Most people in the security field agree that good security policies are necessary to keep intruders out and keep the users along with the information on their network safe. The best way to do this is to have some kind of written security policy. This policy should be made available for anyone to see and read so they have a better understanding on what their part is when it comes to information security. To think that security professionals can handle this task alone would be foolish, it is up to everyone to have good security practices and follow then at all times.
To fully protect any network there are some key areas that should be looked at keenly to see if security procedures are being followed or if a security person will need to take a closer look at:
1. Security Accountability – often times too many there is always confusion about who is going to be responsible for what. When it comes to matters of security there should be a clear outline on who is responsible for what area. This will ensure that people know who to go to when there is a security related incident and can also help to make sure that area of responsibility is taken care of and not being neglected. R...
... middle of paper ...
...ine what is considered acceptable use and non-acceptable use. After reading this document every user should be required to sign and acknowledge they understand what the document has outlined for them.
5. Training – Because we as people tend to forget things there should be training provided to each employee. The training should be conducted when a person first joins the organizations along with refresher courses offered every quarter.
Finally security policies should form the foundation of your organization while providing a detailed outline on what should be expected to secure your network. Policies must be effective enough to secure your network but not so restrictive that it will impede your users from doing anything. Having an effective security policy in place will help to reduce any kind of attacks that may be encountered on an unprotected network.
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- ... Also again with coaxial cable, there are two types of cables, there is a thick coaxial cable which is also called thicknet and a thin coaxial cable which is also called thinnet. An example of coaxial cables is the ones most cable companies use, like Cox, direct TV and etc. With the thick cable which is the thicknet, one can use the maximum segment length of 500meters and the thin coaxial cable which is the thinnet length of a max is 200meters. There is also a fiber Optic cabling which transmits light rather than electronic signals.... [tags: attacks, protections, internet]
3428 words (9.8 pages)
- INTRODUCTION Security implementations within networks are multi-tiered and can be applied in a number of different ways in order to mitigate a wide array of security risks. A network administrator needs to investigate possible security breaches from within and without the network in order to know what to try to avoid. However, too much security can impede the performance of the network. So, a network administrator must decide what types and how much security is reasonable to avoid stolen data or other network intrusions.... [tags: OSI model, Ethernet, Address Resolution Protocol]
1666 words (4.8 pages)
- We have conducted an audit of the Network Security Audit. This audit was conducted under the authority of Article VII, Section 5 of the Garland City Charter and in accordance with the Annual Audit Plan approved by the Garland City Council. Objective The objective of this audit is to: A. Provide management with an independent assessment relating to the effectiveness of physical controls in place to prevent unauthorized access to sensitive material. B. Provide management with an evaluation of the IT’s administrative controls that sets tone of an organization, influencing the controls consciousness of its people.... [tags: Security, Information security, Computer security]
1335 words (3.8 pages)
- Networking is a norm in many corporate based institutions in modern society. Computerized applications, software and communication has been greatly deployed to foster service delivery in the organizations. Despite the many merits tied to networking, it poses some threats that can proof costly if not handled professionally. Good news is that there are measures that can be adopted to form a robust computer network system that will ensure minimal or no intrusion by any assailants. This paper seeks to explore a number of factors indicative of weak computer networking system, and various measures to plan and enable stern security.... [tags: cyber crime, cyber security]
2848 words (8.1 pages)
- Identify Security Measures Which Address These Threats and Vulnerabilities Any network is vulnerable at its weakest point and perpetrators will try to get in any way that they can. Some just to see if they can and others for manipulated personal gain. Security measures, policy and procedures are written and tailored to meet the specific needs of an organization. Security tools are installed on networks to keep out cyber criminals. Vulnerability is a weakness in a security system. A threat is a set of circumstances that has the potential to cause loss or harm.... [tags: Internet Security ]
1138 words (3.3 pages)
- Introduction This paper will present to the Northcentral University Information Technology Supervisor research in the form of a report that will assist with determining the controls required to implement to ensure that data are secure for the university. This paper will summarize the security breaches of the Target Store Corporation over the previous year and make recommendations in the form of information technology security best practices to strengthen the University’s infrastructure. Summarize Major Security Breaches The Target Corporation was exploited in December 2013 and then again in 2015.... [tags: Computer security, Information security]
801 words (2.3 pages)
- The security manager will review and update all policies in regards to any federal regulations or other best practices and regulations on a quarterly basis to ensure we are in compliance with all necessary laws and acts. Doing this quarterly allows us to identify any weak points or violations quickly in order to correct them and harden our security policy continuously. With all aspects of our IT security policy, we are continuously looking for ways to improve our existing security infrastructure.... [tags: Security, Computer security, Risk]
1119 words (3.2 pages)
- Starting from left to right on the diagram, I will discuss the security policies related to the Data Center/Server Farm/Network Security and assuring information confidentiality, integrity and authorized accessibility, followed by the mechanisms necessary to implement the aforementioned policies. Secure remote access must be implemented; no remote access for administrators. Authorized Users shall protect their login and password, even from family members. It is the responsibility of employees with VPN privileges to ensure that unauthorized users are not allowed access to our internal networks.... [tags: Security, Computer security, Access control]
1061 words (3 pages)
- Introduction The first thing that we must consider about Information Security is that there is not a final destination at which we can arrive. IT Security is an ongoing set of processes and activities that requires attention and expertise on a daily basis. It is important to understand that systems are not secured by themselves and it is our responsibility to maintain and improve them periodically as required. It is of vital importance to establish the appropriate mechanisms and requirements in order to support the company’s CIA triad.... [tags: IT Security]
2693 words (7.7 pages)
- ABSTRACT : This paper describes the basic threats to the network security and the basic issues of interest for designing a secure network. it describes the important aspects of network security. A secure network is one which is free of unauthorized entries and hackers INTRODUCTION Over the past few years, Internet-enabled business, or e-business, has drastically improved efficiency and revenue growth. E-business applications such as e-commerce, supply-chain management, and remote access allow companies to streamline processes, lower operating costs, and increase customer satisfaction.... [tags: Networks Telecommunications]
1526 words (4.4 pages)