logo

Advanced Network and Infrastructure Security: Network Security Policy, Security Policies, Network Equipment Security Guidelines

   

Added on  2023-06-04

11 Pages966 Words122 Views
Advanced Network and Infrastructure Security
Advanced Network and Infrastructure Security: Network Security Policy, Security Policies, Network Equipment Security Guidelines_1
Table of Contents
1. Task - 1 Network Security Policy...............................................................................................2
2. Task - 2 Security Policies.............................................................................................................2
3. Task - 3 Network Equipment Security Guidelines....................................................................3
References............................................................................................................................................9
1
Advanced Network and Infrastructure Security: Network Security Policy, Security Policies, Network Equipment Security Guidelines_2
1. Task - 1 Network Security Policy
Basically, network security policy must be include the various key sections which can be
used to identify the potential issues for device access, network access, users access and other
areas. The basic security policy for an organizations are listed below 1:
Password policy
Acceptable use policy
Virtual network private policy
Extranet policy
Physical device security policy
Remote access policy
Encryption policy
Device management policy
Identity policy
Email and communications activities
Antivirus policy
The set of policies are requires the time and effort to provide the useful and effective tool
which can be administered and implemented. The well-structured security policy included the
below aspects.
Provides the procedures to follow in case of a security incident.
Provides the targets and process to audit the previous security.
Provides the next step base line in the network security evolution
Defines the overall organization responsibility for implementation, funding,
monitoring and supporting the policies.
Creates the basic for an actions of legal enforcement.
1 A. Jesin, Packet Tracer Network Simulator (2014).
2
Advanced Network and Infrastructure Security: Network Security Policy, Security Policies, Network Equipment Security Guidelines_3
2. Task - 2 Security Policies
Each organization has something that another person needs. In organization, the proper
responses are differenced by resources like databases, web servers, shared drives,
indispensable organization client and representative data, imperative applications, email
servers and business data. Basically, security policies are involves the organization security
policy and principle of conduct the executives and clients and prerequisites for administration
and framework that all in guarantee the system security and computer system in an
organization 2.
Password Policy
A password policy is a policy of principles and it is used to improve the computer
security by advising clients to utilize the solid passwords. The password security is play a
important role on organization authentication management. The password policy is instructed
as a computer security mindfulness preparing. It first provide the just warning to conform that
client or not. Generally, most of the organization have national validation structures that
characterize the necessities for client verification to supported organizations including
perquisites for the password 3.
Password Construction Requirements
Be a base length of eight (8) characters on all frameworks.
Not be a lexicon word or legitimate name.
Not be the equivalent as the User ID.
Expire inside a most extreme of 90 schedule days.
Not be indistinguishable to the past ten (10) passwords.
Not be transmitted free or plaintext outside the protected area.
Not be shown when entered.
Ensure passwords are reset for approved client Rick Graziani and Bob
Vachon, Routing Protocols 4.
Acceptable use policy
Acceptable use policy is a Policy of principles connected by the supervisor of a system,
site or extensive PC framework that confine the manners by which the system, site or
framework might be utilized. Acceptable Use Policy records are composed for partnerships,
organizations, colleges, schools, web access suppliers, and site proprietors regularly to
2 Connecting Networks Companion Guide (Cisco Press, 2014).
3 George Eliot, The Mill On The Floss (BiblioLife, 2009).
4 Rick Graziani and Bob Vachon, Routing Protocols (Cisco Press, 2014).
3
Advanced Network and Infrastructure Security: Network Security Policy, Security Policies, Network Equipment Security Guidelines_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Networking Security Assignment
|6
|1409
|38

Advanced Network Security
|6
|1027
|376

Network and Security Administrator Asignment
|24
|1435
|14

Assignment on Wireless Network Security
|19
|2483
|61

IT Security Policy Analysis
|5
|922
|108

Foundation of Cyber-Security: Information Security Policies and Encrypted E-mail Solutions
|12
|4083
|98