Premium Essay

Nt2580 Project Part 1

In:

Submitted By TurboLancer7
Words 517
Pages 3
1. Network firewall
The first line of defense against unwelcomed users would surely be the firewall. At one point, the use of dual firewalls from different vendors was all the rage, but DMZ is more popular today. There are actually a few different types of firewall implementations. For example, consumer-grade routers typically make use of Network Address Translation (NAT), because the identity of hosts is complicated, NAT is often said to offer firewall capabilities.
2. Virtual Private Network
Employees who need to access company resources from unsecured locations such as public Wi-Fi hotspots are a mainly exposed group. A VPN channels all network traffic through an encrypted channel back to the trusted corporate network. VPN’s can be complex and is costly to support due to the overheads of authentication, processing and bandwidth.
3. IDS and IPS
An intrusion detection system (IDS) is a network-centric strategy that involves monitoring traffic for suspicious activities that may indicate that the corporate network has been compromised. This may require the detection of port scans being created from within the network or excessive attempts to log into a server. The intrusion prevention system (IPS) is usually deployed in-line in order to actively prevent or block intrusions as they are detected. A specific IP address could be automatically blocked.

4. Malware Detection
Malware scanning performed on client devices relies on the processing capabilities of individual devices to check for threats. Given that most malware infestations are a direct result of a user action, the typical anti-malware package has also evolved into complete suites that attempt to offer protection against multiple threat vectors. Malware products specifically optimized for servers are also available, but they are not as popular.
5. Whitelisting
Whitelisting is an anti-malware defense

Similar Documents

Free Essay

Project Part 1 Nt2580

...Multi-Layered Security Plan The general IT Infrastructure has seven layers: User Domain, Workstation Domain, LAN Domain, LAN-to-WAN Domain, WAN Domain, Remote Access Domain, and the System/Application Domain. All of the different layers are different aspects of your network that need to be protected against malicious attacks and vulnerabilities. In the following I have highlighted each domain and my best suggestions for security solutions. Starting with the user domain the most important thing here is to make sure that all users are trained and knowledgeable of acceptable usage of the equipment at work and their access to the employer’s network. The best way is to train them on an acceptable use policy (AUP) which outlines the dos and don’ts of using software application, email and web-access, along with their access to physical equipment. This policy should not only out line all of the above but it should also have an outline of disciplinary actions as well so the employees take the training seriously. They should also have each employee sign the AUP to recognize that they have read and understand what it means and what is expected of them. The workstation domain is where you need to start implementing login ID’s and passwords for all users and visitors. This helps to validate anyone who needs access to the systems to make sure that they have the credentials to login and also to provide the information to the system of what level of access they can have. For example,...

Words: 1187 - Pages: 5

Premium Essay

Nt2580- Project Part 1

...Project Part 1 Multi-Layered Security Plan Outline The following outline is to document the general security solutions for Richman investments, for all locations including head-quarters, for the safety of data and information that belongs to Richman Investments. This plan will be updated and submitted, every month by the networking division, to senior management along with a security plan for the month. 1. User Domain a. This Domain includes Individuals within an organization who access its information. b. An acceptable use policy to define what users can and cannot do with company IT information will be created. c. Managers should review security awareness training and review acceptable use policies with employees periodically. d. Internal CD drives and USB ports will be disabled. e. Content filtering and antivirus scanning on any downloaded media, and emails will be setup. f. Restrict access for users to only applications, data and systems needed to perform their job. g. Monitor and track employee behavior and their use of IT infrastructure during off hours. 2. Workstation Domain a. Systems where most users connect to the IT infrastructure. i. Workstations can be any desktop, laptop, or other device that connects to an organizations network. b. Password protection on all workstations. c. Auto screen lockout for inactive times. d. Strict access control procedures, standards, policies, and guidelines. e. All CD, DVD, and USB ports will be disabled. ...

Words: 779 - Pages: 4

Premium Essay

Nt2580:Project Part 1

...The following is a multi-layered security plan outline for Richmond Investments that will address general security solutions for the safety of the company’s data and information. The outline will state recommended security solutions for each of the seven domains of the IT infrastructure. User Domain One of the most common vulnerabilities within the User domain is the lack of awareness or concern for employees towards the security policies of the company. To minimize this vulnerability Richmond investment is requiring that all company employees participate in a mandatory refresh security awareness training every four months. These mandatory refresh classes are aimed at educating employees regarding the best practices for opening email, password creation, reminding employees of security policies that might have been overlooked the first time they received their training, and other policies that ultimately can help prevent malicious threats. Workstation Domain The most common vulnerabilities in the workstation domain include unauthorized user access, weaknesses in the software currently installed, and possible introduction to malicious software. To help minimize the risk of unauthorized access, the company will enable password protection on all the devices and recommend that all users lock the computers every time they step of the workstation. In addition, the company’s network administrator will be responsible to keep all software and applications up to date with the latest...

Words: 725 - Pages: 3

Premium Essay

Nt2580 Project Part 1

...This outline will, in brief, give some context to the security plan for Richman Investments’ overall IT infrastructure. The best security, is a proactive, multilayer approach that takes into account the various domains of our network. This a brief outline of the various types of solutions that will begin to mitigate to minimize our risks and vulnerabilities. Multi-layer security plan. This will detail the many areas of vulnerability and risk that will be mitigated by the various security strategies that will be implemented through the seven domain layers of our IT infrastructure. 1. User a. Education – use of strong passwords, locking work stations b. restrict access to critical user files only – principle of least privilege 2. Workstation a. Access control – password protected workstations and auto screen locking b. Antivirus-Strong, automatic programs that scan for threats 3. LAN a. Physical security – All wiring closets and server rooms should be locked b. Set up encryption between workstations and wireless access points. 4. LAN to WAN a. Disable unused ports, ping, and port scanning on exterior devices b. Strict zero-day policy for patching c. Strict security monitoring for intrusion detection Tyler Straub 3 5. WAN a. Use encryption and VPN tunnels to secure sensitive data on the internet b. Use anti-virus to scan all e-mails for malicious attachments 6. Remote access a. Encrypt all...

Words: 345 - Pages: 2

Premium Essay

Nt2580 Project Part 1

...PART 1 The following document outlines Richman Investments security measures for IT infrastructure. There are many components that make up the Richman Investments network, and so there should be a multi-layered security solution to protect it. The server room has been located in the central part of the building, and will be physically protected by electronic door locks with keypad combination access. There are a limited number of personnel who will have access to this room in order to decrease the potential for tampering. Each of these personnel will have their own access code, and a digital log will be kept of all access. All of the servers will be virtual, and a backup of each server will be refreshed weekly and saved to cloud storage. All company data will be backed up and saved to cloud storage daily. All users requiring remote access will have a VPN set up with strict login requirements. These users will also have their laptops checked by the IT department on a monthly basis to ensure that they are in compliance with company security policy. Access to the company network will be secured by multiple firewalls set up with our routers. Firewall filters will be set up with a specific list of allowed users and programs. All other traffic will be blocked by default until it has been approved by IT. There will be a limited number of wireless access points around the building, with password access. These passwords will be changed on a regular basis. Access to...

Words: 353 - Pages: 2

Premium Essay

Nt2580 Week 1

...ITT Technical Institute 3825 West Cheyenne Avenue, Suite 600 North Las Vegas, Nevada 89032 NT2580 Introduction to Information Security Week 1, Unit 1 – Information Systems Security Fundamentals Class Plan Time Duration: This Class Period will be approximately 4 ¾ Hours in length. It will be divided 2 ¾ hours for Theory and 2 ½ hours for Lab. Content Covered: • Textbook o Chapter 1 - Information Systems Security Objectives: After completing this unit, the student should be able to: • Explain the concepts of information systems security (ISS) as applied to an IT infrastructure. Key Concepts: ▪ Confidentiality, integrity, and availability (CIA) concepts ▪ Layered security solutions implemented for the seven domains of a typical IT infrastructure ▪ Common threats for each of the seven domains ▪ IT security policy framework ▪ Impact of data classification standard on the seven domains Materials: Week 1 PowerPoint Presentation Assignment Overview: Refer to Assignment 1: Match Risks/Threats to Solutions in the Graded Assignment Requirements section of this instructor guide. In this assignment, the students need to match common risks or threats within the seven domains of a typical IT infrastructure with the possible solutions or preventative actions. Use the hand out worksheet NT2580.U1.WS1.doc. Refer to Assignment 2: Impact of a Data Classification Standard, you must write a brief report...

Words: 530 - Pages: 3

Premium Essay

Security

...Project Part 1 Multi-Layered Security Plan | NT2580 | | James Maus | 8/21/2015 | In the process of emerging a mulit-layered security plan, you will need to see the seven domains of the IT set-up. The security will be increased on each of the domains. Security increase on the seven domains increases complete security of the system and build a mulit-layered security plan. Only the users can negotiate the system in the user domain. Easy passwords can cause a lot of problems so we will need to use difficult passwords with eight characters and up. Passwords will include special characters with capitals and lowercase. A limit to how long you can use the password and to only a one time password use. Workstations will have antivirus and malware protection installed. Since laptops are very weak and easy to get lost or stolen, the companies will have a converted hard drive so only the owner can recover the data. On the LAN domain, you should never open any scam emails when on company systems. To reduce email malware, you should add spam filters to stop junk email and reduce employee mistakes. On the LAN to WAN domain, we should switch the FTP to secure FTP so only our suers can have access to the FTP server. On the WAN domain there should be firewalls put in place on the network to filter inbound traffic. In the case of the Richman investments, network of\ any kind of traffic that is coming in and out is not needed will be stopped by a firewall. Reference Courtesy of...

Words: 444 - Pages: 2

Premium Essay

Multi-Level Security Plan

...Project Part 1: Multi-Layered Security Plan When creating a multi-layered security plan, I would look at all seven domains of the IT infrastructure and then increase the security on each of those domains because that will increase the security for the whole plan. In the user domain, this is the quickest way for the system to be compromised the users. So I would implement complex passwords including eight or more characters, both upper and lower case, and use of at least one special character. Passwords will also need to be changed every 90 days and the same password cannot be used again for three calendar years. In the workstation domain, I would make sure that each workstations, whether desktop or laptop has some security on it like antivirus and malware protection installed. Laptops can be very vulnerable for loss or theft, which would make me install an encrypted hard drive so if it is stolen the data can only be retrieved by the owner. For the LAN domain, just train all users about email scams. I would guess that most users know not to access suspicious emails when on our system but I would still implement to the users a quick training course. Then I we should add spam filters this will help get rid of most of the junk email. In the LAN-to-WAN domain, we need to shut down the File Transfer Protocol (FTP) server we have running and switch it over to use secure FTP so that only users allowed on our system can access our FTP server. In the WAN domain, we...

Words: 461 - Pages: 2

Premium Essay

Project Part 2 Student Sscp® Domain Research Paper

...Project Part 2 Student SSCP® Domain Research Paper NT2580 Introduction to Information Security May 20, 2013 Security Operations means the process of identifying critical information and subsequently analyzing friendly actions attendant to military operations and other activities to: a. identify those actions that can be observed by adversary intelligence systems; b. determine indicators that hostile intelligence systems might obtain that could be interpreted or pieced together to derive critical information in time to be useful to adversaries; and c. select and execute measures that eliminate or reduce to an acceptable level the vulnerabilities of friendly actions to adversary exploitation. [1] The need to connect and collaborate with partners, suppliers, customers, and employees anytime and anywhere has increased the difficulty of managing network and systems security. Organizations are challenged with the difficult and overwhelming task of securing and managing network systems, and keeping their desktops and servers up to date. Organizations want easy and efficient ways to maintain network security, manage updates, and, at the same time, reduce total costs for security management. When addressing security management and operations, administrators need to consider the following: • Security: Employees not only work from corporate offices, but from branch offices, home offices, or from the road. Managing access policies...

Words: 536 - Pages: 3

Premium Essay

Unit 8 Lab Questions

...Richard Bailey Unit 8 lab 8.1 August 19, 2013 NT2580 Introduction to Information Security 1. So you can find the weekness and fix before it can be implamented on the server and goes live. 2. A reflective XSS attack a type of computer security vulnerability. It involves the web application dynamically generating a response using non-sanitized data from the client. Scripts, like JavaScript or VB Script, in the data sent to the server will send back a page with the script. 3. SQL Injections can be used to enter the database with administrator rights.  Best way to avoid this is using Java in websites. 4. methods, including character scrambling and masking, numeric variance and nulling, rely on an array of built-in SQL Server system functions that are used for string manipulation. 5. Well co-ordinated and regulary audited security checks is the best way forword. 6. . There has been considerable debate comparing the security attributes of open source and proprietary software (Anderson, 2002). However, for a careful interpretation of the data, rigorous quantitative modeling methods are needed. The likelihood of a system being compromised depends on the probability that a newly discovered vulnerability will be exploited. Thus, the risk is better represented by the vulnerabilities which are not yet discovered and the vulnerability discovery rate rather than by the vulnerabilities that have been already discovered in the past and remedied by patches. ...

Words: 489 - Pages: 2

Premium Essay

Multi-Layered Security Plan

...NT2580 Introduction to information security | 7 Domain of IT Infrastructure Security Plan | Project Part 1 | | | [Pick the date] | As described by Tipton and Henry, information security management establishes the foundation for a comprehensive security program to ensure the protection of an organization's information assets. Security management encompasses the administrative, technical, and physical controls necessary to adequately protect the confidentiality, integrity, and availability of the information assets in the IT Infrastructure. Each one of the domain of the typical IT Infrastructure needs a proper security controls to ensure the confidentiality, integrity, and availability (CIA Triad). The following are the overview of the seven Domains: User Domain This is the domain of users that access systems, application, and data. It is the information asset of the organization that will be available to a rightful user by authenticating the user by the acceptable use policy (AUP). It is also define that the user is the weakest link in an IT infrastructure, but by educating user of the sensitivity of the IT infrastructure in the security awareness, security control shall be enforced. Security control to this domain can also be enforced by defining and implement the user policy of the IT infrastructure. Workstation Domain This is the domain where users first connect to the IT infrastructure. Because of numerous threats, it is necessary to implement...

Words: 889 - Pages: 4

Free Essay

Nt2580 Final Project

...Richman Investments | Richman Internet Infrastructure Security Management Upgrade | ITT Technical Institute NT2580 Course Project | | Jason R Spitler | 5/30/2014 | Based on the premises that Richman has 5000 employees throughout the main office and several branch offices, this document dictates research solutions and details the appropriate access controls including policies, standards, and procedures that define who users are, what they can do, which resources they can access, and which operations they can perform on a system. | Final Project I. Richman Internet Infrastructure Security Management Upgrade A. Purpose Based on the premises that Richman has 5000 employees throughout the main office and several branch offices, this document dictates research solutions and details the appropriate access controls including policies, standards, and procedures that define who users are, what they can do, which resources they can access, and which operations they can perform on a system. II. Basic Authentication Procedures and Standards, (Who users are.) A. Trinity-Three-factor Authentication Method replaces Basic Authentication It is my view the Administrator’s responsibility is to provide secure communications by adding layers of security at all levels to assure the amount of protection for company’s valuable assets. Richman will provide its employees a new method of authentication I call Trinity. It is a three-factor authentication method requiring updated laptops...

Words: 1901 - Pages: 8

Premium Essay

Project 1

...Project Part 1: Multi-Layered Security Plan Loren Miller NT2580 Monday PM Introduction: Describe each layer of the Open System Interconnection (OSI) Model. List a security feature of each layer if it applies. List the protocol of each layer if it applies. List types of attacks that are you protecting against in each layer. Your goal is to be able to protect a web hosting company that has a global presence. This web hosting company supports customers in the following industries: Medical, Financial, and Governmental. Physical Layer: The Physical Layer defines the physical properties of the network, such as voltage levels, cable types, and interface pins (Baker). Any attack on the Physical Layer would have to be some type of physical action, like disrupting a power source, changing of interface pins, or cutting the actual cables. Simply tampering with someone’s fuse box outside their office can cause a disruption of service. Faulty power is a problem that can be caused accidentally by the power company, or intentionally by your competitor tampering with the fuse box. A smaller business may consider installing an Uninterrupted Power Supply (UPS) which may help avoid many unrecoverable power associated problems. The addition of a UPS to your critical system will give you time to perform an orderly shutdown when power is interrupted. An abrupt termination of power to any electrical equipment has potential for great damage. Much in the same way you might protect your home...

Words: 1467 - Pages: 6

Premium Essay

Nt 1210

...circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1210 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College Mathematics I MA1310 College Mathematics II Networking Technology Courses Programming...

Words: 4400 - Pages: 18

Premium Essay

Nt1210 Introduction to Networking Onsite Course

...circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1210 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College Mathematics I MA1310 College Mathematics II Networking Technology Courses Programming...

Words: 4400 - Pages: 18