Security Plan for IT Infrastructure: Hardware, Software, Data

Verified

Added on  2022/12/26

|5
|1099
|49
Report
AI Summary
This report provides a comprehensive security plan for IT infrastructure, addressing critical aspects of hardware, software, and data protection. It emphasizes the importance of hardware firewalls and the implementation of software solutions like antivirus and anti-malware to safeguard against various threats. The report also highlights data protection technologies, including encryption, data masking, and data backups, and stresses the need for employee awareness and cybersecurity measures. Furthermore, it delves into IT operations monitoring, discussing real-time monitoring methods and tools to ensure the proper functioning of the IT infrastructure. The report concludes with recommendations for establishing an IT security management team and implementing various security technologies to maintain a robust and secure IT environment.
Document Page
Running head: - SECURITY PLAN FOR IT INFRASTRUCTURE
SECURITY PLAN FOR IT INFRASTRUCTURE
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1
SECURITY PLAN FOR IT INFRASTRUCTURE
Introduction
The information technology infrastructure is the main component of the business. All
the hardware and the software associated with the information technology requires proper
security and maintenance (Tsohou, Karyda & Kokolakis, 2015). However, it must be checked
that all the information related to the business is secure. Various aspects is considered when
the security is required for both the hardware and the software. However there are different
plans for maintaining the security related to the information technology software.
Hardware that can be implemented in the IT infrastructure to help with
security
The hardware security is the device that comes in physical form for the protection of
the different information technology infrastructure. The hardware is an alternative used for
the protection of the IT infrastructure. There are certain examples related with the hardware
that can be implemented such as the hardware firewalls and the proxy servers. In order to
implement the different hardware firewalls it is necessary to understand the vulnerabilities
that can occur in the system. The hardware firewall will help in preventing the unauthorized
access (Cooper, Nedbal & Nadkarni, 2017). The firewall will help in analysing the data
which is entering in the system. It will help the system by ignoring the access of different
type of information from different locations. However the implementation of the hardware
firewall will be more beneficial as it is more effective.
Software that can be implemented in the IT infrastructure to help with
security
There are different software that can be implemented in the information technology
infrastructure that will help in maintaining the security. There are different software that can
Document Page
2
SECURITY PLAN FOR IT INFRASTRUCTURE
be implemented in the system which can protect the system against the different antivirus and
ransom ware attacks. There are two different types of software’s that can be implemented in
the system. The software are related with the antivirus protection and spyware removal. The
software will help the system from virus and it will defend the introduction of different type
of viruses and security threats (Alcaraz & Zeadally, 2015). The implementation of such
software in the IT infrastructure will protect it from different phishing attacks, worms and
viruses. It will also help in recognizing the different threats that can enter the IT
infrastructure. However the implementation of the different software in the IT infrastructure
will improve the infrastructure and it will help the system in maintaining its security.
Technology that can be used to protect the data of the Company
There are different technologies that can be used by the Company for the protection of
the data. The different technologies are the data masking, data backups and the data erasure.
One of the major technology that can be utilize is the encryption where the digital data and
the different drives can be encrypted and the can be decrypted at the users end. All the
employee of the company must be aware of all the technologies that can be used for the
protection of the confidential data of the company (Landau, 2015). The company need to
disable all the sharing facilities for the employees and a cyber awareness must be created in
the company. However the different technology need to be implemented for the protection of
the data.
Technology that can be used to monitor the different IT operations
There are different operations that helps in the monitoring of the IT infrastructure.
The IT operation will include both the hardware and the software which will help in ensuring
that different functions is performed properly. The monitoring of the IT operations will
include monitoring in three different sections. The foundation, the interpretation and the
Document Page
3
SECURITY PLAN FOR IT INFRASTRUCTURE
software are the sections which are covered while monitoring the IT operations. Real time
monitoring is a method that can be used to analyse and determine the different data collection
and the access. The monitoring of the infrastructure is related with the foundation stage
methods (Anderson, Wipfel & Golan, 2013). Different monitoring tools provided by the
APM can help in monitoring the different IT operations.
Recommendations
The infrastructure of the company will require the implementation of the proper IT
security management team (Siponen, Mahmood & Pahnila, 2014). The management team
will help in the implementation of the different hardware, software, and data protection
security technology. There are different hardware and software’s that can be implemented for
the security of the IT infrastructure. Different firewalls, antivirus related software, phishing
attack protection software can be implemented in the IT infrastructure of the company so that
the data are secured. There are different authentication methods and data masking methods
for safeguarding the information. However, it can be recommended that various technologies
can be introduced in the system for the security.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4
SECURITY PLAN FOR IT INFRASTRUCTURE
References
Alcaraz, C., & Zeadally, S. (2015). Critical infrastructure protection: Requirements and
challenges for the 21st century. International journal of critical infrastructure
protection, 8, 53-66.
Anderson, E. W., Wipfel, R., & Golan, J. (2013). U.S. Patent No. 8,543,916. Washington,
DC: U.S. Patent and Trademark Office.
Cooper, G. H., Nedbal, M., & Nadkarni, H. S. (2017). U.S. Patent No. 9,571,507.
Washington, DC: U.S. Patent and Trademark Office.
Landau, S. (2015). Control use of data to protect privacy. Science, 347(6221), 504-506.
Siponen, M., Mahmood, M. A., & Pahnila, S. (2014). Employees’ adherence to information
security policies: An exploratory field study. Information & management, 51(2), 217-
224.
Tsohou, A., Karyda, M., & Kokolakis, S. (2015). Analyzing the role of cognitive and cultural
biases in the internalization of information security policies: recommendations for
information security awareness programs. Computers & security, 52, 128-141.
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]