Free Essay

Wan Security

In:

Submitted By pathways
Words 1341
Pages 6
Executive Summary
This document describes the security plan for a WAN (wide area network) that has been setup for an organization to work in an efficient manner. The WAN connects many different locations scattered across a wide area. The WAN is an important feature of the organization and has to play an important role in its working. Huge amount of information is transferred everyday and is crucial for the organization. A network crash due to any reason may cause a huge loss to the organization. Also any intrusion in the network may allow somebody to get hold of private and confidential information about the company. Hence, the security of the network is very crucial to the organization and its business.
The goals of this security plan are to ensure the complete security of the network. This would include physical security, network security and access control systems. Physical security is about keeping the network equipments safe from being physically damaged, tampered with or from being stolen. Network security is about keeping the information safe over the network while transmission. Access control systems refer to the control systems that would allow a user to access the information, that could be crucial to the organization, or the private information of the organization. These are discussed in detail in the following sections.
While discussing the security of the network, we make some assumptions. The security employees or the security guards are trustworthy. The employees of the company are trustworthy and they won’t their passwords or other secret keys with anyone. In case an employee is found malicious, he/she would be departed from access to the network immediately. For network security there is a trusted third party available for the distribution of cryptographic keys. With all these assumptions we describe the needs and the security plan for the network of the organization.
Introduction
The organization we discuss in this document is Sunica, Music and movies. It is a local multimedia chain and has four locations. Each store has been acting independently of one another and has difficulty coordinating customer sales from one store to another based on inventory. As a result of poor communications, revenue and customer base have been lost due to jumbled inventory from store to store, decentralized accounting, and no Internet-based commerce. A network has been setup to connect the four locations all allow them the ability to access a centralized database for inventory and dynamically reorder stock based on sales. Each location will tunnel all financial transactions through a central accounting package, eliminating bookkeeping errors and centralizing the company finances. All transactions and customer inventory browsing will be done through a web interface and custom Intranet Web site. To meet their need for an Internet customer base, web servers will be located in their data center and will tie in to the company’s accounting and transaction servers to provide real-time sales and inventory information to customers. In this document we discuss the security of the above mentioned WAN.
Physical Security policy
Security of the facilities
A number of customers visit the stores of the company. Some of them might be malicious and might try to cause harm to store by stealing, damaging the belongings of the stores or bringing in some unwanted items. All these activities need to be checked.
Physical entry controls: - at the place of entry to store, every entrant must be checked for security and a metal detector machine must be placed at the entrance of the store. The customers should not be allowed to carry any bags inside the store. They should be kept outside the store.
Security offices, rooms and facilities: - a security office will be built at every store and rest rooms for security guards will be provided.
Isolated delivery and loading areas: - each and every store will have a delivery and loading area in the backyard and security guards will monitor the area.
Security of information systems
The equipment for setting the network is very costly and must be kept at a secure place. There should be one server room with proper cooling facilities, since the servers generate a lot of heat. For every store there should be a network administrator who would manage all the servers. Nobody should be allowed to access the server machines.
There would be unused ports over the network, which are connected to no server or laptop. These ports could be misused by the employees or customers visiting the store, so the network administrator must monitor the ports being used. By using simple programs, a network administrator can know the IP’s and description of the machines currently connected to the network. So if some unwanted machine is found on the network, the network administrator can forcibly close the connection.
Laptops would be issued to the employees of the store and it’s their responsibility to make sure that they are not stolen, also they should not be allowed to take any laptop or other equipment out of the store without the permission of the manager.
Access Control Policy
User enrollment
There would be mainly two users of the system- the employees and the customers. The employees would be registered by the administrator of the system. As a new employee is hired, the administrator will create an account for him and a password will be given to him to access the account. The employee can change the password.
The customers will have to register through the web interface and their registration will be linked through a payment gateway. They will have to provide their credit/debit card number to register and they will also be given a username and password, through which they can login and operate.
Identification and Authentication
Every user will be issued a username and password, for security purposes the passwords will be encrypted and authentication will be done by using a public key cryptography technique such as RSA. For employees, the physical identification will be done by storing their finger prints in a database and matching them to prove their identity.
Privileged and special account access
For those users confirming their accounts through payment gateways, a privileged account will be provided. Their private information i.e. the credit cards number and pin numbers will be transferred in encrypted form using public key cryptography algorithms. The information will be transmitted using a secure shell connection.

Remote access
To certain employees remote access will be provided to the servers using VPN technologies. VPN refers to virtual private network. It creates a secure channel over the internet and allows to access a remote machine from far distances over the internet. This would allow the employees from accessing the information from their homes also and they would not have to run to the office if any problem occurs. VPN comes with many distributions and also there is an open source distribution called OpenVPN that could be used. The remote users will be connected to the network using VPN technologies.
Network Security Policy
Network access
The network would be prevented by a firewall to prevent the intrusion; access to the network will only be available through secure channel only. Routes and reverse routes need to be set to get access. The servers will only be visible to other servers, or to the web interface through specific ports only. The server will deny secure shell connection to all machines except the specified machines.
Network security control devices
There will be a firewall placed at the gateway of each store. This firewall will block all the attacks from the outside. To prevent the access of unauthorized sites, a black list will be maintained, if any users try to visit a malicious site, he/she would not be allowed to do so. Bandwidth meter software will be used to monitor the bandwidth being used by every machine. This would ensure proper allocation of bandwidth to all users.
References:-
1. Forouzan, Behrouz (2005), TCP/IP Protocol suite, 3rd edition, McGraw-Hill publications.
2. Cheswick, William (2003), Firewalls and Internet Security, 2nd edition, Addison-Wesley

Similar Documents

Free Essay

Wan Security

...Wan Security In: Computers and Technology Wan Security Executive Summary This document describes the security plan for a WAN (wide area network) that has been setup for an organization to work in an efficient manner. The WAN connects many different locations scattered across a wide area. The WAN is an important feature of the organization and has to play an important role in its working. Huge amount of information is transferred everyday and is crucial for the organization. A network crash due to any reason may cause a huge loss to the organization. Also any intrusion in the network may allow somebody to get hold of private and confidential information about the company. Hence, the security of the network is very crucial to the organization and its business. The goals of this security plan are to ensure the complete security of the network. This would include physical security, network security and access control systems. Physical security is about keeping the network equipments safe from being physically damaged, tampered with or from being stolen. Network security is about keeping the information safe over the network while transmission. Access control systems refer to the control systems that would allow a user to access the information, that could be crucial to the organization, or the private information of the organization. These are discussed in detail in the following sections. While discussing the security of the network, we make some assumptions. The security...

Words: 328 - Pages: 2

Free Essay

I Have a Dream

...I HAVE A DREAM Good morning everyone. According to the government’s statistics, every year in Hong Kong estimate more than 5700 people died from cigarettes. It accounts for 90% of lung cancer deaths in men, and more than 30% of all cancer deaths. It kills nearly 16 persons in Hong Kong every day. 1 Since 2007, the Hong Kong government has planned to restrict the act of smoking – started with proposals to make restaurants, offices and karaoke smoke free. This legal action indicated the harmful effects of smoking. It also implied that the government was taking intervention to deal with the public smoking problem. I believe that the legislation is not a restriction of freedom, and the law enforcement is not a prevention of enjoyment, but a mean to move Hong Kong towards a healthier city. However, we have just achieved partial success. Although the number of smokers is declining, we still have a long way to go. We cannot walk alone. And as we walk, we must make the pledge that we shall always march ahead. We cannot turn back. All people have their right to enjoy, but, when this right endangers the safety and health of the others, it should be prohibited. So, today, we need a change. Even though we face the difficulties of today and tomorrow, I still have a dream. I have a dream that, one day everyone can take a deep breath and feel the marvelous fresh air in a busy street. I have a dream that, one day all people can smile with their teeth in snow-white color. ...

Words: 559 - Pages: 3

Free Essay

How to Use Chopsticks

...How To Use Chopsticks Will you eat a sandwich with a spoon or use a fork to have an ice cream? No? Why? Because every food, to taste better, must be consumed using the right vessels and cutlery! Same is the case with Chinese and Japanese foods which seem to taste better when eaten with chopsticks. The origin of chopsticks can be dated back to China, around 3000 to 5000 years ago. Widely used in Japan, China, Korea and Vietnam to eat all kinds of foods, most of the chopsticks are made of bamboo while some are also made of ivory, plastic, silver and jade. They are considered as extensions of the fingers and are considered much better than spoons and forks in their usage. Although the respective Asian communities use chopsticks as effortlessly and naturally as Europeans use forks, it doesn’t really come that easily for the rest of us. Despite the fact that most of the world thinks of them as impossible feats, chopsticks actually provides your hands with a physical affinity with the food — something that our quintessential spoons, forks and knives can never boast of. Having said that, we also acknowledge that eating with chopsticks could require some training and hence the next section that talks about how to use chopsticks. Eating With Chopsticks * Clasp one chopstick between your thumb and middle finger. The chopstick must be in such a position that it is placed at the base of your thumb and at the lower joint of the middle finger. While the bottom chopstick remains intact...

Words: 8121 - Pages: 33

Free Essay

Jar Jar Script

...STAR WARS EPISODE II JAR JAR'S GREAT ADVENTURE Written by GEORGE LUCAS and JONATHAN HALES Lucasfilm Ltd. Second Draft, June 24, 2000 P.O. Box 2009 Pink Revisions, June 28, 2000 San Rafael, CA, USA 94912 Blue Revisions, July 3, 2000 * Green Revisions, July 5, 2000 THIS MATERIAL IS THE PROPERTY OF LUCASFILM LTD. AND IS INTENDED AND RESTRICTED SOLELY FOR USE BY LUCASFILM LTD. PERSONELL. DISTRIBUTION OR DISCLOSURE OF THIS MATERIAL TO UNAUTHORIZE PERSONS IS PROHIBITED. THE SALE, COPYING, OR REPRODUCTION OF THIS MATERIAL IN ANY FORM IS STRICTLY PROHBITED. 1 EXT. SPACE 1 A vast sea of stars serves as a backdrop for the Main Title, followed by a rollup, which crawls into infinity. There is unrest in the Galactic Senate. Several hundred solar systems under the leadership of the rebel leader, Count Dooku, have declared their intentions to secede from the Republic. This separatist movement has made it difficult for the limited number of Jedi Knights to maintain peace and order in the galaxy. Senator Amidala, the former Queen of Naboo, is returning to Coruscant to vote on the critical issue of creating an army to assist the overwhelmed Jedi. PAN UP to reveal the amber city planet of Coruscant. A yellow Naboo Fighter flies OVER CAMERA toward the planet, followed by a large Royal Cruiser and two more Fighters. 2 EXT. CORUSCANT - DAWN 2 The ships skim across the surface of the city landscape. The sun glints off the chrome hulls of the sleek Naboo spacecraft as they navigate between the...

Words: 29232 - Pages: 117

Free Essay

Asdf

...Star Wars Blue Ray Toshi and Allen Watch Star Wars for the first time..   Chapter 1: We kick off a special series with a first viewing of 'Star Wars' on Blu-ray What happens when 21st century kids finally watch the biggest myth of the '70s? Thursday, Sep 22, 2011   This day has been a long time coming.   We all have landmarks by which we measure our lives and our accomplishments, goals you've set for yourself that you've either accomplished or not, and I'm certainly someone who holds film experiences very dear.  The moment I knew I'd spend the rest of my life somehow involved in movies took place in a dark movie theater when I was seven years old, and it was one of those lightning bolt occasions.  I felt pinned to the back of my chair as I watched a tiny blockade runner fleeing from a seemingly endless Star Destroyer that just kept coming out and over, more real than anything I had ever seen, and I've never wavered in my determination to be involved in storytelling somewhere, somehow.   Because of the relevance of "Star Wars" in my development as a fan of storytelling in general, reaching the moment of sharing these films with my kids has been one of my primary goals since I've been writing about the entire experience of sharing narrative with my children.  I know people who start screening the films for their kids as soon as they are old enough to open their eyes, and I respect that.  Of course I know other people who don't think it's of any particular importance,...

Words: 14530 - Pages: 59

Premium Essay

General Grievous for President

...RUNNING HEAD: GENERAL GRIEVOUS FOR PRESIDENT GENERAL GRIEVOUS FOR PRESIDENT 1 GENERAL GRIEVOUS FOR PRESIDENT Sean Sawicki ITT Technical Institute January 21, 2012 GENERAL GRIEVOUS FOR PRESIDENT 2 GENERAL GRIEVOUS FOR PRESIDENT When it comes to politics we always debate which is better, republicans or democrats. Every four years we are faced with the decision to vote for the next Commander and Chief, with our economies in great ruin, unemployment at an all time low and war throughout the planet, it’s time to really face the facts of who’s really going to get the job done. One who will fight to the end to save our economy, or the one who wants to just save the people closest to his beliefs? Well that time has come, with our two running candidates General Grievous (democrat) and Wookie Chewbacca (republican). When we sit back and look into the past of these two candidates, only one stands out in the crowd as the next commander and chief “General Grievous”. According to Darth Sanwicki (2012), creator and trainer of Qymaen jai Sheelal, “The Brain of a human, body by Intel”. Looking into the republican party we see high class people making high class decisions, whatever happened to the Republican belief ” legislations should will be on the Jedi table ...your Jedi members and senators will probably try to get peace on a state or local level rather than national level “The republics...

Words: 1052 - Pages: 5

Free Essay

Darth Vader

...Sebastian Mora Lit & Comp Personal Short Story 10/10/14 Lord Vader As the disciple burns into the rubble of his mighty loss, his face disfigures in a mighty extinguished inferno, his eyes crumble knowing the understanding of who he has become. As the fire discomforts his sizzling cuted legs, the fire penetrates like the swerving in a blaze of fire, raging through bones. His screams breath all sith, dark, evil, mostly machine and betrayal among the ones who trusted him. The destiny that rises from his trapped darkside, rises among the empire, a royalty of full command. The short burst of distant sobs of his, hypnotizes all but an ambitioned man not knowing what to be, choose or do;in a sudden stop, he becomes godforsaken, knowing the truth but no connotation to act upon what is real or cautious to his state of well being. Risen upward like a dead beast in a volcanic palace, his body plunders with fluorescent red eyes showing the villain he has now suited into. The surface of his residue crumble the steel bed, perishing the metallic superficial, converting it into slate. He is transported, all but the sith ways are his billow for survival. Pall spreaded over his glare. His coffin, he is just lugged like a corpse. He cries and cries for his newborn son, but laughs of the creation that he has now become. As the ship arrives and whirls his ashes, heat ignites from his soul,causing a malfunction to his force, vanished are his jedi ways, the chosen one has arrived. Constructed...

Words: 600 - Pages: 3

Free Essay

Hero's Journey Speech

...Good morning/afternoon ladies and gentlemen of the Tweed Heads Art Exhibition. My name is Ashlea Wharley, and I would like to take this opportunity and thank you for having me today. This morning/afternoon I will be explaining my interpretation of what a hero’s journey truly is. Along with that I will be showing you this extraordinary but yet, so very time consuming work of art I have created. As you see Ladies and Gentlemen in my opinion or understanding of what a hero’s journey is; it’s best described as a typical adventure of a hero, the person who sets out an adventure and accomplishes countless endeavours on behalf of a group, tribe or civilisation. The model I have created that you see before your eyes Ladies and Gentlemen is my understanding and explanation of a hero’s journey within my idea for my related text, The Vampire Diaries. I have intentionally created a 3D construction with using a white tree metal jewellery frame. I constructed it this way because the white metal tree itself symbolises a tree of life. A tree of life ladies and gentlemen have been used in the notion in science, religion, philosophy and mythology. In this case, the tree of life can be related back to my related text on how Elena in… The Vampire Diaries gets introduced into the mythological world. You will also see there is a silver necklace with an oval shaped locket in a pink jewellery box. This necklace symbolises a locket that Elena is given in the Vampire Diaries by Stefan her Vampire boyfriend...

Words: 1253 - Pages: 6

Free Essay

Star Wars

...I was very surprised at how many people and time it took to make just 1 minute of film for Star Wars Episode III. I have seen all of the star wars movies and I knew that they involved a lot of work, but I truly was taken aback by the actual number of people that the movie required for one 60 second scene. I heard in the clip that this was one of the most important scenes from this film, but still could not believe what it took put it together. The amount of people working on the shot where the camera is watching the lava flow through the mountainous landscape on the planet Mustafar was amazing. There were 47 “practical modelers” who worked on building the set for that one shot. They had to find a good material, carve it down to look the way that George Lucas envisioned it, paint it, and figure out a way to have lava flow over it to make it look perfect. They built the set on a large platform that could be tilted in order to control the speed of the lava flow, which was very smart. They also not only had to decide what to use as lava, which they used Methacil for because of its color and viscosity; but then how to make it light up to match the ominous glow that real lava has. After they had finished the shot and disassembled the set, George Lucas looked at the footage and was not happy with what he saw. He envisioned the shot going against the flow of the lava, and up the landscape of Mustafar. This in turn took even more manpower to figure out how to fix this problem. It went...

Words: 344 - Pages: 2

Free Essay

Where Star Wars Episode Ii Went Wrong

...So, I’m going to have to do to this one what I did to the first one, and again, I fully acknowledge the Plinkett reviews as a source for me to draw from. The big difference here is that while I was more than willing to give a little leeway to The Phantom Menace, Attack of the Clones gets no such love. Plain and simple: this movie was terrible. The Direction First and foremost, we need to remember one big thing about the first 3 movies: only one was directed by George Lucas. The other 2 were done by directors Lucas respected (Kershner and Marquand). These movies are 100% Lucas and, in the case of Clones, he elected to direct a movie that was nearly entirely filmed against a green screen. This allowed him to do filming of characters against a blank canvas while allowing him to basically design whatever world he wanted around them. Green screens had long been used for special effects and matte fills, but hadn’t been used this heavily at this time. While Episode II wasn’t a full “digital backlot” film, there were tons and tons of shots that had actors doing their thing with nothing around them but green cloth. The upside here is that digital backlots can save a lot of money in film production since you don’t have to build sets that are either very complicated (aka “expensive”) or utterly impossible. The downside is that if your director isn’t, you know… an actor’s director, the actors all end up like they’re acting in front of a bunch of green cloth because they have nothing...

Words: 5484 - Pages: 22

Premium Essay

Interpersonal Communication In Star Wars

...(Floyd, 2012, p. 186) For example, we will examine what occurs when Luke, curious about his father and his role in the war going on around him, asks his uncle about his father’s connection to a man called Obi-Wan Kenobi. When Luke brings up the name Obi-Wan, Owen quickly deflects the comment saying that “[Obi-Wan] died about the same time as [Luke’s] father,” and then telling him to “forget it.” (Lucas, 1977) Owen is using a strategic message, meaning he is purposefully withholding information from Luke to control him. (Floyd, 2012, p. 188) Owen does not tell Luke the truth about Obi-Wan--who is alive, lives on Tatooine, and used to be best friends with Luke’s father--to keep him from leaving the farm. When Owen presents Luke with a falsified story, he gets Luke to act according to his will, but closes off all opportunities for a meaningful communication about their differing viewpoints. Later in the conversation, Luke brings up his desire to submit an application to the Academy in the current year. In response, Owen immediately shuts him down, saying that he absolutely needs Luke on the farm and giving him no say in the matter. Frustrated...

Words: 1519 - Pages: 7

Premium Essay

Star Wars: The Old Republic

...The game starts like many other Star Wars games and movies with the famous introduction, “A long time ago in a galaxy far, far away”. However, just the namesake of Star Wars and the unique introduction to this game don’t make the game good. Usually it’s the quality of the game that makes it fun to play and great to enjoy, and throughout the game Star Wars: The Old Republic, one will be constantly amazed by the witty dialogue, the immersive gameplay, and the incredible storyline that can suck hundreds of hours out of the player’s life in just one playthrough. The dialogue in this game is absolutely amazing. From witty remarks from both the player’s companion (who is a computer-controlled character in the game that assists the player throughout the game) and the other characters met throughout the game to the power the player has over the direction of the conversations, one has no choice but to be astonished at the greatness the dialogue alone brings to the game. Across the span of the game, the player gets to make choices in their dialogue that brings them closer or farther away from the light or dark sides. The player is given the option to prolong conversations to make witty banter with whomever they are talking to, almost immediately kill them for dark side points, or have mercy and compassion for light side points. For instance, after being helped by a group of Republic soldiers whilst one is on the empire’s side, the player could have the options of talking to them for a...

Words: 985 - Pages: 4

Premium Essay

Star Wars

...Tatooine, the droids set off in search of civilization but soon quarrel over the way to go. R2 insists that he has a mission to perform, but C-3PO wants no part of such an adventure. The two droids go their separate ways but are soon reunited when they are both captured by Jawas, child-sized scavengers who trade in droids and technological scraps. The Jawas sell the droids to Owen Lars, a moisture farmer on a remote homestead. Owen’s nephew, young Luke Skywalker, cleans the droids and, as he does so, stumbles across a bit of the message Princess Leia had hidden inside R2. The holographic message is addressed to “Obi-Wan Kenobi,” and Luke, fascinated by the beautiful princess, wonders if she means Ben Kenobi, a mysterious hermit who lives out in the desert wilds. R2, however, refuses to divulge any more of the message. When Luke asks his uncle about the identity of Obi-Wan, Owen is...

Words: 1694 - Pages: 7

Free Essay

Trivia

...Which singer joined Mel Gibson in the movie Mad Max: Beyond the Thunderdome? TINA TURNER Vodka, Galliano and orange juice are used to make which classic cocktail? HARVEY WALLBANGER Which American state is nearest to the former Soviet Union? ALASKA On TV, who did the character Lurch work for? ADDAMS FAMILY How many tentacles does a squid have? TEN What is converted into alcohol during brewing? SUGAR Which river forms the eastern section of the border between England and Scotland? TWEED Name the two families in Romeo and Juliet? MONTAGUE & CAPULET If cats are feline, what are sheep? OVINE For which fruit is the US state of Georgia famous? PEACH In the 1963 film The Great Escape, what names were given to the three tunnels? TOM, DICK, HARRY Who captained Jules Verne's submarine Nautilus? CAPTAIN NEMO Which guitarist is known as Slowhand? ERIC CLAPTON What is infant whale commonly called? CALF In which film did Roger Moore first play James Bond? LIVE AND LET DIE (1973) What was the character name of TV's 'The Saint'? SIMON TEMPLAR Who composed The Wedding March? FELIX MENDELSSHON Which actor appeared in Papillion and The Great Escape and died in 1980? STEVE MCQUEEN In which bay is Alcatraz? SAN FRANCISCO BAY In which Dickens novel was Miss Havisham jilted on her wedding day? GREAT EXPECTATIONS Which mountain overlooks Rio De Janeiro and its harbour? SUGAR LOAF In Roman mythology...

Words: 2852 - Pages: 12

Free Essay

Random

...Section 1: Favorite Movie 1. What is the title? Star Wars Episode 3 Revenge of the Sith 2. Who directed it? George Lucas 3. When was it created? May 19th 2005 4. Who are the main characters and the actors portraying them? Ewan McGregor Obi-Wan Kenobi Natalie Portman Padmé Hayden Christensen Anakin Skywalker Ian McDiarmid Supreme Chancellor Palpatine Samuel L. Jackson Mace Windu Jimmy Smits Senator Bail Organa Frank Oz Yoda (voice) Anthony Daniels C-3PO Kenny Baker R2-D2 Christopher Lee Count Dooku 5. What is the movie about? Explain 6. What do you like about it? Be specific and thorough. It completes how Anakin Skywalker becomes Darth Vader since it isn’t really explained in the original trilogy. Section 2: Favorite Film 1. What is the title? To Kill a Mockingbird 2. Who directed it? Robert Mulligan 3. When was it created? 1960-Book 1962-Movie 4. Who are the main characters and the actors portraying them? Gregory Peck as Atticus Finch Mary Badham as Jean Louise "Scout" Finch Phillip Alford as Jeremy Atticus "Jem" Finch 5. What is the movie about? The story covers three years, during which Scout and Jem undergo changes in their lives. Takes place in Maycomb, Alabama. Deals with the issue of racism and rape in an effect matter for the 20th century which is when this was written and produced. 6. What do you like about it? Be specific and thorough. A good story that teaches a lot of good life lessons about racism and how things were...

Words: 357 - Pages: 2