Design a complete network security policy for the company

Assignment Help Management Information Sys
Reference no: EM131911304

Designing a Complete Network Security Policy

Learning Outcomes: At the end of the assignment, student should be able:

To have an understanding of the network security issues in organizations and how to solve them by developing and applying a network security policy, which contains different security techniques and solutions at different levels in any organization.

Company: (Choose any business organization with multiple branches you wish to secure with complete description and background of services and other offerings)

As network security specialist your task is to develop and design a complete network security policy for the organization you have selected securing its network from different security vulnerabilities in a WAN environment where users will not only be connected locally but also globally using Internet.

It must focus on securing following aspects:

? Individual users security

? Securing PC's and other peripheral devices

? Securing Mobile devices and their connectivity

? Securing Network devices and equipment's

? Securing different Servers

? securing Network Bandwidth

? Securing Emails and email Servers

? Securing Webservers and organizational website

? Securing Remote access users and sites etc.

Individual Deliverables (Research & Documentation by individual members)

You have to complete this assignment by coming up with a complete security plan including a proper layered security strategy mentioning about security protocols, services allowed and disallowed, authentication and authorization systems, network security devices (hardware and software), firewall & their configurations, IDS and VPN systems, Remote Access Systems for remote users etc.

The complete network policy should have a practical implementation approach with regard to administrative perspective. It must be properly documented with
references, justifications and diagrams wherever necessary to deem the assignment being successfully completed.

You have to research and find best optimal and practical solutions for above components by giving proper evaluations to justify your policy solutions and arrange them in a complete network security policy to secure the organization.

Deliverables

Based on the above requirements you have to develop a document and submit it to blackboard with all your group member details with their specific tasks they performed in a matrices table.

Expected length is 5,000 - 7,000 words, with as many illustrations as possible and with all references clearly  indicated and provided. You can use a diagramming application, e.g. Visio, for diagrams and copy them to the Word Document.

Reference no: EM131911304

Questions Cloud

Prepare journal entries for the interest payment : Recall expenses totaled $2,000. Prepare journal entries for the interest payment and retirement of the bond for McDaniel
Integrating the major concepts : This will require integrating the major concepts they may include merging, acquiring, divesting, outsourcing, offering a new product or service
Compute the monthly break-even point for the new product : Compute the monthly break-even point for the new product in units and in total dollar sales. How many units must be sold each month to make a monthly profit
What do you think would happen if the increase were required : Many individuals have property that increases in value over time. What do you think would happen if these increase were required to be included in gross income?
Design a complete network security policy for the company : Choose any business organization with multiple branches you wish to secure with complete description and background of services and other offerings.
Compare the breakeven points : Compare the breakeven points for these two different options. Assuming the firm believes it can sell 2,800 units of its product at the $10 price
Calculate the variable manufacturing costs : In Managerial accounting how do you calculate the variable manufacturing costs on your flexible budget?
What is volatility smile and smirk : What's volatility smile and smirk? In what markets do we see volatility smile? In what markets do we see volatility smirk? Why are they interesting?
Prepare the journal entries that rod corporation recorded : Prepare the journal entries that Rod Corporation recorded during 20X4 related to its investment in Stafford Corporation

Reviews

Write a Review

Management Information Sys Questions & Answers

  How sustainable is zongshens strategy

How did Zongshen acquire the capabilities to produce motorcycles and how sustainable is Zongshen's strategy?

  Reply to supply chain managementsupply chain management scm

reply to supply chain managementsupply chain management scm has been a popular buzzword since the mid 1990s and has had

  How should dsi assess the risk of adopting cloud-based osds

DSI Management is planning to adopt Proposal 2 but have asked you to give them a report that looks at the following aspects of the proposal: What model should DSI adopt for a cloud-based OSDS? How should DSI assess the risk of adopting a cloud-based..

  Explain at least two data security measures

Suppose you are also in charge of securing your organization's data. Identify at least two data security measures that you believe are necessary to prevent data security issues. Justify your response.

  Create presentations using cascading style sheets and dhtml

Describe the structure of the World Wide Web as interconnected hypertext documents. Create and validate HTML documents. Create presentations using Cascading Style Sheets and DHTML.

  Describing the website you are developing

Describing the website you are developing. Identify the organization, the type of business, and the objectives of the website. Be original.

  Internal controls and risk managementsmith a certified

internal controls and risk managementsmith a certified public accounting firm was engaged to audit the financial

  Examine the proposed business ethical problem

Examine the proposed business ethical problem that the Brazilian Federal Data Processing Service is presently experiencing.

  Describe how you would build report with your audience

describe how you would build report with your audience in a business presentation.What motivational strategies have you used in the past that were successful or what strategies have you seen speakers use that were effective? Use at least one resou..

  Explain the roles and responsibilities of people

Explain the roles and responsibilities of people working in retail supply management. Explain how these roles and responsibilities are applied at your organization or an organization with which you are familiar.

  Why the lynx companys functional system has been successful

Identify five reasons why the Lynx Company's functional system has been successful (be sure to expand your discussion on each reason)

  Apply ethics to information systems

Write an analysis of ethical considerations for maintaining privacy and confidentiality of customer data within your organization. Address the following issues in your analysis: Define ethics. Apply ethics to information systems

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd