfillment in the requirements intended for NT 2580 Fundamentals info Security

ITT Technical Start – Clovis CA

10/15/13

To: Supervisor, Mr. Johnson

From: Intern, Daniel Medina

I have assembled the Multi-Layered Security Plan that you asked for and I assume that these are the best courses of actions. These steps will begin in the end user domain and work up towards the remote get domain, providing suggestions to excercise our protection and the satisfaction of our clientele. 1 . Consumer Domain

a. Hold a user training session to see the employees of your user guidelines and right usage of workstations used within the company. To show them how to protect their particular user id's and passwords for their work stations such as not writing down security passwords, or be suspicious of people asking personal inquiries because they may be searching for the user identity and pass word. b. Auditing user activity will help by detecting just how users begin their daily routines within the company network. Doing this allows us to notice points that are misplaced, time, or simply failed attempts to access the workstations. We could also observe bandwidth consumption to see if anyone is downloading or streaming any files or music or what have you. Yet there are ways to keep that by happening inside the workstation website 2 . Workstation Domain

a. The Usage of malware and anti-virus programs may help control the any infected files which make their approach in by immediate quarantine or deletion of said files b. Have a strict coverage on accessing corporate data by placing permissions and enacting policies on the web servers themselves. Just letting certain individuals gain access to that data. c. Deactivate all multimedia ports to reduce the potential of malware or malware attacks. And therefore Most USB ports and all CD and card visitors will be disabled from make use of. 3. LAN Domain

a. Completely making use of network switches with the use of VLANs and other methods. b. WPA2 Encryptions to get Wireless Gain access to Points (WAPs) to secure cellular connections. Also establish a Digital Private Network (VPN) to ensure that those who need to access firm data, can do so securely c. Acquiring server bedrooms from unauthorized access with the addition of extra components of entry, including key playing cards, thumb designs, heavy duty combination locks, and other such protected equipment some. LAN to WAN Site

a. Final off abandoned ports with a firewall or perhaps on the swap itself to lower the chance of unwanted network access n. Monitor incoming IP traffic while especially looking for incoming transmissions that shows signs of malicious objective or invasion. c. Bring up to date all company and software program updates to put in security spots as well as O/S security updates. 5. WAN Domain

a. Enforce encryptions and VPN tunneling pertaining to remote connections as I include explained before. b. Change routers and network firewalls to block titled ping requests to minimize chance of 2 attacks c. Have and enforce anti virus scanning of email accessories

d. Isolate malicious application such as infections, worms, Trojan viruses, etc… when ever found elizabeth. Deployment of redundant online connections to maximize supply 6. Remote control Access Domain name

a. Make a strict end user password guidelines, as well as lock policies to protect against brute force problems. b. The implementation of tokens and have real-time lock procedures in the event token is usually lost or perhaps stolen. c. All hardricves will be encrypted throughout the organization, this includes pcs, laptops, and mobile unit to prevent loss in sensitive info.

I hope this plan fits the needs you have and if you may have any concerns feel free to email about any changes.

Really,

Daniel S. Medina

Innere

References

10 Ways to Apply Multi-Layered Security - Tips for Growth - Small and Method Business -- Guide to Growth - Dell...

References: 15 Ways to Put into practice Multi-Layered Protection - Guide to Growth - Small and Medium

Business - Tips for Growth -- Dell Community. (n. d. ). House - Dell Community.

Retrieved Oct 17, 2013, from http://en.community.dell.com/dell-groups/small-

business/b/smb/archive/2011/11/16/10-ways-to-implement-multi-layered-

security. aspx

Symantec, C. o. (n. d. ). How To: Build Multi-Layered Secureness | PCWorld. PCWorld -

Reports, tips and reviews from the experts on Computers, Windows, and more. Retrieved

October seventeen, 2013, coming from http://www.pcworld.com/article/141361/artic

Popular

 Sexual Topic in Syvai by Toni Morrison Essay
Sexual Topic in Syvai by Toni Morrison Essay

Toni Morrison doesn't include a strong lovemaking theme in Sula exclusively for shock worth. Rather, mcdougal uses sexual intercourse to reveal clues towards the personas of different personas…...

 Motivation and females Research Paper
Motivation and females Research Paper

п»ї INSPIRATION AND WOMEN LAUNCH Motivation can be an important motive to excel in one's personal life. In addition, it includes help social well being and influence…...

 Marketing Strategy pertaining to Kfc Essay
Marketing Strategy pertaining to Kfc Essay

Table of Contents Intro. 2 Marketplace Analysis pertaining to KFC. five THREATS OF KFC IN MAURITIUS. 18 Opportunities to develop and make the following…...

 Operations Function Essay
Operations Function Essay

п»їOperations Function: The operations management function contains a considerable impact on the top quality, cost and availability of a great organisation's services or goods. These, consequently, have an immediate…...