Free Essay

Nt2580 Research Project Part 2

In:

Submitted By bmaxwell
Words 1544
Pages 7
Project Part 2: Security Domain and Strategies Now that Richman Investments has expanded with more offices, locations and clients, the need for protection of assets are greater. We have decided to implement the following policy for removable media: Richman Investments staff may only use Richman Investments’ removable media in their work computers. Richman Investments removable media may not be connected to or used in computers that are not owned or leased by the Richman Investments without explicit permission of the Richman Investments IT manager. Sensitive information should be stored on removable media only when required in the performance of your assigned duties or when providing information required by other state or federal agencies. When sensitive information is stored on removable media, it must be encrypted in accordance with the Richman Investments’ Acceptable Encryption Policy. Security assurance and user-friendly sites are required if Richman Investments is to be successful at attracting customers to their Internet sites. It is therefore important to be able to understand the business requirements and be able to translate these into a public network presence with security in mind. The Digital revolution of the 21st Century has not been achieved without its consequences. Real time business requirements and economic drivers have forced rapid changes to the methods used to conduct business-to-business and business to client communication. The Internet has now become a convenient and economic deployment medium for global business.
Richman Investments Computer users’ policy: Although employees are given PCs so they can deliver the task that they are assigned, it must be understood that these PCs are property of Richman Investments and must not be abused for personal use. Computer resources are expensive and so offensive material must not be downloaded and stored on business PCs. Richman Investments provided email systems should only be used for business purposes and care needs to be taken of any material sent via email. The company is liable for an employee’s action. Spam, mass mailing lists, playing games or engaging in online chat groups should be prohibited. Desktop and laptop users must make use of business loaded antivirus software to check all data on their PCS, downloaded data or data transferred via disks. Data loaded onto the network servers or sent outside the company must be virus checked.
Users must not be allowed to disable such software. Administrators can maintain better control of PC’s by implementing group policies as per departmental functions so that users cannot tamper with configurations. Always make sure that the latest updates/patches for all operating systems and application have been installed thus ensuring any known vulnerabilities are taken care of. Software and tools provided by Systems Management Servers can be used to audit all PCs. It is important to make users aware of the security policy and the risks that a business can run into if they are not followed correctly. Richman Investments will continue to educate users by regularly sending emails, holding awareness sessions and putting posters on notice boards. User education cannot be taken lightly, after the ”ILOVEYOU” virus (2000), which only required one user to open that email message and attachment to flood email servers and gateways. With the added number of employees, office expansion and crossing of the U.S. borders, Richman Investments will be implementing virus and malware programs to thwart malicious code and activity with the following countermeasures and prevention techniques.
The following is a list of countermeasure suggestions and brief description for implementation that Richman Investments will be implementing companywide.
PacketFence is a fully supported, trusted, Free and Open Source network access control (NAC) solution. Boasting an impressive feature set including a captive-portal for registration and remediation, centralized wired and wireless management, powerful guest management options, 802.1X support, layer-2 isolation of problematic devices. PacketFence can be used to effectively secure networks small to very large heterogeneous networks and can be tailored for use as a firewall and router. In addition to being a powerful, flexible firewalling and routing platform, it includes a long list of related features and a package system allowing further expandability without adding bloat and potential security vulnerabilities to the base distribution.
ADMINISTRATION SOFTWARE
Wireshark is the world's foremost network protocol analyzer. It lets you capture and interactively browse the traffic running on a computer network.
AMANDA, the Advanced Maryland Automatic Network Disk Archiver, is a backup solution that allows the IT administrator to set up a single master backup server to back up multiple hosts over network to tape drives/changers or disks or optical media. Amanda uses native utilities and formats (e.g. dump and/or GNU tar) and can back up a large number of servers and workstations running multiple versions of Linux or Unix. Amanda uses a native Windows client to back up Microsoft Windows desktops and servers.
AUDIT AND MONITORING SOFTWARE
Spiceworks, a free network monitoring software with network management tools, help desk ticketing app, network mapper and more. The latest version of the software, Spiceworks v6.2, is the complete network monitoring & management, help desk, PC inventory, and software reporting solution to manage Everything IT in small and medium businesses.
Nagios is a powerful monitoring system that enables organizations to identify and resolve IT infrastructure problems before they affect critical business processes.
CRYPTOGRAPHY SOFTWARE
7-Zip is open source software under the GNU LGPL license. 7-Zip has ZIP container-based AES-256 encryption. You can easily create a compressed archive of files and add a password to it.
AxCrypt: an open source file encryption software that lets you compress, encrypt, decrypt, store, send, and work with individual files. It works with the Windows shell and it uses AES-256 encryption.
Cryptext allows you to decode and encode files with a combined technology of SHAa1 and RC4. It locks files with a 160-bit password-protected keyword.
DATA COMMUNICATIONS SOFTWARE
JITSI is a VoIP, videoconferencing and instant messaging application for Windows, Linux and Mac OS X. It supports several popular instant messaging and telephony protocols.
FreeSWITCH, is a scalable open source cross-platform telephony platform designed to route and interconnect popular communication protocols using audio, video, text or any other form of media. MALICIOUS CODE AND MALWARE SOFTWARE ClamAV, is an open source (GPL) antivirus engine designed for detecting Trojans, viruses, malware and other malicious threats. Gateway Anti-Virus, a Vermont Department of Taxes project, allows applications across the enterprise to check files for viruses by providing a SOAP-based virus scanning web service. Client applications submit files to the web service and the web service uses ClamAV to scan them for viruses. DATA RECOVERY SOFTWARE BackTrack is a distribution based on the Debian GNU/Linux distribution aimed at digital forensics and penetration testing use. It is named after backtracking, a search algorithm. Hiren's BootCD (HBCD) is a bootable software CD containing a number of diagnostic programs such as partitioning agents, system performance benchmarks, disk cloning and imaging tools, data recovery tools, MBR tools, BIOS tools, and many others for fixing various computer problems. JITSI is a VoIP, videoconferencing and instant messaging application for Windows, Linux and Mac OS X. It supports several popular instant messaging and telephony protocols. FreeSWITCH is a scalable open source cross-platform telephony platform, designed to route and interconnect popular communication protocols using audio, video, text or any other form of media.
SOFTWARE
WireShark: to browse the traffic running on the network.
Spiceworks: for network monitoring and management.
CCleaner: to find any issues users may find suspect on their own workstations and removable media.
Spybot - Search & Destroy for finding malware on any Windows machines.
AxCrypt will be used for file encryption and decryption across the network. In conclusion the aforementioned countermeasures can protect all domains from the user to the remote access domain. However, hackers are no longer trying to guess someone’s password, they are attempting to reach into the data and create havoc. Not having a plan or security measures in place IS a plan for failure. Richman Investments believes we are on the right path with the higher security measures and with user education.

Works Cited
""Cisco Catalyst 2950 WS-C2950G-48-EI 48-Ports External Switch Managed." EBay. N.p., n.d. Web. 02 Mar. 2013. <http://www.ebay.com/itm/Cisco-Catalyst-2950-WS-C2950G-48-EI-48-Ports-External-Switch-Managed-/290849826375?pt=US_Network_Switches>.
"Lenovo Ideacentre B305 AMD Quad-core 2.2GHz 4GB 1TB Desktop All-in-one Windows 7." EBay. N.p., n.d. Web. 02 Mar. 2013. <http://www.ebay.com/itm/Lenovo-Ideacentre-B305-AMD-Quad-core-2-2GHz-4GB-1TB-Desktop-All-in-one-Windows-7-/251195957648?pt=Desktop_PCs>.
Web. 02 Mar. 2013. <http://www.axantum.com/>.
"Optimize Your Home PC." RSS. N.p., n.d. Web. 02 Mar. 2013. <http://www.piriform.com/>.
"Safe Downloads and Expert Advice." Softonic. N.p., n.d. Web. 02 Mar. 2013. <http://spybot-search-destroy.en.softonic.com/>.
"Where IT Goes to Work." Free IT Community, Help Desk, and Network Monitoring. N.p., n.d. Web. 02 Mar. 2013. <http://www.spiceworks.com/>.
"Wireshark." · Go Deep. N.p., n.d. Web. 02 Mar. 2013. <http://www.wireshark.org/>

Similar Documents

Premium Essay

Nt2580 Week 1

...Institute 3825 West Cheyenne Avenue, Suite 600 North Las Vegas, Nevada 89032 NT2580 Introduction to Information Security Week 1, Unit 1 – Information Systems Security Fundamentals Class Plan Time Duration: This Class Period will be approximately 4 ¾ Hours in length. It will be divided 2 ¾ hours for Theory and 2 ½ hours for Lab. Content Covered: • Textbook o Chapter 1 - Information Systems Security Objectives: After completing this unit, the student should be able to: • Explain the concepts of information systems security (ISS) as applied to an IT infrastructure. Key Concepts: ▪ Confidentiality, integrity, and availability (CIA) concepts ▪ Layered security solutions implemented for the seven domains of a typical IT infrastructure ▪ Common threats for each of the seven domains ▪ IT security policy framework ▪ Impact of data classification standard on the seven domains Materials: Week 1 PowerPoint Presentation Assignment Overview: Refer to Assignment 1: Match Risks/Threats to Solutions in the Graded Assignment Requirements section of this instructor guide. In this assignment, the students need to match common risks or threats within the seven domains of a typical IT infrastructure with the possible solutions or preventative actions. Use the hand out worksheet NT2580.U1.WS1.doc. Refer to Assignment 2: Impact of a Data Classification Standard, you must write a brief report on how the...

Words: 530 - Pages: 3

Premium Essay

Project Part 2 Student Sscp® Domain Research Paper

...Project Part 2 Student SSCP® Domain Research Paper NT2580 Introduction to Information Security May 20, 2013 Security Operations means the process of identifying critical information and subsequently analyzing friendly actions attendant to military operations and other activities to: a. identify those actions that can be observed by adversary intelligence systems; b. determine indicators that hostile intelligence systems might obtain that could be interpreted or pieced together to derive critical information in time to be useful to adversaries; and c. select and execute measures that eliminate or reduce to an acceptable level the vulnerabilities of friendly actions to adversary exploitation. [1] The need to connect and collaborate with partners, suppliers, customers, and employees anytime and anywhere has increased the difficulty of managing network and systems security. Organizations are challenged with the difficult and overwhelming task of securing and managing network systems, and keeping their desktops and servers up to date. Organizations want easy and efficient ways to maintain network security, manage updates, and, at the same time, reduce total costs for security management. When addressing security management and operations, administrators need to consider the following: • Security: Employees not only work from corporate offices, but from branch offices, home offices, or from the road. Managing access policies...

Words: 536 - Pages: 3

Premium Essay

Project Part 2 It Security

...Classification Description: Malicious Code and Activity Task Base on the premise that there is a mix of computers running Windows 2000, Windows XP, Windows Vista, Windows 7, and Mac OS X, you must research and devise a plan to thwart malicious code and activity by implementing countermeasures and prevention techniques for dealing with viruses, worms, logic bombs, Trojan horses, and other related forms of intentionally created deviant code. Introduction Malicious software is written with the intent to damage or infect the system of Richman Investment. Malicious code or software is a threat to any internet-connected device or computer. The main goal of the attack is to affect one of the three information security properties which are Confidentiality, Integrity, and Availability. Confidentiality is affected if the malicious software is successful at disclosing private information. Integrity is compromised if the malware can modify database records either immediately or over a period of time. Availability is affected if malware can erase or overwrite files or inflict considerable damage to storage media. SSCP® Domain Affected Malicious Code and Activity This domain examines the types of Malicious Code and Activities that can threaten the confidentiality, integrity, and availability of a system or information. The SSCP is expected to be familiar with the various types of Malicious Code and know how to implement effective countermeasures to prevent malicious...

Words: 953 - Pages: 4

Free Essay

Sscp Domain Rearch Paper

...NT2580 Ishmael Burch III Project Part 2 Student SSCP Domain Research Paper Remote Access Domain is a domain involving Portable devices that use static IP address like Smart phones Laptop computers PDAs Remote E-mail usage Wireless access to cloud resources. Remote access policies are configured using the RRAS console. They are contained within the Remote Access Policies container under the server node in the console tree. There is a default remote access policy created when the RRAS is installed on a computer. Allow or deny remote access depending on the time or day of the week, the group membership of the remote user, the type of connection (VPN or dial-up), and so on. Administrators can configure remote access settings to specify authentication protocols, and encryption schemes used by clients, maximum duration of a remote access session, etc. A wireless link is likely to be limited in bandwidth error rates on a wireless link is much higher than that of a wired link. Different types of communication paths involved, one of which is radio link, particularly vulnerable to attack. Location privacy, any leakage of specific signaling information on the network can lead to an eavesdropper to approximately “locate” the position of a subscriber and thus hindering the subscriber’s privacy. Securing Internet Communication by using S-HTTP and SSL Secure Socket Layer (SSL) protocol is a protocol that uses public key encryption to secure channel over public Internet. A Secure Hypertext...

Words: 769 - Pages: 4

Free Essay

Nt2580 Final Project

...Richman Investments | Richman Internet Infrastructure Security Management Upgrade | ITT Technical Institute NT2580 Course Project | | Jason R Spitler | 5/30/2014 | Based on the premises that Richman has 5000 employees throughout the main office and several branch offices, this document dictates research solutions and details the appropriate access controls including policies, standards, and procedures that define who users are, what they can do, which resources they can access, and which operations they can perform on a system. | Final Project I. Richman Internet Infrastructure Security Management Upgrade A. Purpose Based on the premises that Richman has 5000 employees throughout the main office and several branch offices, this document dictates research solutions and details the appropriate access controls including policies, standards, and procedures that define who users are, what they can do, which resources they can access, and which operations they can perform on a system. II. Basic Authentication Procedures and Standards, (Who users are.) A. Trinity-Three-factor Authentication Method replaces Basic Authentication It is my view the Administrator’s responsibility is to provide secure communications by adding layers of security at all levels to assure the amount of protection for company’s valuable assets. Richman will provide its employees a new method of authentication I call Trinity. It is a three-factor authentication method requiring updated laptops...

Words: 1901 - Pages: 8

Premium Essay

Nt 1210

...circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1210 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College Mathematics I MA1310 College Mathematics II Networking Technology Courses Programming...

Words: 4400 - Pages: 18

Premium Essay

Nt1210 Introduction to Networking Onsite Course

...circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1210 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College Mathematics I MA1310 College Mathematics II Networking Technology Courses Programming...

Words: 4400 - Pages: 18

Premium Essay

Nothing

...whether or not they are in class. Late penalties will be assessed for any assignments or labs handed in past the due date. The student is responsible for replacement of the package if lost. Table of Contents Syllabus 2 Student Professional Experience 19 Graded Assignments and Exercises 23 Labs 47 Documenting your Student Professional Experience 57 ITT Technical Institute NT1310 Physical Networking Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1210 Introduction to Networking or equivalent Course Description: This course examines industry standards and practices involving the physical components of networking technologies (such as wiring standards and practices, various media and interconnection components), networking devices and their specifications and functions. Students will practice designing physical network solutions based on appropriate capacity planning and implementing various installation, testing and troubleshooting techniques for a computer network. Where Does This Course Belong? | | | NT2799 | | | | | | | | NSA Capstone | | | | | | | Project | | | | | NT2580 | | | NT2670 | NT2640 | | PT2520 | | Introduction to | | | | | | | | | | | Email and Web | | | | | Information | | | | IP Networking | | Database Concepts | | | | | Services | | | | | ...

Words: 10839 - Pages: 44