This document discusses the hardware and software that can be implemented in an IT infrastructure to enhance security. It also explores technologies that can be used to protect data and monitor IT operations. Recommendations for securing the IT infrastructure are provided.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: - SECURITY PLAN FOR IT INFRASTRUCTURE SECURITY PLAN FOR IT INFRASTRUCTURE Name of the Student Name of the University Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1 SECURITY PLAN FOR IT INFRASTRUCTURE Introduction The information technology infrastructure is the main component of the business. All the hardware and the software associated with the information technology requires proper security and maintenance (Tsohou, Karyda & Kokolakis, 2015). However, it must be checked that all the information related to the business is secure. Various aspects is considered when the security is required for both the hardware and the software. However there are different plans for maintaining the security related to the information technology software. Hardware that can be implemented in the IT infrastructure to help with security The hardware security is the device that comes in physical form for the protection of the different information technology infrastructure. The hardware is an alternative used for the protection of the IT infrastructure. There are certain examples related with the hardware that can be implemented such as the hardware firewalls and the proxy servers. In order to implement the different hardware firewalls it is necessary to understand the vulnerabilities that can occur in the system. The hardware firewall will help in preventing the unauthorized access (Cooper, Nedbal & Nadkarni,2017). The firewall will help in analysing the data which is entering in the system. It will help the system by ignoring the access of different type of information from different locations. However the implementation of the hardware firewall will be more beneficial as it is more effective. Software that can be implemented in the IT infrastructure to help with security There are different software that can be implemented in the information technology infrastructure that will help in maintaining the security. There are different software that can
2 SECURITY PLAN FOR IT INFRASTRUCTURE be implemented in the system which can protect the system against the different antivirus and ransom ware attacks. There are two different types of software’s that can be implemented in the system. The software are related with the antivirus protection and spyware removal. The software will help the system from virus and it will defend the introduction of different type of viruses and security threats (Alcaraz & Zeadally,2015). The implementation of such software in the IT infrastructure will protect it from different phishing attacks, worms and viruses.ItwillalsohelpinrecognizingthedifferentthreatsthatcanentertheIT infrastructure. However the implementation of the different software in the IT infrastructure will improve the infrastructure and it will help the system in maintaining its security. Technology that can be used to protect the data of the Company There are different technologies that can be used by the Company for the protection of the data. The different technologies are the data masking, data backups and the data erasure. One of the major technology that can be utilize is the encryption where the digital data and the different drives can be encrypted and the can be decrypted at the users end. All the employee of the company must be aware of all the technologies that can be used for the protection of the confidential data of the company (Landau, 2015). The company need to disable all the sharing facilities for the employees and a cyber awareness must be created in the company. However the different technology need to be implemented for the protection of the data. Technology that can be used to monitor the different IT operations There are different operations that helps in the monitoring of the IT infrastructure. The IT operation will include both the hardware and the software which will help in ensuring that different functions is performed properly. The monitoring of the IT operations will include monitoring in three different sections. The foundation, the interpretation and the
3 SECURITY PLAN FOR IT INFRASTRUCTURE software are the sections which are covered while monitoring the IT operations. Real time monitoring is a method that can be used to analyse and determine the different data collection and the access. The monitoring of the infrastructure is related with the foundation stage methods (Anderson, Wipfel & Golan,2013). Different monitoring tools provided by the APM can help in monitoring the different IT operations. Recommendations The infrastructure of the company will require the implementation of the proper IT security management team (Siponen, Mahmood & Pahnila, 2014). The management team will help in the implementation of the different hardware, software, and data protection security technology. There are different hardware and software’s that can be implemented for the security of the IT infrastructure. Different firewalls, antivirus related software, phishing attack protection software can be implemented in the IT infrastructure of the company so that the data are secured. There are different authentication methods and data masking methods for safeguarding the information. However, it can be recommended that various technologies can be introduced in the system for the security.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4 SECURITY PLAN FOR IT INFRASTRUCTURE References Alcaraz, C., & Zeadally, S.(2015). Critical infrastructure protection: Requirements and challengesforthe21stcentury.Internationaljournalofcriticalinfrastructure protection,8, 53-66. Anderson, E. W., Wipfel, R., & Golan, J. (2013).U.S. Patent No. 8,543,916. Washington, DC: U.S. Patent and Trademark Office. Cooper,G.H.,Nedbal,M.,&Nadkarni,H.S.(2017).U.S.PatentNo.9,571,507. Washington, DC: U.S. Patent and Trademark Office. Landau, S. (2015). Control use of data to protect privacy.Science,347(6221), 504-506. Siponen, M., Mahmood, M. A., & Pahnila, S. (2014). Employees’ adherence to information security policies: An exploratory field study.Information & management,51(2), 217- 224. Tsohou, A., Karyda, M., & Kokolakis, S. (2015). Analyzing the role of cognitive and cultural biases in the internalization of information security policies: recommendations for information security awarenessprograms.Computers & security,52, 128-141.