logo

Network Security Policies and Standards

   

Added on  2022-08-24

12 Pages2327 Words21 Views
 | 
 | 
 | 
Running head: NETWORK SECURITY POLICIES AND STANDARDS
Network Security Policies and Standards
Name of the Student
Name of the University
Author Note
Network Security Policies and Standards_1

NETWORK SECURITY POLICIES AND STANDARDS1
Executive Summary
The rapid increase in adoption of ICT components by companies as well as the increased
usage of smartphones and public Wi-Fi networks has led to increasing security concerns for
companies operating within a shopping mall. The report is to suggest the security policies,
develop security standards, specify security services and compare them with existing
industrial security policies. The report first provides a background of the company followed
by identifying three major risks relevant for the company. Then the security policies,
standards and practices are listed and explained. Next, after comparing the suggested policies
with existing industrial policies the report ends with conclusions.
Network Security Policies and Standards_2

NETWORK SECURITY POLICIES AND STANDARDS2
Table of Contents
Introduction................................................................................................................................3
Business Background.................................................................................................................3
Risk Identification......................................................................................................................4
Security Policies.........................................................................................................................5
Security Standards......................................................................................................................6
Security Practises.......................................................................................................................7
Sample Policy Research.............................................................................................................8
Conclusion..................................................................................................................................9
References................................................................................................................................10
Network Security Policies and Standards_3

NETWORK SECURITY POLICIES AND STANDARDS3
Introduction
The report attempts to identify the security needs of a company operating from within
a shopping mall and goes on to suggest the measures to secure their IT infrastructure. The
increased usage of smartphones, laptops and public Wi-Fi networks in shopping malls make
it easier for attackers to target companies that operate from within shopping malls thereby
raising the security concerns (McShane, Gregory & Wilson, 2016). The countermeasures
against such threats include security policies, develop security standards and specify security
services as also how well they fare with existing security policies used by the industry (Safa,
Von Solms & Furnell, 2016). The report begins by providing background of the company and
then identifying three key risks relevant for the company based on the IT components being
used. Then the report lists the security policies, develops a set of standards and mentions the
practices for the particular company and justifies them (Rahman & Williams, 2016). Next,
having compared these suggested policies with existing industrial policies the report ends
with conclusions.
Business Background
The company XYZ has opened recently inside a shopping mall. The company obtains
their network services from the network infrastructure of the shopping mall. The company
looks to sell their products both physically from within the mall and through their website.
The network of the company connects to the public internet through the main router of the
shopping mall. Apart from the systems connected through Ethernet cables, the company staff
make use of the company’s own Wi-Fi network through supported devices.
Network Security Policies and Standards_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
zw68 Network And Security Analysis
|8
|1166
|13

Information Security for Mobile Devices
|10
|2055
|128

Advantages of Wireless Medium Assignment PDF
|14
|569
|189

IS Security and Risk Management Assignment PDF
|10
|3410
|84

Wireless Network Security and Preventive Techniques
|13
|2943
|220

Evaluation of Avast Mobile Security
|7
|2937
|291