Security Requirements of the Organization

1046 Words3 Pages

Security requirements of the organization

First we will ensure that the system is physically secured. The room that will house the server will be in a secured area with multi-leveled security such as a keypad and additional locks. The room will have an air conditioner to ensure that the system remains cool and secured. Once the routers have been configured and secured, the next thing we will put in place is ACL list. This list would restrict movement and access to files that are not related to the job description. We will create restrictions that will apply to workstations and must have user authentication. Once the authentication is successful, those restrictions are then applied as Registry settings providing an efficient way to mange a large number of computers. This will ensure that the integrity of data and network are secure. A set of permissions will be added to the files for the Teachers, Nurse and the Students restricting only to them what they need to perform their duties. These controls will give permission as to what operations they can perform such as shared files and printers.

The Key Individuals who should have access to your system

One of the key people would be the IT person. He / She will maintain the systems integrity and will take care of all patches and upgrades as required. The other people would be the Head Administrator.

Proposed security policies for your new system

The security policy will introduce what is and is not acceptable use of the schools equipment and its network. There will be in-serviced on the security matters that can bring down the system. The policy will state how social networking can have serious threats to the integrity of the system. Employees will also be ma...

... middle of paper ...

...he assets. All Stakeholders, Admin, and all IT personnel would be participating in the policy making for the internet usage. All pros and cons will be clearly spelled out and given to the in-house IT to train the staff.

Works Cited

Emmett Dulaney CompTIA Security 4th Edition www.comptia security pg.229,

Retrieved June 20th,2011

http://www.itl.nist.gov/lab/bulletns/bltndec03.htm

Jonathan Strickland http://electronics.howstuffworks.com/how-to-tech/how-to-secure-home-network1.htm, Retrieved June 24, 2011

http://searchsecurity.techtarget.com/tip/0,289483,sid14_gci1068906,00.html

Karygiannis, Tom and Owens, Les. "Wireless Network Security." National Institute of Standards and Technology. November 2002, Retrieved June 24, 2011

www.blackmagic.com Protective software, Retrieved June 24, 2011

Access Control www.sans.org/access control June 23, 2011

Open Document