logo

Network Security Policy Components

   

Added on  2023-03-30

6 Pages1182 Words316 Views
Running Head: Networking 0
Networking
Report
STUDENT NAME
Network Security Policy Components_1
Networking 1
Task 1:
A network security policy is a set of rules, which are used to access data in the company. ACME
has more than 100 employees over two floors in the same building and it is working in the real
estate industry, which is having a lot of data and business information. Therefore, the company
implemented two data centers to secure their data and information and store a large volume of
data. In addition, the company is already having DMZ to manage different types of issues related to
HTTP servers in a virtual server farm. The company faced data access and internet access issues
from contractors, and salespeople, which is not secure for a complete system. Now, the company
wants to expand its business and grow by 30-50 employees in their team. The company wants to
move over VoIP in order to eliminate the separate PABX systems, which are used as a legacy
system.
Security Policy Components
There are two types of components in a governing policy, which are technical policies and End-User
Policies1. In addition, information security policies are necessary to implement the proper access
level. The company should implement different information security policies to overcome risks and
threats from malware and other cyber-attacks2.
There are few things, which should have potential security policies in a network, which areas:
Extranet policy: the company should define policy for access to the network by contractors and
salespeople. Third party person always accesses only limited things and cannot enter in a private
section of the company, such as data center, databases, and many others.
Minimum requirements for network access policy: the company must define standards for
devices to access the network of the company, such as updated antivirus, patches for operating
systems, and many others.
1 Paquet Catherine , "Network Security Concepts and Policies", 2013, accessed June 5, 2019,
http://www.ciscopress.com/articles/article.asp?p=1998559&seqNum=3
2Dosal Eric, "5 Common Network Security Problems and Solutions". 2018, June 5, 2019,
https://www.compuquip.com/blog/5-common-network-security-problems-and-solutions
Network Security Policy Components_2
Networking 2
Network access standards: the company should define standards for wired and wireless
network access ports to secure them from third party people.
Router and switch security policy: the company should define the minimal security
configuration standards for different types of internetworking devices, such as hub, routers,
bridge, brouters, and switches.
Server security policy: the company should define the minimal security configuration standards
for servers inside a company, which is used in the company network.
Accept usage policy: employees cannot use the company network for their personal usages,
such as download songs, movies, and others3.
Access control policy: the company should define access controls for a different level of
employees and third-party people to secure data centers and network.
Task 2:
As mention in task one AUP and ACP are most important security policy for ACME.
Acceptable usage policy (AUP)
One of the maximum commonplace general policies within a network security policy is an acceptable
usage policy (AUP), which specifies how personnel can make use of organization computer sources, and
instructs them on how to guard enterprise assets and personal facts. There can also be separate sections
in the network protection coverage handling electronic mail utilization, , passwords, the use of private
devices and phones, document retention and acceptable software programs. The coverage will generally
cowl each physical community and statistics4.
3 Hayslip Gary, "9 policies and procedures you need to know about if you’re starting a new security
program", March 16, 2018, accessed June 5, 2019, https://www.csoonline.com/article/3263738/9-
policies-and-procedures-you-need-to-know-about-if-youre-starting-a-new-security-program.html
4
Beaver Kevin, "Top 5 Common Network Security Vulnerabilities that Are Often Overlooked". 2013,
accesses June 5, 2019, https://www.acunetix.com/blog/articles/the-top-5-network-security-
vulnerabilities/
Network Security Policy Components_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Network Security Policy
|6
|1221
|134

Features of OpManager: Network Application Presentation
|11
|717
|51

A Presentation on rectifying Faults.
|9
|477
|26

Project Report on IT Infrastructure in an Organization
|22
|5978
|247

Development of Acceptable Use Policy
|6
|1472
|95

Advanced Network Security
|6
|1027
|376