logo

Security Plan for IT Infrastructure

   

Added on  2022-12-26

5 Pages1099 Words49 Views
Running head: - SECURITY PLAN FOR IT INFRASTRUCTURE
SECURITY PLAN FOR IT INFRASTRUCTURE
Name of the Student
Name of the University
Author Note
Security Plan for IT Infrastructure_1
1
SECURITY PLAN FOR IT INFRASTRUCTURE
Introduction
The information technology infrastructure is the main component of the business. All
the hardware and the software associated with the information technology requires proper
security and maintenance (Tsohou, Karyda & Kokolakis, 2015). However, it must be checked
that all the information related to the business is secure. Various aspects is considered when
the security is required for both the hardware and the software. However there are different
plans for maintaining the security related to the information technology software.
Hardware that can be implemented in the IT infrastructure to help with
security
The hardware security is the device that comes in physical form for the protection of
the different information technology infrastructure. The hardware is an alternative used for
the protection of the IT infrastructure. There are certain examples related with the hardware
that can be implemented such as the hardware firewalls and the proxy servers. In order to
implement the different hardware firewalls it is necessary to understand the vulnerabilities
that can occur in the system. The hardware firewall will help in preventing the unauthorized
access (Cooper, Nedbal & Nadkarni, 2017). The firewall will help in analysing the data
which is entering in the system. It will help the system by ignoring the access of different
type of information from different locations. However the implementation of the hardware
firewall will be more beneficial as it is more effective.
Software that can be implemented in the IT infrastructure to help with
security
There are different software that can be implemented in the information technology
infrastructure that will help in maintaining the security. There are different software that can
Security Plan for IT Infrastructure_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information Systems Security: IT Security Fundamentals, Vulnerabilities, and IBM Security Architecture
|5
|747
|57

Cyber Security: Attacks and Mitigation Techniques
|11
|2291
|301

Information Technology Infrastructure and Security
|13
|591
|20

Trends in Computer Science
|7
|1424
|49

Creating a Company Culture for Security - Security steps and methods for an organization
|4
|534
|193

Security Threats in Cloud Computing and Preventive Methods
|7
|1380
|340