logo

Manage Network and Data Integrity

You are the network administrator for a small aged-care not for profit organisation. As the new Security Manager, you are tasked with creating policies, implementing technologies to mitigate risk, and analysing the processes and systems in place to make them more secure. The firm has 20 desktop and 20 laptop computers. The head of the firm uses 1 laptop and 1 desktop. Rest of the laptops are shared by other staff for client visits. There is 1 reception desktop, each staff member has their own desktop. Firm uses local email and file server. There are 7 more new laptops that are used by clients when visiting office. They also have one Terminal server that hosts an aged-care software called Carelink+. The organisation has other two offices located 30-80 km apart. Users connect to their emails via VPN connection to their Exchange server that sits in the main office. Their web is hosted with cloud access. Based on an assessment performed by an external auditor, the following were identified as the top 2 threats: · Viruses and malicious code inside the network · Business Continuity Planning, Disaster Recovery

62 Pages2549 Words302 Views
   

Added on  2023-03-31

About This Document

This document provides a comprehensive guide on how to manage network and data integrity. It covers topics such as creating an effective antivirus security policy, installing antivirus software, configuring security on the router/modem, and more. The document also includes step-by-step instructions and screenshots for easy understanding.

Manage Network and Data Integrity

You are the network administrator for a small aged-care not for profit organisation. As the new Security Manager, you are tasked with creating policies, implementing technologies to mitigate risk, and analysing the processes and systems in place to make them more secure. The firm has 20 desktop and 20 laptop computers. The head of the firm uses 1 laptop and 1 desktop. Rest of the laptops are shared by other staff for client visits. There is 1 reception desktop, each staff member has their own desktop. Firm uses local email and file server. There are 7 more new laptops that are used by clients when visiting office. They also have one Terminal server that hosts an aged-care software called Carelink+. The organisation has other two offices located 30-80 km apart. Users connect to their emails via VPN connection to their Exchange server that sits in the main office. Their web is hosted with cloud access. Based on an assessment performed by an external auditor, the following were identified as the top 2 threats: · Viruses and malicious code inside the network · Business Continuity Planning, Disaster Recovery

   Added on 2023-03-31

ShareRelated Documents
University
Semester
ICTNWK403 Manage Network and
Data Integrity
Student ID
Student Name
Submission Date
1
Manage Network and Data Integrity_1
Table of Contents
1. Project Description........................................................................................................................4
2. Create an effective antivirus security policy..................................................................................4
3. Install antivirus software on all appropriate systems.....................................................................6
4. Develop information security awareness training........................................................................19
5. Configure Security on the Router / modem..................................................................................21
6. Configure security on the switch.................................................................................................23
7. Configure GPO............................................................................................................................26
8. Install suitable security software no.............................................................................................27
9. Establish security policy..............................................................................................................33
10. Configure user permissions / authenticate users......................................................................35
11. Configure file and folder access permissions...........................................................................37
12. Develop and configure inventory system.................................................................................42
13. Configure firewall....................................................................................................................43
14. Configure VPN........................................................................................................................44
15. Configure DHCP.....................................................................................................................45
16. Configure DNS........................................................................................................................46
17. Configure Certificates..............................................................................................................47
18. Create backup solution.............................................................................................................47
19. Check integrity of your data....................................................................................................48
20. Monitor logon events to the domain........................................................................................49
21. Create DMZ.............................................................................................................................49
22. Create VLANS........................................................................................................................50
23. Set VPN between sites.............................................................................................................51
24. Display warning message before user loges in.........................................................................52
25. Enforce password policy..........................................................................................................52
26. Enforce physical and environmental security...........................................................................53
27. Install network performance tools............................................................................................54
28. Generate network reports.........................................................................................................54
29. Audit and record security access..............................................................................................54
30. Determine threats / identify risks.............................................................................................55
31. Make recommendations...........................................................................................................55
32. Create baseline.........................................................................................................................56
2
Manage Network and Data Integrity_2
33. Modify system if required........................................................................................................56
34. Document your system............................................................................................................56
35. Review logs for possible intrusions.........................................................................................57
36. Carry out spot checks / document possible breaches...............................................................58
References...........................................................................................................................................60
3
Manage Network and Data Integrity_3
1. Project Description
The main aim of this project is to implement, install and configure the network security and
to use it for data production. The process of analysis and systems is to create policies, enforce
technologies to minimize risk and make them more secure for the structure on the network
configuration. The main objective of the project is to use it for the development and manage
the antivirus system for the workstation, email filtering and server of the networking system.
The selected firm has 20 desktop and 20 laptop computers. The identification of the virus is
done by analysing it by two methods that are denoted as, Viruses and Malicious code on the
network. Disaster Recovery and Business management planning on the network security will
be investigated.
2. Create an effective antivirus security policy
Creating of the antivirus security software should mainly be specified for
the detection of the viruses on the computer and laptop. Analysis of each laptop and computer
for malicious threats shall be carried out for the pc so as to keep them in good condition. The
advanced security of the Comoro antivirus can be used for the detection of the virus and to
identify the same on each computer for any malicious attacks, to protect all the computers,
remove any malicious file and only access given for the important data of the computer
security. The Comoro antivirus features are given below (Gollmann, 2011),
Detects suspicious files immediately
Offers intelligent definition technique
Real time protection
Instant and quick update on the latest virus definition.
Access scanning.
Creating the new security policy as shown below,
4
Manage Network and Data Integrity_4
Creating the organization name for the policy result as shown below (Koret, 2015),
The results of the organization details is shown below,
5
Manage Network and Data Integrity_5
Creating the new organization policy on the secure risk,
3. Install antivirus software on all appropriate systems
Choosing the interface Language
Comodo antivirus installing configuration
6
Manage Network and Data Integrity_6
Setting and choosing the DNS server for configuration,
7
Manage Network and Data Integrity_7
Click the end user license agreement
8
Manage Network and Data Integrity_8

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
IT security policy
|8
|1468
|450

Network Security: Tools and Techniques for Protection
|4
|900
|214

Planning Details for Network Security, Backup, Disaster Recovery and Maintenance Schedule
|3
|793
|79

Anti-Virus and NMAP Scans PDF
|10
|1148
|73

Anti-Virus and NMAP Scans
|10
|1196
|286

IT Security: Types of Risks, Organizational Procedures, Impact of Firewall Configuration, Implementation of DMZ, Static IP and NAT
|18
|1181
|61