Premium Essay

Project Part 1 Multilayered Security Plan

In: Computers and Technology

Submitted By masr20
Words 472
Pages 2
Project Part 1

As of today, millions of threats have become reality in today’s technological world. In order to prevent our network from become one of millions affected, steps to secure all seven domains have to be implemented. The OSI Model consists of these seven layers: Application, Presentation, Session, Transport, Network, Data Link, and Physical layer. Most frequent attacks start of in the Application layer, and that’s only because it is the layer most of us are familiar with. This layer deals with the user. In order to prevent an attack on this layer security measures need to be set. For example, anti-viruses can scan systems for unwanted malicious programs from contaminating the system by scanning files and drives as well as program that could be potentially downloaded either by accident or on purpose. Policies can also be provided to employees stating that they are only allowed to do certain things on company systems. Once the employee has signed such policy, if they ever violate it, they can be reprimanded or terminated, depending on the severity of their actions. In the Presentation Layer, data is encrypted. In order to protect this layer, a complex for of encryption should take effect. Encryption such as AES could be implemented in order to avoid data from being decrypted easily. The Session Layer deals with communication between hosts. We can protect this layer by using encrypted VPN’s as well as secured connections. The Transport Layer and the Session Layer work closely together. By securing each connection, we can prevent data loss as well as bandwidth usage. If something is taking up a large amount of bandwidth, it is usually not a good sign. For the Network Layer, packets need to be encrypted. In order to keep this layer under control, firewalls should be in place with protocols preventing the use of sites that can potentially create...

Similar Documents

Free Essay

Project Part 1,

...Project Part 1 : Multilayered Security Plan The safety and security of information owned by Richman Investments is extremely important and needs to monitored constantly. Through the following outline I hope to enhance the companies security, update systems and applications and ensure the integrity of the information stored on the network. The outlined areas will be monitored and reported monthly to senior management and will be updated as needed. The following outline will touch on each domain and will include security measures needed for those domains. 1.0 User Domain 2.1 Mobile storage disabled 2.2 Admittance to work area and computer with badge only. No visitors permitted 2.3 Multi-layered authentication with username/password and either token or biometrics 2.4 Training of new hires or quarterly training of current employees on security awareness 2.5 Security software with scanning capabilities to ensure no malware or virus intrusion is allowed. 2.0 Workstation 3.6 Hardware inventory taken quarterly to asses needs for new equipment or updates. 3.7 Software database examined to asses need for updates or antivirus renewal. 3.8 Different departments will be assessed groups in active directory to prevent authorization conflicts or confusion 3.9 Admittance to workstations will only be permitted with proper credentials, badge or token. 3.0 Lan 4.10 All cabinets and server rooms will be......

Words: 656 - Pages: 3

Free Essay

China in Mozambique: a Cautious Approach Country Case Study

...OCCASIONAL PAPER NO 23 China in Africa Project January 2009 China in Mozambique: A Cautious Approach Country Case Study at io n al Af fai r s Paula Cristina Roque rn te f In eo t tit u . Ins hts can fr i ig ins South A l a Glob African perspectives. ABOUT SAIIA The South African Institute of International Affairs (SAIIA) has a long and proud record as South Africa’s premier research institute on international issues. It is an independent, non-government think-tank whose key strategic objectives are to make effective input into public policy, and to encourage wider and more informed debate on international affairs with particular emphasis on African issues and concerns. It is both a centre for research excellence and a home for stimulating public engagement. SAIIA’s occasional papers present topical, incisive analyses, offering a variety of perspectives on key policy issues in Africa and beyond. Core public policy research themes covered by SAIIA include good governance and democracy; economic policymaking; international security and peace; and new global challenges such as food security, global governance reform and the environment. Please consult our website www.saiia.org.za for further information about SAIIA’s work. This paper is the outcome of research commissioned by SAIIA’s China in Africa Project. ABOUT THE CHINA IN AFRICA PROJECT SAIIA’s ‘China in Africa’ research project investigates the emerging......

Words: 9089 - Pages: 37

Free Essay

Metro Cash N Carry

...INTRODUCTION TO METRO METRO Cash & Carry – this name stands for one of the great success stories in modern commerce. The unique wholesale business-to-business model of METRO Cash & Carry is focused only towards professional customers such as hotels, restaurant, and caterers as well as small and mid-sized retailers. METRO Cash & Carry offers this target group a greater efficiency than the multilayered supply chain thus helping them to improve their business: By offering them a one-stop solution for their purchases, by helping them to improve their assortment, by offering them high quality products at reasonable and transparent prices and by offering them a consistent supply source. What does METRO offer? METRO Cash & Carry is a reliable partner for more than 20 million professional customers worldwide. It gives them a clear competitive advantage in their own markets. Professionals can purchase everything they need to run their business: A restaurant owner, for example, can buy food like fish or vegetables as well as kitchen equipment and office supplies. METRO Cash & Carry offers an exceptionally wide range of highquality products under one roof. Depending on the size and type of wholesale center, the assortment includes up to 20,000 items in the food range and 30,000 items in the nonfood sector. As the name implies, METRO Cash & Carry customers select their own items and take them with them to their restaurants and shops. With this unique business-to-business concept, the......

Words: 2877 - Pages: 12

Free Essay

Satellite Defence System

...SATELLITE MISSILE DEFENCE SYSTEM Introduction. 1. United States of America has conducted extensive research and development on various types of missile defense technologies for decades. In December 2002, President Bush announced the United States would begin fielding several components of an anti-missile system designed to protect U.S. territory from attack by long-range (strategic) ballistic missiles under the project termed as National Missile Defence System. In July 2004, it fielded the first ground-based interceptor at Ft. Greely, Alaska, and since then has fielded and upgraded radars, built command and communication networks, and added interceptors at various Air Force Base inside USA and also pressing to field interceptors and a radar in Eastern Europe. 2. Hence, National missile defense (NMD) is a generic term for a type of missile defense intended to shield an entire country against incoming missiles, such as intercontinental ballistic missile (ICBMs) or other ballistic missiles. Interception might be by anti-ballistic missiles or directed-energy weapons such as lasers. Interception might occur near the launch point (boost phase), during flight through space (mid-course phase), or during atmospheric descent. 3. The system would use ground-based radars and space-based infrared and visible sensors, and the kill vehicle would be equipped with infrared and visible sensors intended to destroy targets by colliding with them in the mid-course of their......

Words: 4449 - Pages: 18

Premium Essay

Making Money

...Guidelines for Secure Use of Social Media by Federal Departments and Agencies Information Security and Identity Management Committee (ISIMC) Network and Infrastructure Security Subcommittee (NISSC) Web 2.0 Security Working Group (W20SWG) Version 1.0 September 2009 This document is publicly releasable Intended Audience This document is intended as guidance for any federal agency that uses social media services to collaborate and communicate among employees, partners, other federal agencies, and the public. Note: The Federal CIO Council does not endorse the use or imply preference for any vendor commercial products or services mentioned in this document. Guidelines for Secure Use of Social Media by Federal Departments and Agencies Page 2 TABLE OF CONTENTS INTENDED AUDIENCE............................................................................................................................................2 REVISION HISTORY ................................................................................................................................................4 ACKNOWLEDGEMENTS ........................................................................................................................................5 EXECUTIVE SUMMARY .........................................................................................................................................6 RISKS ......................................................

Words: 7347 - Pages: 30

Premium Essay

Computer Science

...Question 1 0.5 out of 0.5 points | | | What name is given to an act carried out in the open?Answer | | | | | Selected Answer: |    overt act | Correct Answer: |    overt act | | | | |  Question 2 0 out of 0.5 points | | | What is a characteristic of a hardened computer or device?Answer | | | | | Selected Answer: |    Unnecessary services have been turned off or disabled | Correct Answer: |    Both A and B | | | | |  Question 3 0.5 out of 0.5 points | | | Social engineering is a fancy phrase for lying. It involves tricking someone into sharing confidential information or gaining access to sensitive systems. In many cases, the attacker never comes face to face with the victim. Instead, the attacker might phone an employee and pose as a (n) ________________________. All too often, attackers trick employees into sharing sensitive information. After all, employees think, what’s wrong with giving your password to a(n) ________________?Answer | | | | | Selected Answer: |    system administrator | Correct Answer: |    system administrator | | | | |  Question 4 0 out of 0.5 points | | | Which of the following is not a type of monitoring device?Answer | | | | | Selected Answer: |    IPS | Correct Answer: |    Server log | | | | |  Question 5 0.5 out of 0.5 points | | | What is meant by clipping levels?Answer | | | | | Selected Answer: |    Values used in security......

Words: 12833 - Pages: 52

Premium Essay

Db Testing

...8/26/2004 Beyond the GUI: What You Need to Know about Database Testing Presented by: Mary R.Sweeney Exceed Technical Training & Consultation Copyright Sammamish Software Services 2003. All rights reserved. 1 Today’s complex software systems access heterogeneous data from a variety of backend databases. The intricate mix of client-server and Web-enabled database applications are extremely difficult to test productively. Testing at the data access layer is the point at which your application communicates with the database. Tests at this level are vital to improve not only your overall test strategy, but also your product’s quality. In this presentation you’ll find out what you need to know to test the SQL database engine, stored procedures, and data views. Find out how to design effective automated tests that exercise the complete database layer of your applications. You’ll learn about the most common and vexing defects related to SQL databases and the best tools available to support your testing efforts. Copyright Sammamish Software Services 2003. All rights Reserved 1 8/26/2004 The Data Access Layer Testing at the data access layer is the point at which your application communicates with the database. ! In this presentation we’ll discuss why tests at this level are vital to improve not only your overall test strategy, but also your product’s quality ! Copyright Sammamish Software Services 2003. All rights reserved. 2 How to design effective......

Words: 5030 - Pages: 21

Premium Essay

Paper

...Management of Information Security Third Edition This page intentionally left blank Management of Information Security Third Edition Michael Whitman, Ph.D., CISM, CISSP Herbert Mattord, M.B.A., CISM, CISSP Kennesaw State University ———————————————————————— Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Management of Information Security, Third Edition Michael E. Whitman and Herbert J. Mattord Vice President, Career and Professional Editorial: Dave Garza Executive Editor: Stephen Helba Managing Editor: Marah Bellegarde Product Manager: Natalie Pashoukos Developmental Editor: Lynne Raughley Editorial Assistant: Meghan Orvis Vice President, Career and Professional Marketing: Jennifer McAvey Marketing Director: Deborah S. Yarnell Senior Marketing Manager: Erin Coffin Marketing Coordinator: Shanna Gibbs Production Director: Carolyn Miller Production Manager: Andrew Crouth Senior Content Project Manager: Andrea Majot Senior Art Director: Jack Pendleton Cover illustration: Image copyright 2009. Used under license from Shutterstock.com Production Technology Analyst: Tom Stover © 2010 Course Technology, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored, or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution,......

Words: 229697 - Pages: 919

Free Essay

Scope of Service

...[pic] STATE GOVERNMENT DEPARTMENT OF FINANCE AND ADMINISTRATION REQUEST FOR PROPOSALS FOR INFORMATION SECURITY ASSESSMENT SERVICES (ISAS) RFP NUMBER: 427.04-107-08 |CONTENTS | |SECTION | | |1 |INTRODUCTION……………………………………………………………………………….3 | |2 |RFP SCHEDULE OF EVENTS………………………………………………………………..................................6 | |3 |PROPOSAL REQUIREMENTS………………………………………………………………7 | |4 |GENERAL REQUIREMENTS & CONTRACTING INFORMATION………………….…..9 | |5 |PROPOSAL EVALUATION & CONTRACT AWARD…………………………………....13 | | | |RFP ATTACHMENTS: | | ...

Words: 40549 - Pages: 163

Premium Essay

Becoming the Boss

...to management responsibilities. VEN FOR THE MOST GIFTED INDIVIDUALS, O S S hbr.org | January 2007 | Harvard Business Review 49 THE TESTS OF A LEADER | Becoming the Boss The failures aren’t surprising, given the difficulty of the transition. Ask any new manager about the early days of being a boss – indeed, ask any senior executive to recall how he or she felt as a new manager. If you get an honest answer, you’ll hear a tale of disorientation and, for some, overwhelming confusion. The new role didn’t feel anything like it was supposed to. It felt too big for any one person to handle. And whatever its scope, it sure didn’t seem to have anything to do with leadership. In the words of one new branch manager at a securities firm: “Do you know how hard it is to be the...

Words: 5923 - Pages: 24

Premium Essay

Hostel Management System

...data needs to include competitor market activity as well as information about the local health care systems. The results can be distributed to the sales force via a wide-area network that enables the representatives to review the recommendations from the perspective of the key attributes in the decision process. The ongoing, dynamic analysis of the data warehouse allows best practices from throughout the organization to be applied in specific sales situations. • A credit card company can leverage its vast warehouse of customer transaction data to identify customers most likely to be interested in a new credit product. Using a small test mailing, the attributes of customers with an affinity for the product can be identified. Recent projects have indicated more than a 20-fold decrease in costs for targeted mailing campaigns over conventional approaches. • A diversified transportation company with a large direct sales force can...

Words: 5855 - Pages: 24

Premium Essay

Vocab

...YAHOO & APPLE Course Project HRM 587 Managing Organizational Change Professor Change management: Yahoo & Apple What was true more than two thousand years ago is just as true today. We live in a world where "business as usual" is change. New initiatives, project-based working, technology improvements, staying ahead of the competition, emerging stronger from the recession - together these drive changes to the way we work. (from A Sense of Urgency, by John P Kotter Published By Harvard Business Press, 2008) Today more than ever before, we can feel that we live in an era of risk and instability. Globalization, new technologies, and greater transparency have combined to upend the business environment and give many CEOs a deep sense of unease. The management structure of an organization as well as personal leadership style CEO’s and other senior leaders’ affects how individuals within a company make decisions and how quickly the company reacts to various challenges and opportunities. From basic definition of change we learned that the origin of the necessity of change lies in the dissatisfaction with the current state or the perception of a problem. The objectives, content, and process of change should be specified as part of the change management plan. Change management processes can benefit from creative marketing to enable communication between change audiences, and a deep social understanding......

Words: 7727 - Pages: 31

Premium Essay

Capital Market of Bangladesh

...Paper On Topic: Bond Market In Bangladesh . Course Code :FIN-361. Course Title :Corporate Finance . Submitted To : MD.Nazmul Hasan. Faculty, School of Business, University of Information Technology & Sciences Submitted By : NAME ID Nazibur Rahman : 08410105 Abdullah- al Zihad : 08510061 Qazi Ismat Ahmed Rushe’d Chowdhery : 08410106 Date of Submission : 14th December, 2010. Executive Summary The bond market is a financial market where participants buy and sell debt securities, usually in the form of bonds. Like emerging-market countries around the world, Bangladesh could benefit from having a local-currency, fixed-income securities market. At present, its main fixed-income financial products are bank deposits, bank loans, government savings certificates, term loans, treasury bills, and government bonds and corporate debt (syndicated loans, private placement, and debentures). But in general the corporate debt market is still very small compared with the equity market. Numerous factors in Bangladesh today suggest that Bangladesh will not be able to develop an active, local-currency fixed-income market. In this paper, we will discuss the current situation of our bond market, what the drawbacks are and what may be the remedy for overcoming these drawbacks. Bangladesh's bond market......

Words: 17477 - Pages: 70

Premium Essay

Cisco Systems, Inc.: Collaborating on New Product Introduction

... The purpose of the gathering was to get the green light from senior management to manufacture a new high-end router that would make the giant networking company more competitive in an age of surging Internet traffic.1 The project’s code name, Viking, said it all. The router for broadband service providers would break ground in power and speed, reminiscent of the Norse warriors and explorers of Europe during the eighth to eleventh centuries. The meeting represented a culmination of several years of development work by a cross-functional, global team of Cisco specialists in engineering, manufacturing, marketing and other areas. Just months earlier, in mid-2007, Cisco overhauled the project by sharply boosting the router’s speed and capacity. This would allow the company to leapfrog competitors and offer a low-cost, powerful new router platform for the next 10 to 15 years. That day in November, the Viking team was seeking an “execution commit” from senior management in manufacturing. If it got the go-ahead, Cisco would be ready to commit the resources to launch the new product. But the Cisco team knew it faced many challenges. The Viking project would be one of the company’s most complex new product introductions ever. First, even though the project had been essentially re-started in mid-2007, Cisco was still aiming to announce the machine in November 2008. That would give it just a year to line up manufacturing, supply chain and marketing arrangements—an......

Words: 12040 - Pages: 49

Free Essay

Applied Soa

...Applied SOA Service-Oriented Architecture and Design Strategies Mike Rosen Boris Lublinsky Kevin T. Smith Marc J. Balcer Wiley Publishing, Inc. Applied SOA Applied SOA Service-Oriented Architecture and Design Strategies Mike Rosen Boris Lublinsky Kevin T. Smith Marc J. Balcer Wiley Publishing, Inc. Applied SOA: Service-Oriented Architecture and Design Strategies Published by Wiley Publishing, Inc. 10475 Crosspoint Boulevard Indianapolis, IN 46256 www.wiley.com Copyright  2008 by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada ISBN: 978-0-470-22365-9 Manufactured in the United States of America 10 9 8 7 6 5 4 3 2 1 No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at http://www.wiley.com/go/permissions. Limit of Liability/Disclaimer of Warranty: The publisher......

Words: 218699 - Pages: 875