Computer Science  >  Research Paper  >  Research Paper > ITT Tech - IS3220 Final Project Network Security Plan (All)

Research Paper > ITT Tech - IS3220 Final Project Network Security Plan

Document Content and Description Below

As a Network Security Team, we will be proving IDI with a network security plan to mitigate the vulnerabilities that have been discovered. A secure site will be set up with network intrusion detectio ... n and network protection systems and will be available to access via the internal network. Policies will be presented for remote access and the use of VPN. Also will be in this report will be strategies for hardening the network and mitigating risks. An updated network layout with increased network security to meet the current needs will be included. In the interest of business continuity, remote access will be utilized. User wishing access to internal network assets will only be able to access said assets with the use of a company issued laptop. We will make use of MAC address filtering to allow remote users access to the internal network via VPN. Each have the remote access laptops will have been loaded with VPN and have the MAC address added to the list on the MAC address filter. ITT Tech - IS3220 Final Project Network Security Plan As a Network Security Team, we will be proving IDI with a network security plan to mitigate the vulnerabilities that have been discovered. A secure site will be set up with network intrusion detection and network protection systems and will be available to access via the internal network. Policies will be presented for remote access and the use of VPN. Also will be in this report will be strategies for hardening the network and mitigating risks. An updated network layout with increased network security to meet the current needs will be included. In the interest of business continuity, remote access will be utilized. User wishing access to internal network assets will only be able to access said assets with the use of a company issued laptop. We will make use of MAC address filtering to allow remote users access to the internal network via VPN. Each have the remote access laptops will have been loaded with VPN and have the MAC address added to the list on the MAC address filter. Multi Layered Security Plan Corporation Tech 1. User Domain 2. Workstation Domain 3. LAN Domain 4. LAN to WAN Domain 5. WAN Domain 6. Remote Access Domain Policies and Procedures Acceptable Use Policy Remote Access Policy Remote Access Password Policy Remote Device Policy Security Awareness Policy Internet Use Policy Access Control Policy Data Classification Policy VPN Policy Compromise or Infection Policy [Show More]

Last updated: 3 years ago

Preview 1 out of 7 pages

Buy Now

Instant download

We Accept:

Payment methods accepted on Scholarfriends (We Accept)
Preview image of Research Paper > ITT Tech - IS3220 Final Project Network Security Plan document

Buy this document to get the full access instantly

Instant Download Access after purchase

Buy Now

Instant download

We Accept:

Payment methods accepted on Scholarfriends (We Accept)

Reviews( 0 )

$13.00

Buy Now

We Accept:

Payment methods accepted on Scholarfriends (We Accept)

Instant download

Can't find what you want? Try our AI powered Search

110
0

Document information


Connected school, study & course


About the document


Uploaded On

Feb 27, 2021

Number of pages

7

Written in

All

Seller


Profile illustration for Kirsch
Kirsch

Member since 6 years

949 Documents Sold

Reviews Received
111
37
8
4
28
Additional information

This document has been written for:

Uploaded

Feb 27, 2021

Downloads

 0

Views

 110

Document Keyword Tags

Recommended For You

Get more on Research Paper »

$13.00
What is Scholarfriends

Scholarfriends.com Online Platform by Browsegrades Inc. 651N South Broad St, Middletown DE. United States.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Scholarfriends · High quality services·