logo

Enhancing Network Security for NextGard: Best Practices and Recommendations

   

Added on  2023-06-15

11 Pages2582 Words64 Views
Report

Contents
Introduction......................................................................................................................................1
Research solutions and detail the appropriate Microsoft Windows access controls.......................1
Research and detail the cryptography methods to protect organizational information...................2
Research and devise a plan to thwart malicious code and activity..................................................3
Research and formulate a plan to implement monitoring and analysis...........................................4
Research and detail security guidelines for contains the two proxy servers and access control.....5
Research and define best practices for the security of Next Gard’s organization...........................5
Conclusion summarizing your findings and recommendations.......................................................6
The Network topology.....................................................................................................................7
References........................................................................................................................................8

Introduction
The objective of the project is based on the upgradation and securing the company with the
current network to enhance the organization efficiencies. It also focuses on designing access
control for the proper Microsoft Windows in order to enhance and handle the effective security
system.
Research solutions and detail the appropriate Microsoft
Windows access controls
The vulnerabilities and security holes are based on Microsoft software programs which is
considered to be the major target of security attacks. The major attacks focus on the Microsoft
Windows where there is a wide usage of the same by different organisations. The wide
vulnerabilities against the different Microsoft Windows lead to certain issues, where NextGard
need to focus on taking preventive measures to handle the Window Access Control policies.
The NextGard need to focus on improvement of access control through the use of auto-check in
order to search for the passwords that are complex for the IT administrator. The company needs
to formulate the policies along with ensuring the administrator with using a complex and strong
password to log into administrative account (Joshi & Karkade, 2015). The use of the strong
password is considered to be critical with deterring the unauthorised access into the company
with the network account. It is critical for the company to use strong password with unauthorised
individuals who will find challenging to crack. The company can make use of Smartcards to
securely handle the storage of personal information and enhancing the authentication.

NextGard need to focus on the policy with ensuring that the employees are able to make use of
the computers of company for the business communication (Stallings, 2016). Here, all the
employees must communicate with the company emails and communication should be mainly on
NextGard business operations.
Research and detail the cryptography methods to protect
organizational information
The cryptography is mainly to protect against any information leakage through the process of
encryption. NextGard needs to focus on the development of better policy which will be able to
enhance the integrity, confidentiality and the authenticity of the system. The method involves the
use of the different encoded types of digital signatures which are set by asymmetric cryptography
or by the public key (Stallings & Tahiliani, 2014). The security policy is set where the company
includes document transferred with the document encryption. In order to decrypt the digital
signature, the user should properly able to verify the different public keys using a proper secured
private key which is of a document sender. The company should also employ with proper key
management to make the public as well as the private confidentiality key.
The encryption of data is through protecting the information of company, where encryption is the
best strategy which is for handling the data in the organisation. This is converted into any type of
unreadable form with only authorised users with decrypted key that can convert the data into a
readable form. The strategy is mainly about preventing unauthorised access to any type of data
company, with the encryption that tends to protect the data from any type of unauthorised access
mainly because there are some external intruders who are not able to read the data as they have
no access to the decrypted key (Kahate, 2013). The company needs to make use of these methods

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Security: BYOD Risk Assessment, Certificate-based Authentication, and Anti-phishing Guideline
|9
|2240
|285

Cryptography and Network Security Applications
|8
|1917
|96

Network Security: Concepts and Techniques
|11
|718
|27

Secure System: Authentication, Web Security, Types of Attacks
|14
|3428
|384

The Encryption Key Management : Assignment
|9
|2475
|65

Wireless Network Routing and Switching - Assignment
|9
|1050
|121