Assignment 2: Selecting Security Countermeasures
As a Technology Associate in the Information System Department at Corporation Tech, I have reviewed the new network design and identified possible security threats and appropriated countermeasures.
Entering the Internet without proper security can be harmful in many ways. The first thing that should be added is firewalls. Firewalls can prevent unwanted traffic from infiltrating the network. Next, we should consider segmenting the internal network to a DMZ (Demilitarized Zone). This is essential now that the company is deciding to add a ...view middle of the document...
The other priority is to protect business and customer data and to prevent their unauthorized use whether the data is printed or stored locally, or transmitted over a public network to a remote server or service provider. Maintain a Vulnerability Management Program: Vulnerability management is the process of systematically and continuously finding weaknesses in the Corp Techs’ IT infrastructure system. This includes security procedures, system design, implementation, or internal controls that could be exploited to violate system security policy. Implement Strong access Control Measures: Access control allows Corp Tech to permit or deny the use of physical or technical means to access Corp Techs data. Access will be granted on a business need to know basis.
Antivirus software is also needed to make sure the computers and servers aren’t infected with malicious programs that could cause major losses. The WIFI needs to have a password to keep unauthorized users from getting on the company’s network. The password should be complex enough so that no one can guess it. It would probably be best to not allow workers to take laptops home with them as they probably contain vital information. If this is a factor, then make sure a VPN is set up to that workers can securely connect to the company network without packet sniffers or other programs intercepting the data transferred between the laptop and network.