Develop a network security policy for environment

Assignment Help Computer Networking
Reference no: EM131121847

Security Policies

Required 3-4 pages.

You were hired as the manager for network services at a medium-sized firm. This firm has 3 offices in 3 American cities. Recently, the firm upgraded its network environment to an infrastructure that supports converged solutions. The infrastructure now delivers voice, data, video, and wireless solutions. Upon assuming the role of network manager, you started reviewing the documentation and policies in place for the environment to ensure that everything is in place for the upcoming audit. You notice that a formal network security policy is nonexistent. You need one. The current network environment and services are listed below:

• The environment hosts a customer services database.

• The e-mail service is available, with each user having his or her own mailbox.

• There is a sales team of 20 staff. They work remotely using laptops.

• A routed voice network exists between offices.

• Web services are available to clients on the Internet.

• Wireless services cover public areas and conferences rooms.

Considering the network environment, services, and solutions that are supported, develop a network security policy of 3-4 pages for the environment.

• Give consideration to each service, and recommend protection measures.

• Risk mitigation is of extreme importance.

• Confidentiality and integrity are important factors of network security. However, it should not affect availability.

Reference no: EM131121847

Questions Cloud

Discuss the arguments for and against the capitalization : Calculate Darby Sporting Goods Inc.'s 2011 depreciation expense, for book purposes, for each of the properties acquired from Encino Athletic Equipment Company.
Scheduling and the interchange argument : (Scheduling and the Interchange Argument) In some scheduling problems it is useful to try to characterize a globally optimal solution based on the fact that it is locally optimal with respect to the 2-OPT heuristic.
Result in the process with six- sigma capability : Natural Foods sells Takeoff, a breakfast cereal, in one-pound boxes. According to Food and Drug Administration (FDA) regulations, a one- pound box must contain at least 15.5 ounces of cereal. However, Natural Food’s box- filling process is not perfec..
Scheduling problems viewed as assignment problems : (Scheduling Problems Viewed as Assignment Problems) A machine can be used to perform a subset of N given tasks over T time periods. At each time period t, only a subset A(t) of tasks can be performed. Each task j has value j (t) when performed at ..
Develop a network security policy for environment : Give consideration to each service, and recommend protection measures. Risk mitigation is of extreme importance. Confidentiality and integrity are important factors of network security. However, it should not affect availability.
Despite social differences among individuals-culture-race : Sociologists explain that despite social differences among individuals, such as language, culture, race, ethnicity, religion, age, gender, and social class, we all have the capacity to communicate with one another. Discuss the following: What are som..
Rollout algorithms based on greedy algorithms : Rollout Algorithms Based on Greedy Algorithms) In the context of the rollout algorithm, suppose that given a partial solution
Assume that the roads are usable only for logging : Compute the amount of depreciation and depletion expense for each of the 3 years (2010, 2011, 2012). Assume that the roads are usable only for logging and therefore are included in the depletion base.
Determine the tension in the cable : A 50-kg acrobat pedals her unicycle across the taut but slightly elastic cable. If the deflection at the center of the 18-m span is 75 mm, determine the tension in the cable. Neglect the effects of the weights of the cable and unicycle

Reviews

Write a Review

Computer Networking Questions & Answers

  Draw a network diagram in both aib and aoa format

Draw a network diagram in both AIB and AOA format that represents the development task list indicated below. Determine the earliest-latest starting and finishing times for each activity, the slack for each activity, and the critical path.

  Modify the network implementation plan

Describe the maintenance procedures planned for the proposed network, including a schedule of maintenance activities and the steps required for each activity.

  Highlighting the factors affecting selection of materials

Define the term material handling,highlighting the factors affecting selection of materials handling devices and finally give the principles of materials handling.

  Increasingly organisations are using computer-based tools

increasingly organisations are using computer-based tools for contracting tendering and procuring to meet project

  Using microsoft visio or an open source alternative such as

refer to the rmo csms domain model class diagram shown in figure 4-23 on page 111 of the textbook and the discussion of

  Discuss what actions can be taken by the tcp protocol

Discuss what actions can be taken by the TCP protocol to preserve a connection-oriented packet stream, particularly if there has been packet loss due to the route disruption. What are the consequences to throughput as a result of route breakage du..

  How to submit the assignment lsjdkljflkjs ksdkfksdfksdkjfkj

lsjdkljflkjs ksdkfksdfksdkjfkj kdsjfk kdjfk jsdkfj kdjfkjsdkfjksdjkfjkdsjf k sd lsjdkljflkjs ksdkfksdfksdkjfkj kdsjfk

  Chapter 331 describe why an application developer might

chapter 3.3.1 describe why an application developer might choose to run over tcp rather than udp.3.2 suppose host a is

  What delivery and deployment models should dsi adopt

What delivery and deployment models should DSI adopt for a cloud-based OSDS? How should 051 assess the risk of adopting a cloud-based OSDS

  Describe different common types of server applications

Make a list describing different common types of server applications. Show which of these applications you would combine together on a single server.

  Aalyze the security mechanisms needed to protect the dms

write a three to four 3-4 page paper in which you analyze the security mechanisms needed to protect the dms systems

  Define congestion

Define congestion. What are common causes of congestion (runts, giants, dropped packets, late collisions, input/output errors, etc.)

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd