Network Layout:
The network layout for the IT department
will be organized in a STAR TOPOLOGY design as the company want depending on
their business “The design of networks should only be as complex as the
business needs it to be (Simmons,2011). We have the router which the ports connected to the Server,
Printer and the switches using .The diagram below illustrates the design using
Packet Tracer:
Security policy:
In today's high technology environment,
organizations are becoming more and more dependent on their information
systems. The public is increasingly concerned about the proper use of
information, particularly personal data. The threats to information systems
from criminals and terrorists are increasing. Many organizations will identify
information as an area of their operation that needs to be protected as part of
their system of internal control. So our aim is protecting all application
systems which are based on computers and manufacturing systems and networks.
Our tool to achieve our goals is security. So to achieve our goal we should
apply policies. Here some of the policies we can use:
User Information authentication-
It is very important to protect the user
himself before protecting any software or Hardwar where the user represents the
main assets of a company or firm even home land security so if the user is
protected from any intruder or attacker or even sniffer the user won’t be in
line of danger. Simple things the user could follow to keep himself protected
from attackers:-
1-User must make a monthly change of his
password.
2-User should not make a simple
(1,2,3,4,5,6) password.
3-User shouldn’t make password known to a
possible attacker.
These were few examples of User
authentications method passwords are very sensitive information it’s the only
thing that makes the computer knows that the user is who he’s clamming to be so
if the attacker knows that information then there’s nothing stopping the
computer from letting the attacker, some antivirus programs keep your computer
protected from attackers that it would be hard to get in your system to steal
your password or information.
Anti-virus –
“It is very important that
your computer has antivirus software running on your machine. By having an
antivirus program running, files and emails will be scanned as you use them,
download them, or open them. If a virus is found in one of the items you are
about to use, the antivirus program will stop you from being able to run that
program and infect yourself. (Lawrence, 2004)
No comments:
Post a Comment