¶ … Installation
The author of this report has been presented with a hypothetical situation as ZXY Corporation where a new building has been procured. This building will be the site of the new information technology (IT) and other infrastructures. However, the current setup is very raw and unfinished and this obviously needs to change. The facets of the information technology setup that will be addressed in this report will include a plan to provide secure access for all users, a viable password policy in terms of complexity and other important factors, a cryptography method to ensure that vital data is encrypted, a remote access plan to ensure that remote access to the network is done in a viable, functional and secure way and a thorough plan to protect the network from malware and various other types of malicious attacks such as phishing, social engineering and so forth. While the overall facets of an information technology security plan are not hard to rattle off, implementing them and doing that well can indeed be a bit of a struggle
Background
In looking at the facts presented thus far, there are a few question and concerns that immediately pop up. There is the presence of a local area network (LAN) but the ability and rating of that LAN is not mentioned. Everything is being shared with everyone, so that obviously needs to change from the word go. Indeed, everything is basically set to the defaults provided by the relevant operating systems and other infrastructures in place. The author will presume that Windows is the primary environment for workstations. Given the basic parameters given above, the author of this report will offer a step-by-step plan that addresses the different points, both explicitly mentioned and not explicitly mentioned, in the parameters of the assignment. There are some glaring things that need to be addressed that there are also some best practices that will be used and wielded along the way. There is indeed a good way to go about this but it needs to be done in the right way. The explicitly mentioned items will be covered first and the subtler and less obvious matters will be covered after that.
The Plan
As for secure access control, the users of this new network will be required to use their Windows password to enter their workstations when starting the day. This password will also serve as the network/intranet password for the company. Absolutely no one will be allowed access to the secure LAN without keying such a password.
The password policy of ZXY Corporation will be fairly straightforward but will have important points. Minimum password length will be eight characters. People must use an upper case letter, a lower case letter, a number and a symbol. For example, Fishbowl22! would work but dropping the capital F, the two 2's or the exclamation point would not work. Using any part of one's legal name will not be allowed. Using any prior-used password will not be allowed. Passwords will have to be changed at least once every thirty days. If someone loses their password, they will have to get with information technology and a specific procedure to do that will be put in place.
Encryption and cryptography will come in two major forms, those being wireless and the hard drives themselves. So that wireless transfers (i.e. at the office) are secure, there will be use of the WPA2 encryption. It is the current "gold standard" for wireless encryption and it has not been cracked. On the other hand, the very obsolete WEP encryption will not be enabled or allowed on any workstations. As proven by (and before) the TJX information hack, that cypher has been compromised. Unsecured wireless traffic will never be allowed unless the user is on the VPN. In that case, the traffic will still be encrypted but any reputable employee of the company should have a WPA or WPA2 router in their home if that is where they are at. However, other locations like Wi-Fi hotspots and the like are usually unsecure. Of course, the use of such spots would (and should) be fleeting (Ou, 2007).
The other part of the encryption and cryptography is the use of hard drive-level encryption to secure the data on the machines. While most if not all important and vital data should NOT be stored on the local hard drive, there will be at least some in the form of the Microsoft Outlook PST files and other minor exceptions....
Information Technology Change Management in Home Health Care I hope enjoyed time holidays. Now back work . In team task week, a topic weekly focus debate paper labor unions change process. There sufficient information argue sides. Let . See: The labor union change process difficult employees management; I labor union make process a bit easier parties. Implementing Information Technology Change in a Health Care Facility There is a shift from the traditional institutionalized
The first time that they attempted to build this system they did not follow the life cycle plan and the system ended up failing. Developing a new claims payment system that will talk to and be user friendly with the customer service management system would help to speed up efficiency and enhance quality of all departments within the organization. This streamlining would help the company as a whole to
Computer IT Security Implementation Provide a summary of the actual development of your project. Because small corporations have to work under conditions of conflicting information technology in many instances, the requirement of maintaining these systems details entails far too many time-consuming processes that have to be carried out. This allows for the business to work in a logical order and promotes a more logical approach to the making of business decisions. The end
Communications This age is often referred to as the information era: the last two decades have given birth to some of the most staggering advancements that the human race has ever been capable of -- advancements which have changed the way that we live, do business, stay healthy, fight disease and defend our nation. It's vital to have a comprehensive and concrete understanding of some of the more basic concepts
Strategic Information Technology Plan Oesterlen Services for Youth is an organization that helps troubled youth in Ohio. It consists of a counseling center and a foster care placement program, as well as residential services for both male and female youth for intensive care cases. In order for Oesterlen to continue to help as many youth as possible, it has to be up-to-date on its technology. To that end, it has set
Health Care IT Health Care Information Technology The days of paper-based records in health care are fading. It is widely believed that the broad adoption of clinical applications such as computerized physician order entry (CPOE) can lead to major health care savings, help eliminate medical errors, and improve healthcare outcomes for patients (Lynn, 2011). Because of such benefits, the Obama administration included automated adoptions in health care as a part of its
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now