Free Essay

Nt2580 Homework 1

In: Computers and Technology

Submitted By percynewton
Words 386
Pages 2
This multi layered security plan will provide a brief overview the strategies to be implemented to each level of the information technology infrastructure. The IT infrastructure consist of seven domains User, Workstation, LAN, WAN, LAN-to-WAN, Remote Access, and Systems/Applications. However, we are going to outline the five we feel would be the most important for our beginning stage mitigating potential attacks. I) User Domain – Employees accessing the organization’s information system. a. Having a development of acceptable use policy (AUP) what employees can access or not. b. Any violations of the AUP will result in that offender’s termination. c. The best practice to introducing the AUP is ensuring that all employees read, understand, and sign an agreement. d. This will hold the employee accountable. II) Workstation Domain – the employee or users connecting to the network. e. hardening and configuring the system provide a defense against any vulnerabilities. f. Ensuring that the patching of software revision, and system configurations constantly monitored and conducted on a regular basis. g. The frequency of such will be determined by management. Suggesting that Desktop Support will be responsible for this layer of defense. III) WAN Domain – Connecting remote locations. h. Use VPN tunneling for end-to-end secure IP communications. i. Configure routers and network firewalls to use stateful packet inspection for blocking unwanted TCP, UDP and IP packet traffic. IV) LAN Domain – the collection of computers connected to one another or to a common connection medium.
a. Securing high-priority systems: Establish access lists; combo/cipher locks for server and switch rooms; also have a sign-in sheet for contractors and tech-reps working on-site.
b. Implement Kerberos as another secure means of identifying users over a non-secure network. V) Remote Access Domain – connecting remote users to the an organizations infgrastructure. j. Assigning a unique identifier to each user in order to have accurate records of who is accessing, or trying to access, what applications, which network resource, and what data. k. Proof must be provide by user trying to gain access to the network remotely is the same person who has been granted access by identification.
These are just a few layered securities that we must have in place. This will provide the foundation as the project continues over the course of 12 weeks.

Similar Documents

Premium Essay

Random

...Results Nt2580 - College Essays - Hendrome www.termpaperwarehouse.com › Computers and Technology Nov 11, 2012 – Nt2580. Making tradeoffs due to economic scarcity and that every society faces ... For a given set of laboratory services, there is a defined cost. Nt2580 Lab 4 - Term Papers - Jrains www.termpaperwarehouse.com › Computers and Technology Jan 18, 2013 – Nt2580 Lab 4. 1. Define why change control management is relevant to security operations in an organization. Change control is a systematic ... NT2580 Introduction to Network Security stankong.bol.ucla.edu/NT2580/index.htm Welcome to NT2580 Introduction to Network Security ... Home Work , Labs, PowerPoint , Project and Exam Reviews. Fall Quarter 2012 ... Itt tech nt2580 lab 6 - 6 ebooks - free download www.getbookee.org/itt-tech-nt2580-lab-6/ Itt tech nt2580 lab 6 download on GetBookee.org free books and manuals search - 094 ALB 01-09-13 01-09-13 Vol 37-a. Nt2580 unit 9 lab - 4 ebooks - free download www.getbookee.org/nt2580-unit-9-lab/ Nt2580 unit 9 lab download on GetBookee.org free books and manuals search - NT2580 Introduction to If ti S itInformation Security. Nt2580 unit 6 lab - 4 ebooks - free download www.getbookee.org/nt2580-unit-6-lab/ Nt2580 unit 6 lab download on GetBookee.org free books and manuals search - NT2580 Introduction to If ti S itInformation Security. Lab itt edition nt2580 answers - 1 ebooks - free download ...

Words: 435 - Pages: 2

Free Essay

Policy Definition & Data Classification

...8/1/2015 NT2580 Unit 7 Policy Definition and Data Classification Standard : NT 2580 : ITT Tech : Homework   NT2580 Unit 7 Policy Definition and Data Classification Standard Home  ITT Tech  NT  NT 2580  NT2580 Unit 7 Policy Definition and Data Classification Standard  You have successfully unlocked this document. You have 24 more unlocks  available. Was this document helpful?  Yes   Download Document https://www.coursehero.com/file/11610135/NT2580­Unit­7­Policy­Definition­and­Data­Classification­Standard/?timestamp=20150801105100 1/6 8/1/2015 NT2580 Unit 7 Policy Definition and Data Classification Standard : NT 2580 : ITT Tech : Homework Share and earn access  CorporalStarViper9176 ITT Tech Follow 3  1787  302 https://www.coursehero.com/file/11610135/NT2580­Unit­7­Policy­Definition­and­Data­Classification­Standard/?timestamp=20150801105100 2/6 8/1/2015 NT2580 Unit 7 Policy Definition and Data Classification Standard : NT 2580 : ITT Tech : Homework   VIEWS UNLOCKS 0 1   HELPFUL UNHELPFUL 0 0 About this Document SCHOOL ITT Tech COURSE NT 2580, Summer 2014 COURSE TITLE Introduction to Information Security PROFESSOR MR J TYPE Homework PAGES 1 WORD COUNT 206 Is this correct?  Flag Get Help in NT 2580 https://www.coursehero.com/file/11610135/NT2580­Unit­7­Policy­Definition­and­Data­Classification­Standard/?timestamp=20150801105100 ...

Words: 487 - Pages: 2

Premium Essay

Nt2580 Week 1

...ITT Technical Institute 3825 West Cheyenne Avenue, Suite 600 North Las Vegas, Nevada 89032 NT2580 Introduction to Information Security Week 1, Unit 1 – Information Systems Security Fundamentals Class Plan Time Duration: This Class Period will be approximately 4 ¾ Hours in length. It will be divided 2 ¾ hours for Theory and 2 ½ hours for Lab. Content Covered: • Textbook o Chapter 1 - Information Systems Security Objectives: After completing this unit, the student should be able to: • Explain the concepts of information systems security (ISS) as applied to an IT infrastructure. Key Concepts: ▪ Confidentiality, integrity, and availability (CIA) concepts ▪ Layered security solutions implemented for the seven domains of a typical IT infrastructure ▪ Common threats for each of the seven domains ▪ IT security policy framework ▪ Impact of data classification standard on the seven domains Materials: Week 1 PowerPoint Presentation Assignment Overview: Refer to Assignment 1: Match Risks/Threats to Solutions in the Graded Assignment Requirements section of this instructor guide. In this assignment, the students need to match common risks or threats within the seven domains of a typical IT infrastructure with the possible solutions or preventative actions. Use the hand out worksheet NT2580.U1.WS1.doc. Refer to Assignment 2: Impact of a Data Classification Standard, you must write a brief report...

Words: 530 - Pages: 3