Network Security Policies and Standards
Added on 2022-08-24
12 Pages2327 Words21 Views
|
|
|
Running head: NETWORK SECURITY POLICIES AND STANDARDS
Network Security Policies and Standards
Name of the Student
Name of the University
Author Note
Network Security Policies and Standards
Name of the Student
Name of the University
Author Note
![Network Security Policies and Standards_1](/_next/image/?url=https%3A%2F%2Fdesklib.com%2Fmedia%2Fimages%2Fvq%2F943b16a7db0d43b9a8ecfff48c7b917d.jpg&w=3840&q=10)
NETWORK SECURITY POLICIES AND STANDARDS1
Executive Summary
The rapid increase in adoption of ICT components by companies as well as the increased
usage of smartphones and public Wi-Fi networks has led to increasing security concerns for
companies operating within a shopping mall. The report is to suggest the security policies,
develop security standards, specify security services and compare them with existing
industrial security policies. The report first provides a background of the company followed
by identifying three major risks relevant for the company. Then the security policies,
standards and practices are listed and explained. Next, after comparing the suggested policies
with existing industrial policies the report ends with conclusions.
Executive Summary
The rapid increase in adoption of ICT components by companies as well as the increased
usage of smartphones and public Wi-Fi networks has led to increasing security concerns for
companies operating within a shopping mall. The report is to suggest the security policies,
develop security standards, specify security services and compare them with existing
industrial security policies. The report first provides a background of the company followed
by identifying three major risks relevant for the company. Then the security policies,
standards and practices are listed and explained. Next, after comparing the suggested policies
with existing industrial policies the report ends with conclusions.
![Network Security Policies and Standards_2](/_next/image/?url=https%3A%2F%2Fdesklib.com%2Fmedia%2Fimages%2Fee%2F454e87e5497749178bd52f0d51d83319.jpg&w=3840&q=10)
NETWORK SECURITY POLICIES AND STANDARDS2
Table of Contents
Introduction................................................................................................................................3
Business Background.................................................................................................................3
Risk Identification......................................................................................................................4
Security Policies.........................................................................................................................5
Security Standards......................................................................................................................6
Security Practises.......................................................................................................................7
Sample Policy Research.............................................................................................................8
Conclusion..................................................................................................................................9
References................................................................................................................................10
Table of Contents
Introduction................................................................................................................................3
Business Background.................................................................................................................3
Risk Identification......................................................................................................................4
Security Policies.........................................................................................................................5
Security Standards......................................................................................................................6
Security Practises.......................................................................................................................7
Sample Policy Research.............................................................................................................8
Conclusion..................................................................................................................................9
References................................................................................................................................10
![Network Security Policies and Standards_3](/_next/image/?url=https%3A%2F%2Fdesklib.com%2Fmedia%2Fimages%2Fvj%2Fff70fe622a5547babbd9a84d618672e3.jpg&w=3840&q=10)
NETWORK SECURITY POLICIES AND STANDARDS3
Introduction
The report attempts to identify the security needs of a company operating from within
a shopping mall and goes on to suggest the measures to secure their IT infrastructure. The
increased usage of smartphones, laptops and public Wi-Fi networks in shopping malls make
it easier for attackers to target companies that operate from within shopping malls thereby
raising the security concerns (McShane, Gregory & Wilson, 2016). The countermeasures
against such threats include security policies, develop security standards and specify security
services as also how well they fare with existing security policies used by the industry (Safa,
Von Solms & Furnell, 2016). The report begins by providing background of the company and
then identifying three key risks relevant for the company based on the IT components being
used. Then the report lists the security policies, develops a set of standards and mentions the
practices for the particular company and justifies them (Rahman & Williams, 2016). Next,
having compared these suggested policies with existing industrial policies the report ends
with conclusions.
Business Background
The company XYZ has opened recently inside a shopping mall. The company obtains
their network services from the network infrastructure of the shopping mall. The company
looks to sell their products both physically from within the mall and through their website.
The network of the company connects to the public internet through the main router of the
shopping mall. Apart from the systems connected through Ethernet cables, the company staff
make use of the company’s own Wi-Fi network through supported devices.
Introduction
The report attempts to identify the security needs of a company operating from within
a shopping mall and goes on to suggest the measures to secure their IT infrastructure. The
increased usage of smartphones, laptops and public Wi-Fi networks in shopping malls make
it easier for attackers to target companies that operate from within shopping malls thereby
raising the security concerns (McShane, Gregory & Wilson, 2016). The countermeasures
against such threats include security policies, develop security standards and specify security
services as also how well they fare with existing security policies used by the industry (Safa,
Von Solms & Furnell, 2016). The report begins by providing background of the company and
then identifying three key risks relevant for the company based on the IT components being
used. Then the report lists the security policies, develops a set of standards and mentions the
practices for the particular company and justifies them (Rahman & Williams, 2016). Next,
having compared these suggested policies with existing industrial policies the report ends
with conclusions.
Business Background
The company XYZ has opened recently inside a shopping mall. The company obtains
their network services from the network infrastructure of the shopping mall. The company
looks to sell their products both physically from within the mall and through their website.
The network of the company connects to the public internet through the main router of the
shopping mall. Apart from the systems connected through Ethernet cables, the company staff
make use of the company’s own Wi-Fi network through supported devices.
![Network Security Policies and Standards_4](/_next/image/?url=https%3A%2F%2Fdesklib.com%2Fmedia%2Fimages%2Fmx%2F76989725db7e469fa3e94ba852587785.jpg&w=3840&q=10)
End of preview
Want to access all the pages? Upload your documents or become a member.
Related Documents
zw68 Network And Security Analysislg...
|8
|1166
|13
Information Security for Mobile Deviceslg...
|10
|2055
|128
Advantages of Wireless Medium Assignment PDFlg...
|14
|569
|189
IS Security and Risk Management Assignment PDFlg...
|10
|3410
|84
Wireless Network Security and Preventive Techniqueslg...
|13
|2943
|220
Evaluation of Avast Mobile Securitylg...
|7
|2937
|291