AllFreePapers.com - All Free Papers and Essays for All Students
Search

Information Security Polices

Autor:   •  June 10, 2012  •  Essay  •  521 Words (3 Pages)  •  2,069 Views

Page 1 of 3

Table of Contents

1. Executive Summary 1

2. Introduction 1

3. Disaster Recovery

4. References 3

Executive Summary

Due in Week Nine: Write 3 to 4 paragraphs giving a bottom-line summary of the specific measureable goals and objectives of the security plan, which can be implemented to define optimal security architecture for the selected business scenario. In reviewing Sunica Music’s problem, it seems that they are having much difficulty correlating data regarding customer information, purchases, and inventory between their stores. My first goal for them would be to implement a WAN that will connect both networks for both stores using a switch. Not only am I going to recommend the WAN but also many pertinent security features to ensure their information is only shared between the two stores and not any hackers.

One of the most important security features for a WAN in my opinion would be that of a firewall. This will protect any traffic from coming into the network. This will also ensure the safety of the data transmissions between the two stores.

They also need a separate network to allow for customers to access products via the internet. Other than the firewall, another important security feature would be encrypted passwords to access the internet portion of the database. Customers will be given access to the information provided on the internet using a unique username and password. I would recommend a public key cryptography. This is where the same key is used to encrypt and decrypt transmissions.

Lastly, being that steal music and movies is one of the hottest things on the web right now, I would recommend strong IDS to protect against those

...

Download as:   txt (2.7 Kb)   pdf (56.9 Kb)   docx (10.8 Kb)  
Continue for 2 more pages »