Wan Security Essay

1341 words - 6 pages

Executive Summary
This document describes the security plan for a WAN (wide area network) that has been setup for an organization to work in an efficient manner. The WAN connects many different locations scattered across a wide area. The WAN is an important feature of the organization and has to play an important role in its working. Huge amount of information is transferred everyday and is crucial for the organization. A network crash due to any reason may cause a huge loss to the organization. Also any intrusion in the network may allow somebody to get hold of private and confidential information about the company. Hence, the security of the network is very crucial to the organization and ...view middle of the document...

The organization we discuss in this document is Sunica, Music and movies. It is a local multimedia chain and has four locations. Each store has been acting independently of one another and has difficulty coordinating customer sales from one store to another based on inventory. As a result of poor communications, revenue and customer base have been lost due to jumbled inventory from store to store, decentralized accounting, and no Internet-based commerce. A network has been setup to connect the four locations all allow them the ability to access a centralized database for inventory and dynamically reorder stock based on sales. Each location will tunnel all financial transactions through a central accounting package, eliminating bookkeeping errors and centralizing the company finances. All transactions and customer inventory browsing will be done through a web interface and custom Intranet Web site. To meet their need for an Internet customer base, web servers will be located in their data center and will tie in to the company’s accounting and transaction servers to provide real-time sales and inventory information to customers. In this document we discuss the security of the above mentioned WAN.
Physical Security policy
Security of the facilities
A number of customers visit the stores of the company. Some of them might be malicious and might try to cause harm to store by stealing, damaging the belongings of the stores or bringing in some unwanted items. All these activities need to be checked.
Physical entry controls: - at the place of entry to store, every entrant must be checked for security and a metal detector machine must be placed at the entrance of the store. The customers should not be allowed to carry any bags inside the store. They should be kept outside the store.
Security offices, rooms and facilities: - a security office will be built at every store and rest rooms for security guards will be provided.
Isolated delivery and loading areas: - each and every store will have a delivery and loading area in the backyard and security guards will monitor the area.
Security of information systems
The equipment for setting the network is very costly and must be kept at a secure place. There should be one server room with proper cooling facilities, since the servers generate a lot of heat. For every store there should be a network administrator who would manage all the servers. Nobody should be allowed to access the server machines.
There would be unused ports over the network, which are connected to no server or laptop. These ports could be misused by the employees or customers visiting the store, so the network administrator must monitor the ports being used. By using simple programs, a network administrator can know the IP’s and description of the machines currently connected to the network. So if some unwanted machine is found on the network, the network administrator can forcibly close the connection.

Other assignments on Wan Security


287 words - 2 pages Hello it’s me I’ve been wondering if after all these years you’d like to meet Security Controls in Place The current security controls include independent anti-virus software on every workstation and server, host-based intrusion detection systems on the servers in the corporate office. Security policy requires that all firewalls and router rule sets are evaluated every two years and that all local servers are backed up to network attached

Global Finance Essay

3346 words - 14 pages ), which only transfer data when initiated (Acharya, Lasse, Thomas & Matthew, 2011). Apart from Wide Area Network (WAN) and Local Area Network (LAN) connections, Global Finance, Inc. has utilized other forms of connections such as different internet ISPs, private networks and telephone connections. The design has also incorporated Virtual Private Network (VPN) for in public switched networks (PSTN) to enhance information privacy and security. Global

Integrative Network Design Project Part 3

827 words - 4 pages Integrative Network Design Project As the Integrative Network Design Project moves in to part three the need to evaluate the Patton-Fuller Community Hospital network to identify additional properties and functions. This paper will look at the hardware and software needed to secure the network against electronic threats, will examine the use of Wide Area Networks (WAN) and Local Area Networks (LAN) and the technologies used to implement them

It 230 Computer Networking

6096 words - 25 pages security strategies to prevent people from accessing files and data traveling between sites if they have not been authorized to do so. This is prevented by the use of firewalls at the edges of the WAN that is Internet facing. “It is very important to choose the correct connection type when designing the WAN. Most carriers offer three types of connections: circuit switched connections, packet switched connections and dedication connections

Unit 5 Assignment 2 Define An Acceptable Use Policy (Aup)

339 words - 2 pages Unit 5 Assignment 2: Define an Acceptable Use Policy (AUP) Acceptable Use Policy Richman Investments holds requirements for the usage of the company network including filtering policies for network traffic. LAN – WAN is where the IT infrastructure links to a wide area network and internet. For Security (Administrators and Managers) - Security monitoring controls for intrusion - Apply email server and attachment antivirus and email

It Securityspecialization

567 words - 3 pages 7 Assessment Worksheet Identifying Threats and Vulnerabilities in an IT Infrastructure Security Risk Management: CSS250-1503A-01 Course Name and Number: _____________________________________________________ Ismael Tirado Student Name: ________________________________________________________________ Shawn Murray Instructor Name: ______________________________________________________________ July 13, 2015 Lab Due Date

Nt2580 Project 2

858 words - 4 pages and permissions set to their job needs, downloading from the internet should only be for users with the proper credentials to do so. The utilization of smart cards or finger print readers to enter server rooms, closets, Data centers, to keep Local area networks protected and secure from intruders. The LAN to WAN domain contains both physical and logical designs of the security appliances. For this layer you want to apply security protocols on

Management Sciences

2260 words - 10 pages destination through the internet. 38 The Firewall connected to the internet through an ATM network. LAN implementation using a single Ethernet Switch. LAN is connected to the Internet through a firewall host that provides security services. LAN is connected to the private WAN via router. 39 Example Configuration 40 Summary introduced data communications needs communications model defined data communications overview of networks introduce Internet 41

Information Systems Security

3283 words - 14 pages ; Solomon 2012). These mitigation features are instrumental to the security of our current working environment and the environment that we will provide going forward. We know some of our descriptions and explanations of our envisioned environment may seem verbose, but we feel that it is necessary for the sake of clear understanding. The LAN to WAN domain is the fourth domain that links our infrastructure to the outside world moving us from an

Information Security Policy

4226 words - 17 pages Security Policy. As each link in the chain of network protocols can be attacked, describe the policies covering security services for network access and network security control devices. 1 Data network overview Provide an overview of the network configuration that the company uses. Discuss each network type of Local Area Network (LAN), Wide Area Network (WAN), Internet, intranet, and extranet. Include how the network type is employed in

Network Security And Ethical Hacking

5261 words - 22 pages implement security policies and make use of the security tools that are readily available. It’s vital that companies complete professional risk assessments and develop comprehensive security plans and infrastructures that are publicly supported by upper management” Network security is not only about the WAN (Wide Area Network) but also the LAN (Local Area Network) as the two go hand in hand. It is possible to not only have an attack from the

Similar Documents

Itt It255 Research Project Part 1

474 words - 2 pages Brian Gobrecht IT255 Project Part 1 The domains of an infrastructure are broken down into several parts. The User, Workstation, LAN, LAN-to-Wan, Remote Access, Wan, and System/Application domains. All of these are a very crucial part of a domain structure and if one fails to do its proper job most of it or all of it will come to a screeching halt. The User Domain is pretty self-explanatory yes a system can do without a user but by itself

Network Engineer Essay

301 words - 2 pages and company Data | Major | Server patches an security | Lan domain | Company data | Major | Cisco ASA (Old users and ACL on our Ip lists.) | Lan to WAN domain | Company | Major | Remote users security | Remote access domain | User/ Company data | Major | Webserver (Updates and services not needed) | System/application Domain | Company | Minor | RDP Servers Security | System/application Domain | Company | Major | IT security to Datacenter | User domain | Company | Major | HIPAA compliance | User domain | Company / Customer Data | Critical |

Ip Subnetting Project Essay

526 words - 3 pages This is newest updated file from today. See below. IP Subnetting Project XUMUC is has the WAN links in place to the new locations in the Houston Region. XUMUC currently has 2 other Regions San Francisco and Denver. Originally, XUMUC was only in one region (San Francisco). The previous consultant did a poor job with the integration resulting in a poor IP address scheme as a result routing tables at the summarization points and at the San

Security Plan Outline For Richman Investments

501 words - 3 pages Security Plan Outline for Richman Investments User Domain • Restrict access to data and applications that is not required for employee to do their job. • Review and Revise user conduct and security polices every six months. • Conduct annual security training seminars with system users and staff. Conducting annual security training for the user in the user domain will cover the Acceptable Use Policy (AUP) for which users will be informed