IT Security Proposal Paper, computer science homework help

User Generated

fc0gqvmmyr

Computer Science

Description

ZXY Corporation has relocated to a new building that was wired and set up for a local area network (LAN). The company implemented a client/server-based network in which all printers, folders, and other resources are shared but everyone has access to everything and there is no security outside of the defaults that were in place when the system was set up.

You have been hired to secure ZXY’s network and ensure that the company has the highest levels of security to protect against internal and external attacks. In an 8-10 page proposal, include the following items to provide a comprehensive secure environment:

  1. A plan to provide secure access control methods for all user access
  2. A viable password policy, which includes complexity, duration, and history requirements
  3. A cryptography method to ensure vital data is encrypted
  4. A remote access plan to ensure that users who access the network remotely do so in a secure and efficient manner
  5. A thorough plan to protect the network from malware and various types of malicious attacks

Your proposal should include all of the elements noted above with support, detail, and elaboration for each section explicitly grounded in knowledge from the assigned readings and media along with any outside sources you may choose to bring into your writing.

Your paper should be 8-10 pages in length with document formatting and citations of sources in conformity with CSU-Global Guide to Writing and APA Requirements.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: IT SECURITY PROPOSAL
1

IT Security Proposal For The Local Area Network
Name
Course
Institution
Date

Running head: IT SECURITY PROPOSAL
2
IT Security Proposal for the Local Area Network
In essence, the current organizational environment, the diverse techniques of access like
the Gigabit wired associations, the fast broadband access, efficient remote accessibility of the
respective remote systems and different access areas has driven the requirement for new and
effective administrations of the systems. Versatile and remote access to the organizational assets
is critical for the productivity and profitability of the business. Nonetheless, large scale
arrangements of remote correspondences proliferate new security and execution requests.
Therefore, in such domains, the management must confront an always developing need for
shielding the basic organization’s assets and systems from network assaults. Controlled access to
the company’s resources in light of the client personality, as well as customer gadgets are a part
of the top security priorities for these issues.
The Potential Challenges
The relocation of ZXY Corporation to a new building that was wired and set up for a
local area network (LAN) and the company’s implementation of a client/server-based network in
which all printers, folders, and other resources are shared but everyone has access to everything
and there is no security outside of the defaults that were in place when the system was set up,
present numerous security challenges to the organization. The move puts the corporation in need
for developing proper system security and to enhance the security techniques for every entrance
situation. Therefore, there is need for superior options for securing client access and execution
necessities. The essential security prerequisites consist of:


Verification of client certifications as well as administrations to manage client access.

Running head: IT SECURITY PROPOSAL
3


Client authentication monitors that are made up of endpoint safety checks, and of
diverting clients to the pre-defined sub-nets to download files that are consistently hostile
to infectious programming as well as firewalls working frameworks overhauls and fixes.



Relevant firewall guidelines, for example the “granular access control” and the parcel
separating in light of convention ports and destinations.

The clients have access to the corporate resources from different end-points. Accordingly, the
security components access procedures need to be free of client access techniques, for instance,
the remote inside LAN remote access points.
Attributes of Local Area Network Access
A bound-together approach is indeed appealing. However, it must be able to address the
distinctive qualities of the inward remote access techniques. The following segments outlay the
attributes of every entrance system.
The interior Local Area Network Access
For this paper, the wired system inside of the corporation building will be referred to as
an interior LAN. The interior LANs are essentially considered to be more secure than the remote
access systems, but opening up the interior LAN to the clients presents security issue...


Anonymous
Great content here. Definitely a returning customer.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags