logo

TNE80011 Secure Remote Access Networks

   

Added on  2020-05-11

13 Pages3268 Words160 Views
Running head: CCNA SECURITYTNE80011 Secure Remote Access Networks Name of the StudentName of the UniversityAuthor’s Note

1CCNA SECURITYTable of ContentsTask 1: Identification of the potential section of basic network security policy.................21.1. Security Definition-..................................................................................................31.2. Enforcement-............................................................................................................31.3. Access of the computer resources-...........................................................................4Task 2: Creation of the security policy................................................................................42.1. Identification of the risk............................................................................................42.2. Aligning the policy with legal issues........................................................................42.3. The network security policy for security definition:................................................52.4. Network Security policy for enforcement:...............................................................52.5. The email policies:....................................................................................................62.6. The password policies:.............................................................................................62.7. The server security policy:........................................................................................62.8. Access control lists:..................................................................................................62.9. Level of the security.................................................................................................62.10. Brief description of the email and password policy...............................................7Task 3: Network Equipment Security Guidelines...............................................................73.1. Responsibility...........................................................................................................83.2. Procedure..................................................................................................................9Bibliography......................................................................................................................11

2CCNA SECURITYTask 1: Identification of the potential section of basic network security policy A network security policy is implemented for addressing the different issues of ACMEthat consists of 120 employees in its workplace located on a multistoried building. The twobuildings are required to be connected with the primary and secondary data centers that areleased by the company. The potential section identified for the basic network infrastructure ofthe organization is the security of the network [8]. The redundancy of the server is also analyzedfor identification of the potential sections of the network. During the development of an ITsecurity policy the model ‘defense in depth’ should be applied and the necessary componentsthat are vulnerable in the network should be identified [5]. The process and methodologiesinvolved for the development of the IT security policy should be evaluated and the securityprogram should be developed for creation of multiple layer protection in the network. The rules and the procedures should be integrated for maintaining confidentiality,availability and integrity of data with the resources available in the network. Responsibilityshould be given to the security professionals for the management of the IT security policy andidentification of the incidents procedures and the processes. A good IT security policy comprisesof clear communication with brief information that are realistic in nature. The scope and theapplication of the security policy are also defined for making the enforcement possible [2]. Thesecurity policy should be able to identify the roles and responsibility of the administrator, user ormanagement and provide guidance to develop the specific procedures. The protection of theresources should be balanced with the productivity and the incidents should be identified forhandling them easily.

3CCNA SECURITYThe main key point that is considered for the development of a flexible and adaptable ITsecurity policy is to update the technology for the establishment of the goals and objectives ofthe organization [9]. The potential section that is to be included in the IT security policy shouldbe a living document and it should be updated frequently for offering new technologies based onthe technology and the size of the organization. 1.1. Security Definition- The security policy created for the organization should be well defined and the vision andmission statement should be aligned for the development of the security policy. The securitypolicy should have a clear and concise statement for making the readers to understand the policy[12]. The confidentiality and the security of the organization should be maintained and theavailability of the data should be maintained for the authorized users of the network. Thedefinition of the security should be documented for the improvement of the security policy andbringing new changes in the policy [1]. The document would act as a backup for theidentification of the risk associated with the security policy of the organization.1.2. Enforcement- It is found that several problems are faced during the enforcement of the IT securitypolicy in the organization. Different stakeholders should be assigned for ensuring that anysecurity breach or network misconduct can be handled [4]. A hierarchy should be maintainedbetween the experts for the embracement of the policy in the organization and the exceptionpolicy created should be reviewed by the security manager for providing approval and denial.The overrule permission should not be given to the management team for handling theexceptions of the It security policy created for the organization.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Advanced Network and Infrastructure Security: Network Security Policy, Security Policies, Network Equipment Security Guidelines
|11
|966
|122

Develop and Implement Policy: A Case Study of Widget Enterprises
|11
|1683
|323

Manage Network and Data Integrity
|62
|2549
|302

Entity Management Service for Internet of Things-Based
|8
|2105
|22

Server Operating System
|14
|3184
|50

The Smart Electric Company Data Flow Diagram
|3
|534
|15