.

Thursday, May 9, 2019

Security Design Essay Example | Topics and Well Written Essays - 750 words

Security program - Essay Exampleidentified were an inappropriate use of emails in the communication of sensitive business teaching, the federation of public data, and confidential business information to the same physical network. Improper storing of private data that were only to be found on the servers by the end users and transmission some sensitive business information between servers and clients.For the proper communications of these findings, some policies were formed up by WWTC in the areas. These plans comprised of internet connectivity that was to be separated by the network, classified system this ensures physical security to prevent each(prenominal) unauthorized ingress to the detailed information. The other policy introduced was a wide area network. The system made sure that any data that cross wide area network link has to undergo a protection percentage such as the virtual private network (Berger, 2012).Public servers was another policy initiated, this ensured t hat configuration of all public servers using Hypertext transfer protocol system connections and acceptance of all valid requests and pass them through with(predicate) the firewall. Site-to-site virtual private network tunnels were also among the policies that were put in place through the findings enabling joint authentication and protection to all provided devices (Bansal, 2015). WWTC ended the plans with user education whereby they created awareness and training programs on threats and honorable security practices.Recommendations gave some deliverables on the general approach that the project may take. Among the recommendations pointed out were The protection of priceless assets of the company, determination of general architecture of the organization and development of a list of specific policies that could be utilize and along with the rationale. Specific details must be written. Selection of the 12 relevant procedures for the addition in the Security Policy Document has t o be reviewed in the written policies (Bansal, 2015). Attacks were classified

No comments:

Post a Comment