Security requirements of the organization
First we will ensure that the system is physically secured. The room that will house the server will be in a secured area with multi-leveled security such as a keypad and additional locks. The room will have an air conditioner to ensure that the system remains cool and secured. Once the routers have been configured and secured, the next thing we will put in place is ACL list. This list would restrict movement and access to files that are not related to the job description. We will create restrictions that will apply to workstations and must have user authentication. Once the authentication is successful, those restrictions are then applied as Registry settings providing an efficient way to mange a large number of computers. This will ensure that the integrity of data and network are secure. A set of permissions will be added to the files for the Teachers, Nurse and the Students restricting only to them what they need to perform their duties. These controls will give permission as to what operations they can perform such as shared files and printers.
The Key Individuals who should have access to your system
One of the key people would be the IT person. He / She will maintain the systems integrity and will take care of all patches and upgrades as required. The other people would be the Head Administrator.
Proposed security policies for your new system
The security policy will introduce what is and is not acceptable use of the schools equipment and its network. There will be in-serviced on the security matters that can bring down the system. The policy will state how social networking can have serious threats to the integrity of the system. Employees will also be ma...
... middle of paper ...
...he assets. All Stakeholders, Admin, and all IT personnel would be participating in the policy making for the internet usage. All pros and cons will be clearly spelled out and given to the in-house IT to train the staff.
Works Cited
Emmett Dulaney CompTIA Security 4th Edition www.comptia security pg.229,
Retrieved June 20th,2011
http://www.itl.nist.gov/lab/bulletns/bltndec03.htm
Jonathan Strickland http://electronics.howstuffworks.com/how-to-tech/how-to-secure-home-network1.htm, Retrieved June 24, 2011
http://searchsecurity.techtarget.com/tip/0,289483,sid14_gci1068906,00.html
Karygiannis, Tom and Owens, Les. "Wireless Network Security." National Institute of Standards and Technology. November 2002, Retrieved June 24, 2011
www.blackmagic.com Protective software, Retrieved June 24, 2011
Access Control www.sans.org/access control June 23, 2011
The topic for week 3 of Computer Ethics was based upon an IT security policy in relation to a company’s ethics. The discussion board began with how training as well as education needs to be implemented throughout the business to ensure confidential information is not sent out without encryption or following other procedures put in place. This not only maintains the integrity of the company, but also makes the employees accountable as well. This can be accomplished by a well defined security policy and procedures which outlines the plan of action and the implementation. Many agreed a well documented plan needs to be kept updated as well as conveyed to the rest of the staff so everyone knows what their role is. In addition, Dawan pointed out that a security policy is a “living document” which is one that is forever changing to try and keep up with hackers. Many also agreed it is imperative everyone in the organization needs to be trained on the security policies at an organization.
All of the Cisco Wireless Ap’s would be configured with a dedicated SSID which will help provide separate connection to the students and guests. As such, the faculty would have access to a secure login which would not be made available to the students, while the students have a different login interface. All of them would be registered in a secure database. Administrators would be able to add students to the existing database and register their machines and provide them with the required ID and password. In order to ensure that there is no rogue or unauthorized person connected to the network, CCA and the CSA or the Cisco Secure Agent would be implemented (Neil Anderson, 2008). They would regularly scan the client’s device to make sure that only authorized persons are connected. Apart from this, the wireless connection on the access points would be protected by WPA2
Sabu M. Thampi, Pradeep K. Atrey, Chun I. Fan, Gregorio Martinez Perez (Eds.), Security in Computing and Communications: International Symposium, SSCC 2013, Mysore, India, August 22-24, 2013. Proceedings (Communications in Computer and Information Science) (p. 418). New York, NY: Springer Publishing.
Digital technology offers students a false sense of security by providing cyber-walls to hide behind. Social media provides student the sense of being alone. However the reality is they are visible t...
In “Youthful Indiscretions: Should Colleges Protect Social Network Users from Themselves and Others?” Dana Fleming presents an essay concerning the safety of social networking sites and how Universities can deal and prevent problems. This article is targeted towards school administrators, faculty, and a social networking user audience who will either agree or disagree with her statement. I believe Fleming presents an excellent, substantial case for why she reasons the way she does. Fleming gives a sound, logical argument according to Toulmin’s Schema. This essay has an evident enthymeme, which has a claim and reasons why she believes in that way. Toulmin refers to this as “grounds."
Earle, Aaron E. Wireless Security Handbook. Boca Raton, FL: Auerbach, 2006. Http://www.infosectoday.com/. Web. 19 Oct. 2014.
...work Security Article). With this given information in the essay, is a great start to learn how to keep your network secure. This is only a small part of the prevention of infiltration of your network and computer. If one desires to learn more, go above and beyond and continue to learn on how to keep your network secure.
There are numerous network security devices and tools available to aid in computer network defense, and these tools are often relied upon for protecting against increasingly sophisticated, stealthy, and damaging attacks. When acting alone, the current generation of security devices has an exceedingly difficult time providing an effective defense against such threats, and the situation is particularly grim for targeted or novel attacks.
soley responsible for everything from orchestrating, installing, monitoring and maintaining performance, to the backup and recuperation plans for the database. Albeit some of these
Social medias have become a big part of our society now, they are being used in all aspects of our life. We are connected twenty-four hours a day, at work, school, home, shopping etc. There is a necessity, a need to be connected to these social media’s, to feel like you are a part of society. With these growing numbers in being connected to social media’s on the web, there comes a growing desire for privacy and safety. In this paper I will discuss and analyze the social media’s themselves, the dangers that arise from them, and how all these correlate to privacy.
ABSTRACT : This paper describes the basic threats to the network security and the basic issues of interest in designing a secure network. it describes the important aspects of network security. A secure network is one which is free of unauthorized entries and hackers. INTRODUCTION
...izational hierarchy and available for inspection by on the company’s intranet. This would provide all employees with an opportunity to contribute solutions that address customer problems.
This paper is going to discuss wireless security from a broad view where I will go into why exactly wireless security is so important especially today as the ways in which we are communicating is changing dramatically. From there I will discuss the multiple wireless securities that are available to give a better understanding of the options given. Then I will go into why exactly not protecting your wireless can be so dangerous with some descriptions on the most dangerous wireless attacks out there today. Finally I will then discuss how we can better prepare for these types of attacks with a synopsis on several effective security methods that will help to ensure data is securely passed and kept hidden.
The Internet has revolutionized the computer and communications world like nothing before. The Internet enables communication and transmission of data between computers at different locations. The Internet is a computer application that connects tens of thousands of interconnected computer networks that include 1.7 million host computers around the world. The basis of connecting all these computers together is by the use of ordinary telephone wires. Users are then directly joined to other computer users at there own will for a small connection fee per month. The connection conveniently includes unlimited access to over a million web sites twenty-four hours a day, seven days a week. There are many reasons why the Internet is important these reasons include: The net adapts to damage and error, data travels at 2/3 the speed of light on copper and fiber, the internet provides the same functionality to everyone, the net is the fastest growing technology ever, the net promotes freedom of speech, the net is digital, and can correct errors. Connecting to the Internet cost the taxpayer little or nothing, since each node was independent, and had to handle its own financing and its own technical requirements.
The agreement between the company and I was to advice the company management toward adopting the best network management plan and security plan. Through the study, I carried out in the firm I was required to evaluate the firm requirement in term of network planning and making sure that the firm has proper mechanism to secure its systems against malicious damage. Considering that, the management personnel have background in IT therefore; they required me to give an expert opinion on the best ways in which they can adopt the network management and the security plan. They required me to evaluate firm needs and what the IT world would offer the firm to enable them to lay down plans for the network and security in the firm.