Premium Essay

Remote Access Policy Case Study

Submitted By
Words 697
Pages 3
1. Overview:
XYZ Health Care is a contributor of health facilities to older populations. Remote access is a vital part aspect of this organization. It runs services with the help of remote health assistants and nurses who visited the patients and at the end of the day need they need to connect back to our network. However, remote access applies from the unsecured network might create security vulnerabilities. To minimize the risk posed by these remote workers, XYZ Health Care came with the Remote Access Policy.

2. Purpose
This remote access policy is established to maintain criteria for connecting to XYZ's network (or any network operated by XYZ) from any host /entity. These standards are created to mitigate probable threats and vulnerabilities posed …show more content…
4.2. Requirements
4.2.1. Remote access must be strictly controlled by one-time password with strong passphrase and encryption (VPN technology).
4.2.2. There is no allowance for the authorized users of XYZ Heath care to provide their login or email credentials to anybody.
4.2.3. All the authorized xyz network users must ensure that their private computer or XYZ owned computer or any work site is not linked to another network.
4.2.4. All the authorized users of XYZ are not allowed to use their personal accounts and external sites to perform XYZ Health Care business without the approval in advance by the information security manager and the business team.
4.2.5. All the devices, which are connected to the XYZ networking system through remote privilege technologies, must have a current operating system as well as up to date anti-virus software.
4.2.6. All the personal devices connected in XYZ networking system must meet the requirement of XYZ Health Care owned devices for remote access.
4.2.7. Prior to connection, the third party must obey with conditions as detailed in the Third Party

Similar Documents

Premium Essay

Tgt2 Apps in Network Security Challenge

...Introduction New security policy created for e-mail will ensure e-mails are used for business purpose and limits personal usage of e-mails. Policy also permits Softsearch to monitor employee’s e-mails if required. Controls implemented by e-mail policy will help prevent confidentiality breach. However, e-mail policy does not govern attachments within e-mails. Policy should be enhanced to include e-mail attachment specific statement to prevent employees from opening attachments from unknown source & forwarding such attachments within the company network. Internet policy prohibits employees from visiting indecent, illegal and pornographic sites, participate in online gaming, streaming videos, download pirated software. These measures will reduce Softsearch network’s exposure to virus and hacking attempts. In addition to these prohibitions for internet usage, policy should be enhanced to include prohibitions for social media websites (Facebook, Twitter etc.), online blog, online document stores (Google Drive, DropBox etc) to ensure no private company information is shared. This may expose that can be sent to external e-mail addresses. This may expose Softsearch with confi confidentially if private information is sent to external e-mail addresses. E-mail policy should be enhanced to include statement regarding no attachment policy for external e-mail addresses. Employee’s can e-will be able to and internet usage addresses softsearch policSoftsearch new policy addresses issues with...

Words: 1015 - Pages: 5

Free Essay

Sec 402 Wk 7 Case Study 2 Developing the Forensics

...SEC 402 WK 7 CASE STUDY 2 DEVELOPING THE FORENSICS To purchase this visit here: http://www.activitymode.com/product/sec-402-wk-7-case-study-2-developing-the-forensics/ Contact us at: SUPPORT@ACTIVITYMODE.COM SEC 402 WK 7 CASE STUDY 2 DEVELOPING THE FORENSICS SEC 402 WK 7 Case Study 2 - Developing the Forensics, Continuity, Incident Management, and Security Training Write a five to seven (5-7) page paper in which you: 1. Consider that Data Security and Policy Assurance methods are important to the overall success of IT and Corporate data security. a. Determine how defined roles of technology, people, and processes are necessary to ensure resource allocation for business continuity. b. Explain how computer security policies and data retention policies help maintain user expectations of levels of business continuity that could be achieved. c. Determine how acceptable use policies, remote access policies, and email policies could help minimize any anti-forensics efforts. Give an example with your response. 2. Suggest at least two (2) models that could be used to ensure business continuity and ensure the integrity of corporate forensic efforts. Describe how these could be implemented. 3. Explain the essentials of defining a digital forensics process and provide two (2) examples on how a forensic recovery and analysis plan could assist in improving the Recovery Time Objective (RTO) as described in the first article. 4. Provide a step-by-step process that could...

Words: 1406 - Pages: 6

Free Essay

Research Windows

...any time without prior notice. This whitepaper is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY. Microsoft, Active Directory, PowerShell, SharePoint, SoftGrid, Windows, Windows Media, the Windows logo, Windows Vista, and Windows Server are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. All other trademarks are property of their respective owners. Table of Contents Table of Contents ii Introduction 1 Make Your Infrastructure More Efficient with Virtualization 1 Server Virtualization with Hyper-V 2 Presentation Virtualization with TS RemoteApp 3 Access Corporate Networks Remotely with Terminal Services 4 Terminal Services Gateway 4 Terminal Services Web Access 5 Single Sign-On 5 Hosting Secure Web Applications with Ease 6 Introduction 6 Built on a Proven and Trusted Platform 6 An Industrial Strength Web Server 7 Optimize by Running Only What You Need 7...

Words: 10609 - Pages: 43

Premium Essay

Assess the Impact on Access Controls for a Regulatory Case Study Learning Objectives and Outcomes

...Week 1 Lab Part 1: Assess the Impact on Access Controls for a Regulatory Case Study Learning Objectives and Outcomes Upon completing this lab, students will be able to complete the following tasks: 1. Configure user accounts and access controls in a Windows Server according to role-based access implementation 2. Configure user account credentials as defined policy, and access right permissions for each user 3. Create and administer Group Policy Objects for the management of Windows Active Directory Domain machines within the IT infrastructure 4. Apply the correct Group Policy Object definitions per requirements defined by policies and access right permissions for users 5. Assign and manage access privileges as requested in the case study to apply the recommended and required security controls for the user accounts Week 1 Lab Part 1 - Assessment Worksheet Assess the Impact on Access Controls for a Regulatory Case Study Overview Watch the Demo Lab in the Week 1 Learning Space Unit 1, and answer the questions below. The lab demonstrates creating an Active Directory domain as well as user and group objects within the new domain. Directories will be created and permissions assigned based on the required access control as defined in the matrix. Group Policy Objects will also be created and linked to Objects within the domain to enforce security settings. Lab Assessment Questions & Answers 1. What does DACL stand for and what...

Words: 1428 - Pages: 6

Premium Essay

Unit 4 Assignment1

...Unit 4 Assignment 1: Enhance and Existing IT Security Policy Framework Richman Investments Remote Access Standards Purpose: This document is designed to provide definition of the standards for connecting remotely to Richman Investments’ network outside of the company’s direct network connection. The standards defined here are designed to mitigate exposure to potential damage to Richman Investments’ network, resulting from the use of unauthorized use of network resources. Scope: All Richman Investments agents, vendors, contractors, and employees, who use either Richman Investments company property or their own personal property to connect to the Richman Investments network, are governed by this policy. The scope of this policy covers remote connections, used to access or do work on behalf of Richman Investments, including, but not limited to, the viewing or sending of e-mail, and the viewing of intranet resources. Policy: Richman Investments agents, vendors, contractors, and employees with privilege to remote access to Richman Investments’ corporate network are responsible for ensuring that they adhere to these standards, whether using company-owned or personal equipment for data access, and that they follow the same guidelines that would be followed for on-site connections to the Richman Investments network. General access to the Internet by household members via the Richman Investments network will be permitted, and should be used responsibly, such that all Richman...

Words: 474 - Pages: 2

Premium Essay

Case Study - Securing the Network

...Case Study Strayer University SEC 305 It is vital to ensure the safety of a central computer system that is accessed by multiple branches, staff members and remote users. The diversity of an enterprise environment dictates the need to consider multiple aspects when planning for access. Normally, an internal LAN is considered a secure network. Due to its broadcast nature, wireless communications are not considered as secure. Such networks are vulnerable to eavesdropping, rogue access points, and other cracking methods. For remote access, VPN solutions such as dial-up, IPSec VPN, and SSL VPN are commonly used and any access to data center devices must be protected and secured. In the data center, access lists are used to prevent unauthorized access, and reverse-proxy servers use authentication mechanisms to provide a higher degree of security for applications. The need for security is constantly evolving. Maintaining individual security methods for each access scenario can be expensive. There are better alternatives for securing enterprise access. Some that is cost-effective, easy to manage and secure, while addressing performance and scalability requirements. Basic security requirements consist of: • Verification of user credentials and services to define user access. • Client integrity checks that consists of endpoint security verification and of redirecting users to predefined subnets to download compliant anti-virus software...

Words: 612 - Pages: 3

Free Essay

Technology Project

...TECHNOLOGY PROJECT ANALYSIS ON HOW TO SECURE REMOTE ACCESS FOR ENTERPRISE NETWORK SYSTEM Submitted to: Jacky Chao Min By: MARTHE M. NSABA 300682552 TABLE OF CONTENTS INTRODUCTION | 3 - 6 | PROTECTION OF CPE DEVICES | 7 - 9 | SECURE REMOTE ACCESS THROUGH DIFFERENT AUTHENTICATION | 10 - 15 | SECURE REMOTE ACCESS FOR MOBILE UTILIZATION | 16 - 17 | BIBIOGRAPHY | 18 | INTRODUCTION In this developing environment, we note that varying business utilise different kinds of networks according to the business structures and policies, so managing access to all those networks can be complicated and security threatening. It is a key objective that for an enterprise to operate efficiently, its accessibility should be unlimited and this is when remote access is introduced. As the volume of enterprise information and data is increasing exponentially, it is an expectation that this data is easily accessed and shared among each other. To enable this, smarter network access called Remote access was introduced to deliver various degrees of data efficiently through mobile devices, applications and machines in order to stimulate productivity. There are three main types of remote access, namely Basic, Advances and Enterprise. In this paper, we will focus on Enterprise Remote access. Some of the advantages of Enterprise Remote access are; Increased high availability required for different and high volume application Remote access maintains and controls the high usage of the...

Words: 3060 - Pages: 13

Premium Essay

Tft2 Task 2

...Introduction The major healthcare provider in question has experienced a potential security breach within their records. They are now currently investigating how this happened and what information was access by the unauthorized individual. However, the company is now interested in established a baseline framework to avoid future information breaches from occurring. This document will outline three major IT frameworks and how each could have mitigated the recent information breach. ISO Policy The ISO 27001 recommendation is a high-level discussion. A precise policy was not located. The discussion did contain a preventive feature to denied access afterhours; however, how the afterhours check relates to a policy is not clear. The COBIT5 recommendation is a discussion and needs to develop a policy. The discussion includes auditing in general; however, details about the auditing need to be developed once a precise policy is developed. The NIST framework discussion includes review of log files. Details need to be developed about the review once a policy is developed. The three major security frameworks in the discussion are excellent overall recommendations. Precise policy statements that will prevent an identified security flaw in the scenario need to be developed. The first policy presented is ISO 27001 (International Standards Organization Security Standards). According to the ISO website, “The ISO 27000 family of standards helps organizations keep information assets secure. Using...

Words: 3049 - Pages: 13

Free Essay

Is404 Week 1 Lab

...Lab Part 1 - Assessment Worksheet Assess the Impact on Access Controls for a Regulatory Case Study Overview Watch the Demo Lab in the Week 1 Learning Space Unit 1, and answer the questions below. The lab demonstrates creating an Active Directory domain as well as user and group objects within the new domain. Directories will be created and permissions assigned based on the required access control as defined in the matrix. Group Policy Objects will also be created and linked to Objects within the domain to enforce security settings. Lab Assessment Questions & Answers 1. What does DACL stand for and what does it mean? Discretionary access control List (DACL) is a type of access control defined by the Trusted Computer System Evaluation Criteria "as a means of restricting access to objects based on the identity of subjects and/or groups to which they belong 2. Why would you add permissions to a group instead of the individual? It is more resourceful and less time consuming. 3. List at least 3 different types of access control permissions available in Windows. Full Control, Modify, Execute, Read, Write 4. What are the least permissions that you need in order to view the contents of a folder? Read, so the user has access to any file on the system that they are entitled to, but they are not able to make any changes. 5. What are other available Password Policy options that could be enforce to improve security? Enforce...

Words: 1093 - Pages: 5

Premium Essay

Telemedicinee

...Telemedicine Introduction According to the American Telemedicine Association, telemedicine has become a world leading innovative strategy for providing quality health care to patients via the exchange of medical services using communication technology (Siegal, 2012). This exchange of medical information has brought the accessibility to health care to many patient in which otherwise would not have the required resources to access many health care services. In many scenarios, telemedicine has bridged the gap between the need of specialized medical technology at one specific location and an individual’s medical diagnosis at another. Hospitals and other health care providers, which service rural areas of the country, now have an avenue of approach when dealing with accessibility of patients, especially the aging population in these areas. Telemedicine has provided the way of accessing technology and reaching out to a new strategy of practical medicine. In this research we will discuss many of the value added approaches of telemedicine and how it has affected the change in healthcare. There are three main areas of focus that will be considered. As stated, we will discuss and assess the technology currently being used to provide telemedicine services. This technology is broad and can cover vast amounts of information, but the focus will be to explain the main contributors of telemedicine technology and the adoption of this technology by providers. The first part of emphasis...

Words: 6607 - Pages: 27

Premium Essay

The Internet

...issue are done. It is becoming a central concern for leaders at the highest level of many organizations and governments, transcending national borders. Customers are demanding the highest security, as worries about privacy, the protection of personally identifiable information, and identity theft grow. Business partners, suppliers, and vendors are requiring it from one another, particularly when providing mutual network and information access. Networked efforts to steal competitive intelligence and engage in extortion are becoming more prevalent and widespread. Security breaches and data disclosure increasingly arise from criminal behavior motivated by financial gain. As additional evidence of this growing trend is sort, the Deloitte 2007 Global Security Survey of top global financial services institutions states the following and I quote “Information security is no longer a technology-focused problem. It has become the basis for business survival as much as any other issue”. The survey also found that 81% of respondents, many more than in studies of previous years, feel that the issue of security has risen to the level of the C-suite or board as an issue of critical concern. Information Security Governance is a framework...

Words: 989 - Pages: 4

Free Essay

Kaan

...POLICY Acceptable Use for ICT Facilities (for Students) Purpose Student users of Özyeğin University computing and network systems, facilities and services are bound by the rules and definitions outlined in this policy. All the facilities provided to students by the University are designed and implemented for the ease of use, ease of access, faster communication and higher productivity. Compliance with this policy and proper use of system resources are vital for success. Therefore, the University has the full authority and right to audit, while providing wide and secure IT facilities. Scope All applications and usage relating to IT facilities provided for students. Validity This document is effective as of the date it is uploaded to the system. It is revised and updated in the first two months of every year and when necessary. Only the latest version on the system is valid. This is why printing the document is not recommended. In the case that a printed copy is used, it is the user’s responsibility to check the document’s validity through the system. Definitions Computing and Network Systems: Includes LANs, wireless and modem connections, on-campus telephone system, faxes, printers, plotters, scanners on the network as well as all types of communication, printing and publishing devices that work off-line. Facilities All IT facilities and services either provided on-campus in laboratories, libraries and/or any other on-campus locations or provided off-campus through remote access...

Words: 1089 - Pages: 5

Premium Essay

Okdhs

...Human Services for several years. It was Friday and he was ready to go home. Even though it was the weekend, he had some work that he needed to catch up on over the weekend. He decided he would bring his laptop home with him and finish the work on Sunday. After getting home, he was anxious to get inside to see his family. Because of the rush, he left his laptop in the car. The weekend went by, and Sunday morning rolled around. When Mark went out his car he realized it had been broken in to and the company laptop was stolen. Mark was shocked. He had been working with a lot of sensitive information on the laptop. It had several people’s Social Security numbers on it and if anyone got that information they would be able to have access to several people’s personal information. Worse yet, those people’s identities could get stolen with that information. “If only I had kept the laptop with me”, thought Mark. He didn’t know what he was going to tell his boss. Worse yet, he didn’t know if the person that stole the laptop knew what sort of information was on there. “At least the computer is password protected” Mark thought. “Hopefully the person won’t be able to get into the computer itself.” When Mark told his boss, they scrambled to figure out what to do. They didn’t have any sort of official action or procedures to follow, and were unsure of how to handle such a situation. Department Reaction to the Breach The lack of knowledge on security and governance...

Words: 3123 - Pages: 13

Free Essay

Lyt2 Task 2

...Internet Connection Study Prepared for: Northeastern Health Services, Inc. Prepared by Joe Smith, Health Care Technology Consultant Annotated Bibliography: Haggard, J. (2014). America’s Embrace of the Mobile Internet : Analyses and Issues. New York: Nova Science Publishers, Inc. In this collection of articles, the editor brings together papers covering three different topics - adoption of mobile internet and how it differs between demographic groups; how culture is able to impact design and usage of mobile devices; and how text and multimedia messaging present new challenges for policymakers. With regard to this proposal, the first article discusses how mobile internet usage in rural areas has lagged behind the rest of the population. The article also points out that while there have been improvements in coverage, the build-out of mobile networks has typically been less extensive than in urban areas. Solution: Mobile/Wireless Internet Its Use: Mobile Internet service could potentially be used in conjunction with site-to-site VPN connections, in order to establish connectivity from the remote locations to the hospital. Application: Mobile Internet hotspot devices could be used to get Internet access in Northeastern Health Services’ remote offices. In conjuction with these hotspots, firewall appliances can be used to establish a site-to-site VPN connection from each of the offices to the hospital’s radiology department. However, because of the lower levels of...

Words: 3957 - Pages: 16

Premium Essay

Final Project

...only responsibility of security and IT staff but every individual is involved in protecting the information. The risks to information security are not digital only, but it involves technology, people and process that an organization may have. These threats may represent the problems that are associated to complex and expensive solution, but doing nothing about these risks is not the solution. The case we have been assigned today deals with physical and logical vulnerabilities and protection against the risks and threats by implying the best controls to either mitigate, avoid and transfer the risks. Being an Information Security officer at a newly opened location in a busy mall, I have been asked to identify physical and logical risks to the pharmacy operations and also to suggest remedies to avoid any huge loss to the business. The pharmacy operations involve the unique transactions which involves the critical patients’ data, valuable medication and access to cash. The regulation set by the government obligates a pharmacy to meet certain standards to secure logical and physical access to information systems. The pharmacy is comprised of 4 work stations, there is a drug storage are and an office in the premises which has a file server, domain controller and a firewall. The three of the four work stations are placed at the counter to record and retrieve information of customers’ order. The entry of the store if from the mall and there the drug storage area is securely locked location...

Words: 2531 - Pages: 11