Tuesday, May 19, 2020

Network Security Proposal - 1733 Words

Joe Bailey ITS-2120 Network Security Proposal Introduction Fixem Orthopedic Therapy is a physical therapy facility that treats people who are recovering from various musculoskeletal surgeries. The company is based in Southern Maryland and consists of three separate offices: one in Brandywine, one in Indian Head, and an office that was recently built in Waldorf. These offices connect to each other through WAN links, and they are also capable of connecting to local doctors’ offices which allows patient records to be easily sent from a patient’s doctor to the facility that needs them. Fixem Orthopedic must ensure that only authorized individuals, mainly the receptionists and physical therapists, can have access to these sensitive records.†¦show more content†¦The firewalls also have intrusion prevention systems (IPSs) that will alert the administrator of attacks as well as try to stop the attacks from being successful. In order for these firewalls to be truly effective, the software and virus signature files must be updat ed as soon as new updates become available. To ease administration, the network administrator may want to set up automatic updates on the firewall. The next step will be to install antivirus software on all workstations and servers. I recommend the Norton 360 antivirus suite, because it can detect and protect against many different types of malware including viruses, spyware, phishing attempts, and botnets. It can also scan emails as well as block emails it considers spam (Norton 360). As with the firewalls, this software should be updated as often as soon as new updates are available. If any intrusions manage to get through the firewall or antivirus software, the network administrator must be notified immediately. He or she must then immediately notify Fixem Orthopedic’s CEO. Security awareness training should be conducted as part of an employee’s hiring process and should be enforced periodically through the use of newsletters, emails, training videos, etc. to help employees understand the dangers of having an unsecured network. An effective password policy is vital in helping protect employee accounts from being accessed by unauthorized individuals.Show MoreRelatedEssay about Proposal: Network Security1217 Words   |  5 PagesThe organization had just secured a government contract worth millions of dollars. The sensitive nature of the information requires the company evaluate and address security measures. With any network, there are many threats, both internal and external, that can result in loss of productivity, loss of data and even theft of information. I will address several of these threats and propose measures to ensure a protected environment and to mitigate these risks. Vulnerability Assessment EntryRead MoreEssay about Technical Security Policy Proposal for Small Company1064 Words   |  5 PagesTicTek Inc is a small company with about a hundred employees and one facility. The company sells home security electronics online. The devices are manufactured by a third party company and shipped to TicTek, whereupon they are warehoused until they are purchased through the company’s website. The warehouse staff prepares and ships customer orders in the same facility which houses the office staff and management. TicTek has a few major stockholders, but the majority of the company’s stock is ownedRead MoreRemote Access And Using Extensible Authentication Protocol Essay1129 Words   |  5 Pagesdata outside the office which presents many security challenges. Not only is the end user accessing your network resources and potentially sensitive data, but they are many times doing so from a public network which the admin has no control over and is open to others who m ay have malicious intent. These connections clearly need to be properly secured in order provide end users secure network connections. To secure remote connections, a virtual private network (VPN) will created using the Routing andRead MoreRequest For Proposal Rfp ( Rfp )1271 Words   |  6 PagesREQUEST FOR PROPOSAL (RFP) WIRELESS COMP COMPANY REAPER MACHINES 2335 LENOX ST. CHARLOTTE, NC, 28056 8/11/2014 TABLE OF CONTENTS 1. SUMMARY AND BACKGROUND 2 2. PROPOSAL GUIDELINES 2 3. PROJECT PURPOSE AND DESCRIPTION 3 4. PROJECT SCOPE 3 5. PROPOSAL AND PROJECT TIMELINE 4 6. BUDGET 5 7. PROPOSAL EVALUATION CRITERIA 6 1. SUMMARY AND BACKGROUND Death Comm is currently accepting proposals to develop, design, launch, and host a new Wireless Network within their building. TheRead MoreImpact Of Legislation On Vanderbilt University Medical Center1234 Words   |  5 PagesImpact of Legislation on Vanderbilt University Medical Center Ebony S. Spann Security Policy Analysis (CSIA 412) March 29, 2015 Abstract With the Age of technology advancing, the more cyber-attacks are occurring. Many of our information are on computer networks and we like to think that our information is well protect. But how protected is our information? Cybersecurity bills are introduced in Congress almost every year. These bills regularly imply to permit organizationsRead MoreEssay on Access Control FInal Project1199 Words   |  5 Pagesï » ¿ITT Technical institute – isc program Project: Access Control Proposal IS3230 - Access Control Bernard Downing David Crenshaw /2014 1 INTRODUCTION 1.1 Title of the project Access Control Proposal Project for IDI 1.2 Project schedule summary The project will be a multi-year phased approach to have all sites (except JV and SA) on the same hardware and software platforms. 1.3 Project deliverables †¢ Solutions to the issues that specifies location of IDI is facing †¢ Plans to implement corporate-wideRead MoreModelling Of Scada Networks By Implementing The Dbsy Modelling Method, And Risk Assessment997 Words   |  4 PagesIMPLICATION OF DBSY ON SCADA NETWORKS RESEARCH ADVISORS: DR. PAVOL ZAVARSKY SHIREESHA KATAM {skatam@student.concordia.ab.ca}- ID: 130526 DECEMBER 03, 2014 1 Research Statement This research proposal is focused on modelling of SCADA networks by implementing the DBSy modelling method, and risk assessment. 2 Problem Statement SCADA and ICS are the Critical Infrastructures, Which Operates a number of significant resources including fuel, energy, water, airports, and biotech and run many day-day utilitiesRead MoreInformation Technology And The Health Systems1301 Words   |  6 PagesInformation Technology (IT) Initiative Proposal As the business analyst for the Health Systems, Inc., I had was afforded the opportunity to conduct an analysis on the current information technology systems. Upon recognizing and discovering several issues within the Health Systems, Inc. existing information technology systems, my team and I are preparing resolutions for each and every one of them. In addition to these resolutions, we will incorporate an Information Security and Assurance platform as wellRead MoreThe System Development Life Cycle1357 Words   |  6 Pageswith respect to the IIS and its data. In addition, the security policy should include appropriate procedures to ensure local site data and software are properly managed. The IIS applications such as general reader, general user, and site manager need to be created to support the objectives of the policies (Arzt, 2007). In addition, this proposal will apply the System development Life Cycle (SDLC) in developing information security policy. A. Process: This project will attempt to address privacyRead MoreMetric Multistandard Components Case 3 Corp.: Essay1177 Words   |  5 PagesWith 22,000 customers, 48,800 cataloged parts, and 150 employees working in five U.S. locations and an office in Germany, the last thing John Bellnier needs is an unreliable network. Yet that’s exactly what he contended with for years as IT manager at Metric Multistandard Components Corp. (MMCC). MMCC may still be classified as a small business by some standards, but this small-to-medium business (SMB) definitely has been a big-time success story in its industry. MMCC was founded in 1963

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.