Computer Science > Research Paper > Research Paper > ITT Tech - IS3220 Final Project Network Security Plan (All)
As a Network Security Team, we will be proving IDI with a network security plan to mitigate the vulnerabilities that have been discovered. A secure site will be set up with network intrusion detectio ... n and network protection systems and will be available to access via the internal network. Policies will be presented for remote access and the use of VPN. Also will be in this report will be strategies for hardening the network and mitigating risks. An updated network layout with increased network security to meet the current needs will be included. In the interest of business continuity, remote access will be utilized. User wishing access to internal network assets will only be able to access said assets with the use of a company issued laptop. We will make use of MAC address filtering to allow remote users access to the internal network via VPN. Each have the remote access laptops will have been loaded with VPN and have the MAC address added to the list on the MAC address filter. ITT Tech - IS3220 Final Project Network Security Plan As a Network Security Team, we will be proving IDI with a network security plan to mitigate the vulnerabilities that have been discovered. A secure site will be set up with network intrusion detection and network protection systems and will be available to access via the internal network. Policies will be presented for remote access and the use of VPN. Also will be in this report will be strategies for hardening the network and mitigating risks. An updated network layout with increased network security to meet the current needs will be included. In the interest of business continuity, remote access will be utilized. User wishing access to internal network assets will only be able to access said assets with the use of a company issued laptop. We will make use of MAC address filtering to allow remote users access to the internal network via VPN. Each have the remote access laptops will have been loaded with VPN and have the MAC address added to the list on the MAC address filter. Multi Layered Security Plan Corporation Tech 1. User Domain 2. Workstation Domain 3. LAN Domain 4. LAN to WAN Domain 5. WAN Domain 6. Remote Access Domain Policies and Procedures Acceptable Use Policy Remote Access Policy Remote Access Password Policy Remote Device Policy Security Awareness Policy Internet Use Policy Access Control Policy Data Classification Policy VPN Policy Compromise or Infection Policy [Show More]
Last updated: 3 years ago
Preview 1 out of 7 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Feb 27, 2021
Number of pages
7
Written in
All
This document has been written for:
Uploaded
Feb 27, 2021
Downloads
0
Views
110
Scholarfriends.com Online Platform by Browsegrades Inc. 651N South Broad St, Middletown DE. United States.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·