logo

Planning Details for Network Security, Backup, Disaster Recovery and Maintenance Schedule

   

Added on  2023-06-03

3 Pages793 Words79 Views
 | 
 | 
 | 
Planning Details
Security Plan:
The security of the network is an important factor that helps in allowing the legitimate traffic
to reach the hosts connected in the network while blocking the illegal traffic out. For the
development of the network security plan the following tasks should be completed:
Development of a network security policy – In the security policy the permission given to the
user for accessing sensitive and the confidential information should be identified and it consists of
the following elements such as:
Creation of a firewall – It is used for filtering the data traffic and restrict the data according
to the protocol
Isolation of the sensitive and confidential information - The direct access of the internal
network should be blocked by configuring the router with a password and configuring the
firewall for blocking unknown traffic.
Development of a DMZ zone – An area outside the firewall should be created for allowing
anonymous access for any user and keep the internal network secured from the third party
agents.
Creating an authentication scheme – The direct access to the internet should require
username and password and the access to the internet via the firewall should also require
authentication for tracking the activity of the user.
An IP security architecture should be developed – For the management of the integrity of data,
replay protection, securely creating and automatically refreshing the encryption keys, creating
strong cryptographic algorithm and creating certificate based encryption. There are different
protocols tat are used for enforcement of the functions.
Creating a plan for spyware or virus protection – The virus and the spyware can disguise the user as
a business content for carrying out malicious activity and breach the security of the network. The
host connected in the network is needed to be installed with an antivirus application and updated
daily such that the malware, spyware and virus can be blocked before they can carry malicious
activity and the network is kept secured.
Backup Schedule:
For creating the backup schedule it should be kept in mind that the entire system can be
restored from the backup within a short duration of time. For the creation of the backup schedule
what files are needed to be backed up and the frequency of backup should be identified. Regular
backup should be setup and the changes in the files at the start of each week should be saved and
the final changes at the end of the week should be added with the low level backup. The following is
a weekly backup schedule created for the FSM:
Floating Mon Tue Wed Thurs Fri
Month 1 0
Week 1 9 9 9 9 5
Week 2 9 9 9 9 5
Week 3 9 9 9 9 5
Planning Details for Network Security, Backup, Disaster Recovery and Maintenance Schedule_1

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents