Verified Document

Company Is A Reputable Organization Research Paper

Apart from the Firewall and IDS for the network security, the company will also integrate encryption system to protect the company network devices.

Encryption

Encryption is very effective for enhancing security devices of our information systems. The encryption system will assist in enhancing confidentiality and integrity of our information systems. More importantly, encryption will be effective in enhancing our network security because it will protect our system from network-based attacks such as eavesdropping and replaying messages. Typically, the encryption solutions will be integrated at application layer because encryption will assist the integrity of data transmitted across our information system. The encryption will change the data transferred across the information system into unreadable texts so that an unauthorized individual will not have access to our data. With the public key system, we will be able to decrypt the text to have access to the data. (Data Center Fabric, 2013).

3. Identification of the Boundary of the Data Center and the client's boundary location

Representation

The company will set an IP address range that we will use as the boundary for the Data Center. The IP address range will be combination of IP addresses of our staff and our clients. Our system will also allow the IP addresses of all the trusted external parties into our data Center. To enhance maximum protection of our information system, we will assign unique IP addresses to:

Mail Server Farm

Web Server Farm

Application Server Farm, and Database Server Farm.

We will also assign unique IP address to each of the computer of our staff, which will assist us to set the boundary of our Data Center. All our boundaries will be configured in the System Center 2012 Configuration Manager, and the boundary will be configured in the Configuration Manager console. We will use site assignment to find appropriate site to join and this is based on the client's current network locations. (Microsoft...

The access control will also be used limit the impact of network failures. To ensure boundary protection of our network and manage the risks associated with our network backdoors. We will ensure that:
all devices attached to our network are authorized;

all interfaces with other authorized network are authorized;

all boundary subsystems of system are protected against attack; and We will strictly control host configuration at the perimeter and we enforce appropriate assurance levels.

Moreover, we also ensure appropriate traffic control:

The required traffics that would be allowed to pass through our network system would be controlled.

We will identify malicious traffic and filter whenever possible,

Our outgoing traffic may expose our resources to network risks, thus, we will only direct our traffic to trusted sites.

Conclusion

Integration of effective security systems is very critical to enhance data integrity. This report demonstrates the strategy that would be employed to protect our information systems from unauthorized access. The paper identifies IDS as an effective tool to detect unauthorized activities in our network system .We will integrate IDS to detect activities not authorized. Moreover, we will use firewall to block all non-desirable traffic from our system. Using the high-level security devices discussed in the paper, we will be able to enhance high-level security for our system.

References

Communication Security (2007).Baseline Security Requirements for Network Security Zones in the Government of Canada.

Data Center Fabric (2013).Data-at-Rest Encryption Solutions. Brocade Communications Systems, Inc.

Microsoft (2012).Configuring Boundaries and Boundary Groups in Configuration Manager. Microsoft Corp.

Sources used in this document:
References

Communication Security (2007).Baseline Security Requirements for Network Security Zones in the Government of Canada.

Data Center Fabric (2013).Data-at-Rest Encryption Solutions. Brocade Communications Systems, Inc.

Microsoft (2012).Configuring Boundaries and Boundary Groups in Configuration Manager. Microsoft Corp.
Cite this Document:
Copy Bibliography Citation

Related Documents

Finance Director in a Reputable Organization a
Words: 727 Length: 2 Document Type: Essay

Finance Director in a Reputable Organization A couple of weeks ago, I came across a poster in a gift shop that read: "you cannot run away from your destiny!" I couldn't agree more. Deep down, I have this great conviction that I was destined to be a Finance Director in a reputable organization. I developed a liking for things monetary at a very early age. When I was only 6 years

Organization Behavior ASDA Stores Business ASDA Stores
Words: 2635 Length: 7 Document Type: Essay

Organization Behavior ASDA Stores Business ASDA ASDA Stores is a large scale retailer in the United Kingdom. It has grown over the decades by regularly expanding its business operations all over the country. Currently, ASDA Stores is present in more than 564 locations and offers a wide array of grocery items, general merchandise, and financial services. The business operations of ASDA Stores are affected by a large number of environmental factors. These factors

Organizational Behavior John Watson Company Overview Dynatronics
Words: 3631 Length: 12 Document Type: Term Paper

Organizational Behavior John Watson Company Overview Dynatronics Corporation (formerly Dynatronics Laser Corporation) was started in 1979 with the initial intent of developing laser technology for use in medical procedures. Unable to acquire the necessary FDA approval required to market the technology the company turned to other areas within the medical rehabilitation market. Seeing an opening in the market for ultrasound electrotherapy technology the company soon found a distribution channel that could support the

Organizational Socialization According to the
Words: 695 Length: 2 Document Type: Essay

Such a culture will help the employee to become familiar with the work environment much more quickly. Employee retention should also be higher in this type of organization. The reasons for this can be found in the reasons why employees generally leave organizations. New employees are usually excited about their work, as it is unfamiliar and new. Once familiarity and routine set in, employees become bored, and the quality of

Organizational Psychology According to Stephen
Words: 660 Length: 2 Document Type: Term Paper

According to Andrew E. Schwartz (2010), participation is an important element of team work, where the goal includes meeting the objectives of the company. Teams and individuals should participate in collective decision-making processes that affect that company as a whole. This will provide teams and employees with a sense of belonging and of being truly part of an effective team that makes a difference in the company and to clients. Schwartz

Organization Is a Small to
Words: 1892 Length: 7 Document Type: Interview

Samson is herself a minority and half of the nursing staff in the office are non-white. One of the senior doctors is Latino. Samson helped staff trace some of the office miscommunications to a lack of cultural sensitivity. Diversity issues are on the table at one of every two staff meetings, according to Samson. Diversity awareness has improved as a result of directly confronting stereotypes that had previously prevailed

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now