Develop a network security policy for environment

Assignment Help Computer Networking
Reference no: EM131121847

Security Policies

Required 3-4 pages.

You were hired as the manager for network services at a medium-sized firm. This firm has 3 offices in 3 American cities. Recently, the firm upgraded its network environment to an infrastructure that supports converged solutions. The infrastructure now delivers voice, data, video, and wireless solutions. Upon assuming the role of network manager, you started reviewing the documentation and policies in place for the environment to ensure that everything is in place for the upcoming audit. You notice that a formal network security policy is nonexistent. You need one. The current network environment and services are listed below:

• The environment hosts a customer services database.

• The e-mail service is available, with each user having his or her own mailbox.

• There is a sales team of 20 staff. They work remotely using laptops.

• A routed voice network exists between offices.

• Web services are available to clients on the Internet.

• Wireless services cover public areas and conferences rooms.

Considering the network environment, services, and solutions that are supported, develop a network security policy of 3-4 pages for the environment.

• Give consideration to each service, and recommend protection measures.

• Risk mitigation is of extreme importance.

• Confidentiality and integrity are important factors of network security. However, it should not affect availability.

Reference no: EM131121847

Questions Cloud

Discuss the arguments for and against the capitalization : Calculate Darby Sporting Goods Inc.'s 2011 depreciation expense, for book purposes, for each of the properties acquired from Encino Athletic Equipment Company.
Scheduling and the interchange argument : (Scheduling and the Interchange Argument) In some scheduling problems it is useful to try to characterize a globally optimal solution based on the fact that it is locally optimal with respect to the 2-OPT heuristic.
Result in the process with six- sigma capability : Natural Foods sells Takeoff, a breakfast cereal, in one-pound boxes. According to Food and Drug Administration (FDA) regulations, a one- pound box must contain at least 15.5 ounces of cereal. However, Natural Food’s box- filling process is not perfec..
Scheduling problems viewed as assignment problems : (Scheduling Problems Viewed as Assignment Problems) A machine can be used to perform a subset of N given tasks over T time periods. At each time period t, only a subset A(t) of tasks can be performed. Each task j has value j (t) when performed at ..
Develop a network security policy for environment : Give consideration to each service, and recommend protection measures. Risk mitigation is of extreme importance. Confidentiality and integrity are important factors of network security. However, it should not affect availability.
Despite social differences among individuals-culture-race : Sociologists explain that despite social differences among individuals, such as language, culture, race, ethnicity, religion, age, gender, and social class, we all have the capacity to communicate with one another. Discuss the following: What are som..
Rollout algorithms based on greedy algorithms : Rollout Algorithms Based on Greedy Algorithms) In the context of the rollout algorithm, suppose that given a partial solution
Assume that the roads are usable only for logging : Compute the amount of depreciation and depletion expense for each of the 3 years (2010, 2011, 2012). Assume that the roads are usable only for logging and therefore are included in the depletion base.
Determine the tension in the cable : A 50-kg acrobat pedals her unicycle across the taut but slightly elastic cable. If the deflection at the center of the 18-m span is 75 mm, determine the tension in the cable. Neglect the effects of the weights of the cable and unicycle

Reviews

Write a Review

Computer Networking Questions & Answers

  Difference between a parent route and an ultimate route

Refering to figure below: You are the network administrator for the network depicted in the diagram. You have been assigned the address space 10.1.16.0/21 to create the LANs you need, and the 172.16.1.0/28 space for your WAN links. What is the ..

  Open systems interconnection (osi) protocol mode

Describe the Open Systems Interconnection (OSI) protocol model.

  Explain personnel implication setting up wan on global basis

Explain what the personnel implications are when setting up a WAN on a global basis. What are some of the barriers involved with global teams?

  How to select peer-to-peer-server-based or hybrid network

Individual employees also should be able to control resources their own machines. Would you select peer-to-peer, a server-based, or a hybrid network? Explain why?

  Wireless technologies to access various network resources

The following are the four main wireless technologies used to access various network resources: Radio wave, Infrared. Explain three advantages and three disadvantages of each of these wireless technologies.

  How many bits per second can the given modem transmit

The Hi-Fi Modem Company has just designed a new frequency-modulation modem that uses 64 frequencies instead of just 2. How many bits per second can this modem transmit, using synchronous transmission?

  Wan relies on the internet provider

The WAN relies on the Internet provider (Comcast) for all of the TCP/IP configuration and uses DHCP servers to assign local addresses to the computers.

  Network security

A lot of things can negatively impact network performance, from poor device drivers to competing traffic to inconsiderate users downloading gigabytes' worth of MP3s on your network.

  Question 1describe a malware attack that causes the victim

question 1describe a malware attack that causes the victim to receive physical advertisement.question 2suppose that a

  What is the ethernet standard used in such a vlan

Explain in detail with the help of diagrams the CSMA/CD media access control technique used in Ethernet and write a report on your observations analyzing the data collected in previous step.

  What was the most important aspect of the csiro patent

Investigate the history of the CSIRO Wifi patent which was recently up-held in courts in the United States. This patent covers significant aspects of the OFDM implementation which is used in modern Wifi devices.

  From the second e-activity decide which you would select to

envision that you are a systems administrator managing five different web servers for your company. each web server

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd