Network Security Policy
Added on 2023-04-04
6 Pages1221 Words134 Views
Isaac.w
TEMAOS [Company address]
Network security
TEMAOS [Company address]
Network security
Contents
Introduction......................................................................................................................................1
Scope................................................................................................................................................1
Basic Security Policies....................................................................................................................2
Creation of security policies............................................................................................................2
Creating of a Network Equipment Security Guidelines..................................................................2
Conclusion.......................................................................................................................................3
References........................................................................................................................................3
Introduction......................................................................................................................................1
Scope................................................................................................................................................1
Basic Security Policies....................................................................................................................2
Creation of security policies............................................................................................................2
Creating of a Network Equipment Security Guidelines..................................................................2
Conclusion.......................................................................................................................................3
References........................................................................................................................................3
Introduction
This documentation is about network security policy. A security policy governs/takes in charge
of all the security controls in an organization with an interest of protecting the critical assets of
the organization as it offers very detailed and strict directives on the acceptability an
unacceptability on the organization’s resources. In this documentation, we shall refer to the
ACME private company networking as the case study.
Scope
The ACME private company has 120 employees with a space of 2 floors in a multi-story
building in Melbourne city. The parent company further subdivides into two divisions i.e the
property management group and the commercial real estate. The company’s data center is also
into two divisions, the primary datacentre and the secondary datacentre, which are in two leased
racks in two separate multi-tenant datacentres.
The primary datacentre.
In this rack, contains several servers for storing their data, running the company’s enterprise
applications and managing the company emails. In this division, it hosts a DMZ consisting of the
public HTTP in a virtual server farm.
The secondary datacentre.
This rack provides full redundancy in the company’s network.
The company has had issues with resource misuse as employees have been using the company’s
email for personal purposes and downloading of inappropriate materials from the internet
(Sanders, Nguyen, and Pascarella, Hewlett Packard Development Co LP, 2016). Apart from the
misuse of the company’s resources, the ACME is facing a challenge. The contractors and the
salespeople have been having access to all the company’s servers and that should not be the case.
The internet also has the access to all the servers despite the high profits the company has been
making and this is a threat to the stability and the future of ACME Company thus the need of
security policies in the company.
This documentation is about network security policy. A security policy governs/takes in charge
of all the security controls in an organization with an interest of protecting the critical assets of
the organization as it offers very detailed and strict directives on the acceptability an
unacceptability on the organization’s resources. In this documentation, we shall refer to the
ACME private company networking as the case study.
Scope
The ACME private company has 120 employees with a space of 2 floors in a multi-story
building in Melbourne city. The parent company further subdivides into two divisions i.e the
property management group and the commercial real estate. The company’s data center is also
into two divisions, the primary datacentre and the secondary datacentre, which are in two leased
racks in two separate multi-tenant datacentres.
The primary datacentre.
In this rack, contains several servers for storing their data, running the company’s enterprise
applications and managing the company emails. In this division, it hosts a DMZ consisting of the
public HTTP in a virtual server farm.
The secondary datacentre.
This rack provides full redundancy in the company’s network.
The company has had issues with resource misuse as employees have been using the company’s
email for personal purposes and downloading of inappropriate materials from the internet
(Sanders, Nguyen, and Pascarella, Hewlett Packard Development Co LP, 2016). Apart from the
misuse of the company’s resources, the ACME is facing a challenge. The contractors and the
salespeople have been having access to all the company’s servers and that should not be the case.
The internet also has the access to all the servers despite the high profits the company has been
making and this is a threat to the stability and the future of ACME Company thus the need of
security policies in the company.
End of preview
Want to access all the pages? Upload your documents or become a member.
Related Documents
Network security Assignment PDFlg...
|7
|1357
|367
Advanced Network Securitylg...
|6
|1027
|376
Network Security Policy Componentslg...
|6
|1182
|316
TNE80011 Secure Remote Access Networkslg...
|13
|3268
|160
Network Design Report and Presentation for Top Network Companylg...
|7
|1149
|460
Networking Fundamentals : Assignmentlg...
|3
|1964
|98