Intro to Information Security

In: Computers and Technology

Submitted By pixiestick45
Words 727
Pages 3
Into To security

Project Part 1: Multi-Layered Security Plan:
As part of my report, below is my outline for Richman Investments Multi-Layered Security Plan:

User Domains:
Since Users can access systems, applications and data depending on their roles and rights, an employee must conform to the staff manual and policies also known as the Acceptable Use Policy (AUP). The department manager or human resources manager is usually in charge of making sure that employee and in certain cases third party vendors, contractors ect sign and follow the AUP. To ensure that these threats and vulnerabilities can be avoided, a good policy would be to conduct security awareness training, update the employee manual and discuss the handbook, during performance reviews, disable internal CD drives and USB ports and enable automatic antivirus scans for inserted media drives, files, and email attachments, and lastly restrict access for users to only those systems, applications, and data needed to perform their jobs.

Workstation Domains:
These users configuring hardware, ensuring that all computers have the latest software revisions, security patches, and system configurations. To ensure that there are no threats with our software, enforce defined standards to ensure the integrity of user workstation and data, enable password protections on workstations for access, and auto screen lockout for inactive times, use content filtering and antivirus scanning at Internet, define workstation operating system vulnerability window policy definition, and deactivate all media ports
LAN (Local Area Network) Domain:
The users in this layer manage and maintain both the physical and the logical. Physicals would include the cabling, NIC (network interface cards) cards, and LAN switches. Users in this group maintain and support the departments file and print services and configure…...

Similar Documents

Intro to Information Security Notes

...Responses on port 80= a web service is running. HTTP Port 443- HTTPS To run port scans all you need is access to the LAN and/or subnet Technet.microsoft.com/en-us/security/advisory Mitigate vulnerabilities Threats are things you have to respond to effectively. Threats are controllable Risks are manageable Vulnerabilities can be mitigated All affect the CIA triad Not all threats are intentional Confidentiality, integrity, accessibility = CIA Starting on pg 161 DAC- only as secure as the individuals understanding. Access determined by owner. MAC- access determined by data classification itself. data itself has a classification. Need to be cleared to the level of the data security. Also has a “need to know” aspect to it. Non DAC- third party determines the permissions. Role based- pg 166. Access determined on the job of the user. Rule based- variation of DAC. Rules are created and access is based on the rules created. Week of 4/17/13 Starts on pg 146 Project- search SSCP CBK on the library under 24/7 Each of the 7 domains, vulnerabilities in each, security used in each to control, For lab 5--- Make 4 types of connections. 2 secure 2 not secure. telnet, securenet, ssh, and ftp. Will need 3 machines. Student, Target, ubuntu 1 Wireshark setting to capture a file in promiscuous mode on student. Do an FTP to target windows. Command prompt from student to ubuntu. Try to log in. Do questions. Question 9, focus on SSH and what traffic you are......

Words: 907 - Pages: 4

Intro to Information Security

...1. User Domain defines the people who access an organization’s information system. 2. The Workstation Domain is where most users connect to the IT infrastructure. It can be a desktop computer, or any device that connects to your network. 3. The Local Area Network (LAN) Domain is a collection of computers connected to one another or to a common connection medium. Network connection mediums can include wires, fiber optic cables, or radio waves. 4. A LAN-TO-WAN Domain is where the IT infrastructure links to a wide area network and the Internet. In this domain: • The firewall controls, prevents, and monitors incoming and outgoing network access. It’s the firewall’s job to prevent unauthorized network access, both inside and out the network. Depending on the type of firewall, data packets sent to and from the network pass through the firewall. All this data can be checked for whether it is allowed for transfer. • There are two main types of firewalls: network firewalls and host-based firewalls. Network firewalls, such as the software-based Microsoft’s Internet Security and Acceleration (ISA) Server or the hardware-based Nortel Networks Alteon Switched Firewall System, protect the perimeter of a network by watching traffic that enters and leaves. Host-based firewalls, such as Internet Connection Firewall (ICF—included with Windows XP and Windows Server 2003), protect an individual computer regardless of the network it’s connected to. 5. Wide Area Network (WAN) DOMAIN...

Words: 363 - Pages: 2

Cmgt 400 Intro to Information Assurance & Security

...Introduction These past few years have been distinct by several malicious applications that have increasingly targeted online activities. As the number of online activities continues to grow strong, ease of Internet use and increasing use base has perfected the criminal targets. Therefore, attacks on numerous users can be achieved at a single click. The methods utilized in breaching Internet security vary. However, these methods have increasingly become complicated and sophisticated over time. With the increase in threat levels, stronger legislations are being increasingly issued to prevent further attacks. Most of these measures have been aimed at increasing the security of Internet information. Among these methods, the most prominent approach is security authentication and protection. This paper comprehensively evaluates the security authentication process. The paper also introduces security systems that help provide resistance against common attacks. Security Authentication Process Authentication is the process that has increasingly been utilized in verification of the entity or person. Therefore, this is the process utilized in determining whether something or someone is what it is declared to be (LaRoche, 2008). Authentication hence acts as part of numerous online applications. Before accessing an email account, the authentication process is incorporated in identification of the foreign program. Therefore, the most common authentication application is done through......

Words: 1123 - Pages: 5

Cmgt 400 (Intro to Information Assurance & Security) Entire Class/ Homework-Aid

...CMGT 400 (Intro to Information Assurance & Security) Entire Class All Individual and Team Assignments, DQs Download` http://www.homework-aid.com/CMGT-400-Intro-to-Information-Assurance-Security-Entire-Class-089.htm?categoryId=-1 CMGT 400 Week 1 Week 1 Individual Assignment Risky Situation Complete the UniversityMaterial: Risky Situations table found on your student website. List three types of sensitive information involved with each situation. Identify three ways each information item could be misused or harmed.Answer the questions at the end of the table. Week 1 Team Assignment Kudler Fine Foods IT Security Report - System Review Kudler Fine Foods is in the process of developing a customer loyalty program and related system to give rewards to their customers based on their purchases and other relevant information. Your team has been asked to direct the development team in what they must do to ensure the system is developed in a secure manner and that it properly protects company and customer information at all stages of development Each week, the team prepares different portions of the final paper and presentation, which recommends exactly what the development team should do at each step of the development process including any related policy, training, and ongoing IT audit elements. Review the material for Kudler Fine Foods in the Virtual Organizations. Familiarize yourself with the company and its systems, and identify the specific systems or......

Words: 1405 - Pages: 6

Cmgt 400 - Intro to Information Assurance & Security

...(Individual) - Risky Situations CMGT 400 Week 1 Assignment (Team) - Kudler Fine Foods IT Security Report -Kudler System Review CMGT 400 Week 1 Discussion Question # 1- How can information be an asset in a company? Discuss three different examples of information that should be protected by a company and not exposed. Include several examples of what management could do to protect each example. CMGT 400 Week 1 Discussion Question # 2- What is the mindset required to properly protect information? What role does reasoned paranoia play in the minded and how can an individual keep the proper balance between protecting information and enabling business? CMGT 400 WEEK 2 CMGT 400 Week 2 Assignment (Individual) - Common Information Security Threats CMGT 400 Week 2 Assignment (Learning Team) - Kudler Fine Foods IT Security Report -Top Threats CMGT 400 Week 2 Discussion Question # 1- Which of the threats from social networking in the Horn (2010) article also apply to other businesses? Which do not? Why do you think so? CMGT 400 Week 2 Discussion Question # 2- Why do you think one of the methods in the Heimerl (2010) article would be the most effective way for an organization to save money? CMGT 400 WEEK 3 CMGT 400 Week 3 Assignment (Individual) - Disaster Securing and Protecting Information CMGT 400 Week 3 Assignment (Learning Team) - Kudler Fine Foods IT Security Report - Security Considerations CMGT 400 Week 3 Discussion Question # 1- How can a company protect data......

Words: 627 - Pages: 3

Cmgt 400 (Intro to Information Assurance & Security) Entire Class

...CMGT 400 (Intro to Information Assurance & Security) Entire Class All Individual and Team Assignments, DQs Download` http://www.homework-aid.com/CMGT-400-Intro-to-Information-Assurance-Security-Entire-Class-089.htm?categoryId=-1 CMGT 400 Week 1 Week 1 Individual Assignment Risky Situation Complete the UniversityMaterial: Risky Situations table found on your student website. List three types of sensitive information involved with each situation. Identify three ways each information item could be misused or harmed.Answer the questions at the end of the table. Week 1 Team Assignment Kudler Fine Foods IT Security Report - System Review Kudler Fine Foods is in the process of developing a customer loyalty program and related system to give rewards to their customers based on their purchases and other relevant information. Your team has been asked to direct the development team in what they must do to ensure the system is developed in a secure manner and that it properly protects company and customer information at all stages of development Each week, the team prepares different portions of the final paper and presentation, which recommends exactly what the development team should do at each step of the development process including any related policy, training, and ongoing IT audit elements. Review the material for Kudler Fine Foods in the Virtual Organizations. Familiarize yourself with the company and its systems, and identify the specific systems or......

Words: 1405 - Pages: 6

Cmgt 400 (Intro to Information Assurance & Security)Entire Class

...CMGT 400 (Intro to Information Assurance & Security)Entire Class Purchase here http://chosecourses.com/cmgt-400-intro-to-information-assurance-amp-securityentire-class Product Description CMGT 400 Week 1 Week 1 Individual Assignment Risky Situation Complete the UniversityMaterial: Risky Situations table found on your student website. List three types of sensitive information involved with each situation. Identify three ways each information item could be misused or harmed.Answer the questions at the end of the table. CMGT 400 Week 1 Team Assignment Kudler Fine Foods IT Security Report - System Review Kudler Fine Foods is in the process of developing a customer loyalty program and related system to give rewards to their customers based on their purchases and other relevant information. Your team has been asked to direct the development team in what they must do to ensure the system is developed in a secure manner and that it properly protects company and customer information at all stages of development Each week, the team prepares different portions of the final paper and presentation, which recommends exactly what the development team should do at each step of the development process including any related policy, training, and ongoing IT audit elements. Review the material for Kudler Fine Foods in the Virtual Organizations. Familiarize yourself with the company and its systems, and identify the specific systems or areas......

Words: 1414 - Pages: 6

Cmgt 400 (Intro to Information Assurance & Security)Entire Class

...CMGT 400 (Intro to Information Assurance & Security)Entire Class Purchase here http://chosecourses.com/cmgt-400-intro-to-information-assurance-amp-securityentire-class Product Description CMGT 400 Week 1 Week 1 Individual Assignment Risky Situation Complete the UniversityMaterial: Risky Situations table found on your student website. List three types of sensitive information involved with each situation. Identify three ways each information item could be misused or harmed.Answer the questions at the end of the table. CMGT 400 Week 1 Team Assignment Kudler Fine Foods IT Security Report - System Review Kudler Fine Foods is in the process of developing a customer loyalty program and related system to give rewards to their customers based on their purchases and other relevant information. Your team has been asked to direct the development team in what they must do to ensure the system is developed in a secure manner and that it properly protects company and customer information at all stages of development Each week, the team prepares different portions of the final paper and presentation, which recommends exactly what the development team should do at each step of the development process including any related policy, training, and ongoing IT audit elements. Review the material for Kudler Fine Foods in the Virtual Organizations. Familiarize yourself with the company and its systems, and identify the specific systems or areas......

Words: 1414 - Pages: 6

Cmgt 400 (Intro to Information Assurance & Security)Entire Class

...CMGT 400 (Intro to Information Assurance & Security)Entire Class Purchase here http://chosecourses.com/cmgt-400-intro-to-information-assurance-amp-securityentire-class Product Description CMGT 400 Week 1 Week 1 Individual Assignment Risky Situation Complete the UniversityMaterial: Risky Situations table found on your student website. List three types of sensitive information involved with each situation. Identify three ways each information item could be misused or harmed.Answer the questions at the end of the table. CMGT 400 Week 1 Team Assignment Kudler Fine Foods IT Security Report - System Review Kudler Fine Foods is in the process of developing a customer loyalty program and related system to give rewards to their customers based on their purchases and other relevant information. Your team has been asked to direct the development team in what they must do to ensure the system is developed in a secure manner and that it properly protects company and customer information at all stages of development Each week, the team prepares different portions of the final paper and presentation, which recommends exactly what the development team should do at each step of the development process including any related policy, training, and ongoing IT audit elements. Review the material for Kudler Fine Foods in the Virtual Organizations. Familiarize yourself with the company and its systems, and identify the specific systems or areas......

Words: 358 - Pages: 2

Cmgt 400 (Intro to Information Assurance & Security)Entire Class

...CMGT 400 (Intro to Information Assurance & Security)Entire Class Purchase here http://homeworkonestop.com/cmgt-400-intro-to-information-assurance-amp-securityentire-class Product Description CMGT 400 Week 1 Week 1 Individual Assignment Risky Situation Complete the UniversityMaterial: Risky Situations table found on your student website. List three types of sensitive information involved with each situation. Identify three ways each information item could be misused or harmed.Answer the questions at the end of the table. CMGT 400 Week 1 Team Assignment Kudler Fine Foods IT Security Report - System Review Kudler Fine Foods is in the process of developing a customer loyalty program and related system to give rewards to their customers based on their purchases and other relevant information. Your team has been asked to direct the development team in what they must do to ensure the system is developed in a secure manner and that it properly protects company and customer information at all stages of development Each week, the team prepares different portions of the final paper and presentation, which recommends exactly what the development team should do at each step of the development process including any related policy, training, and ongoing IT audit elements. Review the material for Kudler Fine Foods in the Virtual Organizations. Familiarize yourself with the company and its systems, and identify the specific systems or......

Words: 1414 - Pages: 6

Cmgt 400 (Intro to Information Assurance & Security)Entire Class

...CMGT 400 (Intro to Information Assurance & Security)Entire Class Purchase here http://homeworkonestop.com/cmgt-400-intro-to-information-assurance-amp-securityentire-class Product Description CMGT 400 Week 1 Week 1 Individual Assignment Risky Situation Complete the UniversityMaterial: Risky Situations table found on your student website. List three types of sensitive information involved with each situation. Identify three ways each information item could be misused or harmed.Answer the questions at the end of the table. CMGT 400 Week 1 Team Assignment Kudler Fine Foods IT Security Report - System Review Kudler Fine Foods is in the process of developing a customer loyalty program and related system to give rewards to their customers based on their purchases and other relevant information. Your team has been asked to direct the development team in what they must do to ensure the system is developed in a secure manner and that it properly protects company and customer information at all stages of development Each week, the team prepares different portions of the final paper and presentation, which recommends exactly what the development team should do at each step of the development process including any related policy, training, and ongoing IT audit elements. Review the material for Kudler Fine Foods in the Virtual Organizations. Familiarize yourself with the company and its systems, and identify the specific systems or......

Words: 7066 - Pages: 29

Cmgt 400 Intro to Information Assurance & Security

...CMGT 400 Intro To Information Assurance & Security Purchase Here: http://www.homeworkprinciples.com/downloads/cmgt-400-intro-to-information-assurance-security/ CMGT 400 Week 1 DQ 1 Post a 150-200-word response to the following discussion question by clicking on Reply. What is the mindset required to properly protect information? What role does reasoned paranoia play in the minded and how can an individual keep the proper balance between protecting information and enabling business? CMGT 400 Week 1 DQ 2 How can information be an asset in a company? Discuss three different examples of information that should be protected by a company and not exposed. Include several examples of what management could do to protect each example. CMGT 400 Week 1 Kudler Fine Foods IT Security Report & Presentation-Kudler System Review, CMGT 400 Week 1-Ind. Assignment Risky Situations CMGT 400 Week 2 CMGT 400 Week 2 DQ 1 Post a 150-200-word response to the following discussion question by clicking on Reply. Why do you think one of the methods in the Heimerl (2010) article would be the most effective way for an organization to save money? CMGT 400 Week 2 DQ 2 Which of the threats from social networking in the Horn (2010) article also apply to other businesses? Which do not? Why do you think so? CMGT 400 Week 2 Assignment-Kudler Fine Foods IT Security Report & Presentation-Top Threats CMGT 400 Week 2 Individual Assignment-Common Information Security Threats (1100+......

Words: 624 - Pages: 3

Cmgt 400 (Intro to Information Assurance & Security)Entire Class

...CMGT 400 (Intro to Information Assurance & Security)Entire Class Purchase here http://homeworkonestop.com/cmgt-400-intro-to-information-assurance-amp-securityentire-class Product Description CMGT 400 Week 1 Week 1 Individual Assignment Risky Situation Complete the UniversityMaterial: Risky Situations table found on your student website. List three types of sensitive information involved with each situation. Identify three ways each information item could be misused or harmed.Answer the questions at the end of the table. CMGT 400 Week 1 Team Assignment Kudler Fine Foods IT Security Report - System Review Kudler Fine Foods is in the process of developing a customer loyalty program and related system to give rewards to their customers based on their purchases and other relevant information. Your team has been asked to direct the development team in what they must do to ensure the system is developed in a secure manner and that it properly protects company and customer information at all stages of development Each week, the team prepares different portions of the final paper and presentation, which recommends exactly what the development team should do at each step of the development process including any related policy, training, and ongoing IT audit elements. Review the material for Kudler Fine Foods in the Virtual Organizations. Familiarize yourself with the company and its systems, and identify the specific systems or......

Words: 1414 - Pages: 6

Cmgt 400 (Intro to Information Assurance & Security)Entire Class

...CMGT 400 (Intro to Information Assurance & Security)Entire Class Purchase here http://homeworkonestop.com/cmgt-400-intro-to-information-assurance-amp-securityentire-class Product Description CMGT 400 Week 1 Week 1 Individual Assignment Risky Situation Complete the UniversityMaterial: Risky Situations table found on your student website. List three types of sensitive information involved with each situation. Identify three ways each information item could be misused or harmed.Answer the questions at the end of the table. CMGT 400 Week 1 Team Assignment Kudler Fine Foods IT Security Report - System Review Kudler Fine Foods is in the process of developing a customer loyalty program and related system to give rewards to their customers based on their purchases and other relevant information. Your team has been asked to direct the development team in what they must do to ensure the system is developed in a secure manner and that it properly protects company and customer information at all stages of development Each week, the team prepares different portions of the final paper and presentation, which recommends exactly what the development team should do at each step of the development process including any related policy, training, and ongoing IT audit elements. Review the material for Kudler Fine Foods in the Virtual Organizations. Familiarize yourself with the company and its systems, and identify the specific systems or......

Words: 1414 - Pages: 6

Cmgt 400 (Intro to Information Assurance & Security)Entire Class

...CMGT 400 (Intro to Information Assurance & Security)Entire Class Purchase here http://homeworkonestop.com/cmgt-400-intro-to-information-assurance-amp-securityentire-class Product Description CMGT 400 Week 1 Week 1 Individual Assignment Risky Situation Complete the UniversityMaterial: Risky Situations table found on your student website. List three types of sensitive information involved with each situation. Identify three ways each information item could be misused or harmed.Answer the questions at the end of the table. CMGT 400 Week 1 Team Assignment Kudler Fine Foods IT Security Report - System Review Kudler Fine Foods is in the process of developing a customer loyalty program and related system to give rewards to their customers based on their purchases and other relevant information. Your team has been asked to direct the development team in what they must do to ensure the system is developed in a secure manner and that it properly protects company and customer information at all stages of development Each week, the team prepares different portions of the final paper and presentation, which recommends exactly what the development team should do at each step of the development process including any related policy, training, and ongoing IT audit elements. Review the material for Kudler Fine Foods in the Virtual Organizations. Familiarize yourself with the company and its systems, and identify the specific systems or......

Words: 1414 - Pages: 6

1x08 Mob Psycho 100 | Snowy Road (Movie) | EL TRIUNFO DEL ESPIRITU PELICULA CRISTIANA