Security Proposal Paper

1123 Words3 Pages

Security Proposal
Dustin Riedemann
Kaplan University
IT286: Introduction to Network Security
Prof: Denver Lee Martin
September 30, 2013

I. Authentication
Authentication – the use of a system to allow user’s access to a computer or network based on three factors: something you know, something you have and something you are.
Purpose: Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. This will allow you to only allow certain personnel to access certain files within your network. This will help you maintain network security so that unauthorized personnel will not be able to gain access to any important files or data.
Scope: This policy will cover everyone …show more content…

The goals of this policy are to be able to find and fix any problems that you are having or may have within your network, as well as prevent any attacks that may harm your systems or network.
Scope: The purpose of this policy is to be able to better secure your network and look for possible vulnerabilities that attackers can take advantage of within your network.
Roles/Responsibilities: This will be done by having testing and scanning software run within the network on a regular occasion or with every new update the network receives. The network security team will make sure that this is being done and the proper reports are presented to the management to be able to take any action that is needed for any problems that come up. The management will then decide the best course of action and delegate that to the network security department for implementing.
Sanctions/Violations: If this policy is to be broken, the guilty party will be warned of their wrongdoing and be asked to leave for the day. If any further incidents happen with the same employee or employees, they will be subject to termination at the management’s discretion.

III. Data Security – Certificate …show more content…

This means that someone that was able to receive the key will have access to everything they want within your network. They will be able to act as the other party to gain trust in order to access said files.

IV. Auditing
Auditing – the process of ensuring policies are enforced including user access and rights review, privilege auditing, usage auditing, escalation auditing, administrative auditing, and log file auditing.
Purpose: The purpose of auditing is to find any mistakes that may have been made and suggest a way to fix those mistakes. This can be a way to help better your security within your network.
Scope: This involves bringing in a person to do an audit of your systems and network. It is better to bring in someone that does not know anything about your network because they will not be bias and will be able to tell you what is going on and if anything needs to be fixed or changed. This may also require your employees to provide information about their department’s projects and

Open Document