logo

Infrastructure and Security Policy for Network System

7 Pages2487 Words307 Views
   

Added on  2019-09-30

About This Document

This article discusses the requirements and solutions for infrastructure and security policy for a network system, including risk management, business continuity, and access control.

Infrastructure and Security Policy for Network System

   Added on 2019-09-30

ShareRelated Documents
Table of ContentsIntroduction 2Part 1: Vulnerabilities Assessment 3Bibliography 6
Infrastructure and Security Policy for Network System_1
IntroductionI have found the patch management is the only thing in the system that produces error in anetwork when the system gets update, it won’t accept the patch and the OS will not start. Thiswill be the downtime of the server. The system should hold live migration and also it should takethe back up of the data where the data be moved to secured location. The data should not beaffected because of the current condition there will be passive data and active data in thedatacenter. So the data center with the both the container with active and passive datacentershould not save the data which is affected. It should hold only the value data from the successfulupdate or able to rollback of the data from the server if there is any flaw in the data or anyoperation failure occurs in the network.Requirement of the infrastructure and secure infrastructure The network system will hold the infrastructure which will handle some error in order to changethe network. The whole network should be passed and it should automatically recover the datafrom the server. The network should be able to adopt the network and manage the change if theserver has no active request and response. We could manage with the backup server if the activeuser of the servers is more active and more number of user by which they can make lot oftransaction on the website. So the network must able to take snapshot of the database and shouldbe entered in the log of the server so that any changes made in the network it would be traceable.The solution we can try for this is we can lock data in the server. When the network changehappens in the network the system, save the data and won’t let the server to change the data.Now we can prepare the local copy of the data and that data can be compared with the data savedin the server which is the original data. Now the changes are measured and the data can beupdated. When the patch management gets updated and the network is running as like normalthey can now update the data with the compared value of the active data with recent transactiondata. Only some changes might be needed but this will be secured. Because there will not beconflict in the data because the pervious data is been lock which is transacted recently. We willhave to wait for the data to get update. There is no threat of conflict error because everything ischecked after the conformation. The changed data in the recent data are changed in the lock dataso no redundancy will come and data will be secured.The security policyThe security policy might include if network system should be accessible. The system shouldhave hierarchy of access in the network. Only some of the people are able to the operationprocess not all the people can fix the fault that occurs in the system
Infrastructure and Security Policy for Network System_2
Requirement of security policyThe security branch will happen in the environment where the security of the physicalinfrastructure will be low. So the system should be secured in every region. For example in abank there will be branches in some regions, the bank will have more visitor so that the securityin the bank will be more in the region and in some other regions with the same bank in the ruralregion the security of the system might not be tight because of the less people visiting the bank.So like that the threat can be occur. So these free breach in the system. if the hacker exploit thesethings the system could be compromised. Proposing a solutionPeople who are able to access these network will have to follow some protocol in order for thesecurity reason like do not take electronic items in the bank and the clearance id card should bechecked all the time and person should not use other system without proper permission and everychanges done in the system should be noted in the log .so that if something goes the changes inthe system could be easily rectified.Risk management The risk management can be approx prediction in the system. The risk management can’t bedefined accurately. Only we can run test in the risk and we need expert advice of the seniorpeople. It should have the overall function of the project and how the things will occur and whatmight be the chance that system will go out. It should be controlled only experience experts.They are the persons which are able to find out this kind of solution because of the experiencegather by them and the projects similar project they have been working. The risk management isvery much necessary because the risk may occur anytime in the system where the starting of theproject or the ending of the project the system should be able to respond to the errorautomatically or it should be controlled by the experts who monitors the system.Requirements:The requirement of the risk assessment is unpredictable. The requirement of the risk isunpredictable because of the how well the preparation is done. There might be a chance for theerror to occur in the system. The risk may arise in the public side or the company side in acompany. If the worker doesn’t know what he is doing it might not affect him it might haveaffected the public or the other department in the same company. It is like making error in thesystem without knowing the effect it will cause in the system. The error caused by human isunpredictable. We can figure out the pattern by when the error occur and what time this kind oferror occurs could be noted and where the analysis of the data are got and the solution to theproblem will be ready before the error occurs. This is how the risk management is reducing therisk but it can be eliminated.
Infrastructure and Security Policy for Network System_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Vulnerabilities Assessment for Secure Infrastructure and Risk Management
|8
|2518
|116

Patch Management System
|7
|2732
|208

Managing Vulnerabilities and Risk in Network Systems
|7
|2732
|403

Vulnerability Assessment and Risk Management for Business Continuity
|7
|2478
|153

(PDF) Top Threats to Cloud Computing Security
|13
|2463
|122

Data Communications - Sample Assignment
|17
|4086
|68