Sunteți pe pagina 1din 3

Nelson Gutierrez

NT 2580 Intro Information Security


Project part 1
Project Part 1
Project Part 1
Multi Layered Security Plan
Richman Investments
General
This MLS plan will give a brief overview of the security strategies that will be implemented at each level of
the IT infrastructure.
1) User Domain
I feel that the User Domain is the most vulnerable because of the lack of user knowledge of what attacks
might look like, and may be easily tricked into releasing important information.
Remedies:
a. All users should be trained and instructed of the security policies.
b. Auditing of user activity will help ensure that users are following correct procedures according to the
security policy.
2) Workstation Domain
The Workstation Domain is susceptible to unauthorized access and out of date Anti-Virus software.
Remedies:
a. Each workstation should have Anti-Virus/Anti-Malware software installed and made to be sure that is up
to date at least weekly
b. Sensitive corporate data should have strict access policies.
c. Passwords policies should be enabled though the GPO, and be set to a strict level.
3) LAN Domain

Nelson Gutierrez
NT 2580 Intro Information Security
Project part 1
The LAN domain is susceptible to physical access to network assets.
a. Utilizing network switches
b. Using the highest available encryption to wireless access points (WPA 2)
c. Make sure that all server rooms are secure from unauthorized access. (Access lists, sign-in sheets for
contractors and tech-reps working in the server room, coded or un-replicable locks on doors)
4) LAN to WAN Domain
The LAN to WAN Domain is susceptible to network scanning
Remedies
a. Run all networking hardware with up to date security patches, and operating systems
b. Monitor inbound IP traffic, more specifically looking for inbound transmissions that show signs of
malicious intent
c. Closing off unused ports via a firewall to reduce the chance of unwanted network access
d. Install IDS/IPS on the network to monitor and combat network anomalies; also use a proxy server such
as ISA or TMG to filter unknown or malicious traffic
5) WAN Domain
WAN Domains must have a secure way communicating over remote access.
a. VPN tunneling should be used for remote connections, Encryptions should be enforced.
b. Configure routers, and network firewalls to block Ping requests to reduce chance of Denial of Service
attacks
c. All Email attachments should be scanned before being opened.
d. Isolate found malicious software (virus, Trojans, etc.) when found
6) Remote Access Domain

Nelson Gutierrez
NT 2580 Intro Information Security
Project part 1
Securing mobile access is the main concern for the Remote Access Domain
Remedies:
a. Encrypt the hard drives of company computers, laptops and mobile device to prevent the loss of sensitive
data.
b. Require the use of authorization tokens, have a real-time lockout procedure if token is lost, or stolen
c. Establish strict user password policies, as well as lockout policies to defend against brute force attacks
7) System Application Domain
Business continuity and disaster recovery are the main concerns for this domain.
Solutions:
a.

Develop a backup policy for all critical and sensitive data to maintain daily operation.

b.

A DRP and BCP should be developed for maintaining availability and continuity of operations.

Works Cited
Kim, D., & Solomon, M. G. Part 1: The Need for Information Security. In Fundamentals of
Information Systems Security. Jones & Bartlett Learning.

S-ar putea să vă placă și