StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Designing Compliance within the LAN-to-WAN Domain - Assignment Example

Cite this document
Summary
As the paper "Designing Compliance within the LAN-to-WAN Domain" tells, the privacy of a company’s data is an essential aspect in regard to the development of the organization. Therefore, this implies that privacy should be highly prioritized when it comes to resource allocation in the organization…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.1% of users find it useful
Designing Compliance within the LAN-to-WAN Domain
Read Text Preview

Extract of sample "Designing Compliance within the LAN-to-WAN Domain"

DESIGNING COMPLIANCE WITHIN THE LAN-TO-WAN DOMAIN The privacy of a company’s data is one of the most essential aspects inregards to the development of the organization. Therefore, this implies that privacy should be highly prioritized when it comes to resource allocation of the organization. Privacy entails the restriction of access to the information that is regarded confidential to unauthorized users. The data should only be accessible to the staffs who have been assigned the privileges to view it. The restriction serves as a measure to protect the third party from accessing the data, which he/she could use for his/her own malicious interest against the company. This paper intends to discuss how data privacy can be achieved across the WAN of the technology firm. Introduction One of the measures that can be taken to achieve data privacy is filtering from the internet the network traffic that is undesirable. Unnecessary network traffic subjects the network to security related problems, and it also lowers the productivity of the workforce in the organization. There are many tools that one can employ to facilitate this activity, one of them being the NetSpective Filter. This filter provides a platform for making the network more secure as well as maximizing its performance through the elimination of unnecessary traffic without causing any interference to the company’s internet access, and at the same time, it boosts the productivity level of the employees in the company. The tool is somehow complex, but the process of filtering is easy to comprehend and at the same time, it is flexible. It updates the network on a real-time basis; therefore, this implies that security will be up-to-date on a regular basis. This tool can be adopted for both the small-scale and the large-scale companies. This appliance thus is best suitable for the company since it is a medium-sized technology firm. There is also a need to filter the content of the web that does not conform to the AUP of the organization. To do this, one needs to ensure that a firewall is in place. The tool is used to restrict exfiltration from occurring in the organization. Exfiltration can occur in many forms, one of them being the process by which an insider attaches confidential information either intentionally or unintentionally to the mail and makes it available on a document sharing platform. This is a security threat to the organization as it risks the leakage of sensitive information about the organization. The activation of firewall to all the computers in the company reduces the risk of experiencing exfiltration. The use of security zones provides an appropriate and flexible technique towards the process of securing a given environment. It allows one to boost the security policies of the organization in relation to the internet. It enables the grouping of sites into different zones and gives each zone its security level. This will result to the different users accessing a particular zone according to the priority assigned to each staff. All the zones are part of the organization, and they each have different data that is related to the organization. Many researches in regards to the prevention of unauthorized parties into a secured system have been conducted. However, it is unfortunate that the insiders who collaborate with the illegitimate users to gain access into the system threaten the security of the organization. Most of the organizations focus much on securing the system from outsiders and they give less attention to securing it from the insiders. To protect the system from both the staff as well as the outsiders, a decoy document can be used. This document automatically detects the presence of any malicious login to the system. It also keeps track of all the activities that have been performed by the unauthorized person. Baited targets are the common features in these documents that enable the monitoring process. Hiding the internal IP addresses is another security measure that should be employed. There are two types of NATS that can be adopted by the organization; the hide NAT application is suitable for this task. Here, one public IP address represents all the computers in the organization while on the network and conceal their private addresses. It creates a many-to-one relationship. The static NAT whereby the entire private addresses are transformed to their corresponding public addresses. This creates a one-to-one relation. This is mainly applied in the web, and the e-mail services. Both of them have a provision for hiding the internal IP address on the computers by providing other addresses to represent the computers while on the network. Securing any network should be a paramount task for any organization. When the system is susceptible to security threats, there are high chances of experiencing attacks from unauthorized persons. The greatest risk that the organization faces in terms of security is insiders. The network administrators as well as the CIO tend to give much emphasis on the protection of the system from outsiders and they focus less on the insiders. In order to achieve strong security policies for the organization, both the workforce and the outside people should be restricted towards having access to the system. For the staff, some security levels need to be implemented for each of them, so that they all have privileges to access the information that is related to their operations. Other measures also have to be adopted effectively. The organization should invest enough resources to the security operations. Competent persons should also be assigned the role of maintaining strong security strategy for the organization. The workforce assigned the role of overseeing the company security are pillar of the organization since it is impossible to run a successful company that does not have a security system that is well defined. The internet contributes to a lot of security issues, and the platform should be restricted to some extent. Achieving a security policy plan that is perfect is impossible, but having a security strategy that is strong enough to ensure that all the operations of the company are working optimally is possible. That should be driving force for all the organizations to yield satisfactory results. Graphical Solution Conclusion Data privacy is vital when it comes to network security and one of the ways of ensuring that this privacy is adhered to is filtering of any unnecessary network traffic. An example of a tool that can be used in filtering is the NetSpective Filter. Another step that can be taken to ensure data privacy is hiding the IP address. All organizations must ensure that they secure their networks to avoid attacks from unauthorized personnel. Organizations ought to invest a lot in securing data. This includes assigning professionals in the organization who can maintain security. Reference List Berkowitz, H. C. (1999). Designing routing and switching architectures for enterprise networks. Indianapolis, IN: Macmillan Technical Pub. Lacey, D. (2009). Managing the human factor in information security: How to win over staff and influence business managers. Chichester, England: Wiley. NATO Advanced Study Institute on Network Security and Intrusion Detection, Kranakis, E., Haroutunian, E. A., Shahbazian, E., North Atlantic Treaty Organization., NATO Science for Peace and Security Programme., & IOS Press. (2008). Aspects of network and information security. Amsterdam: IOS Press. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Assignment 4: Designing Compliance Within the LAN-to-WAN Domain”, n.d.)
Retrieved from https://studentshare.org/information-technology/1648651-assignment-4-designing-compliance-within-the-lan-to-wan-domain
(Assignment 4: Designing Compliance Within the LAN-to-WAN Domain)
https://studentshare.org/information-technology/1648651-assignment-4-designing-compliance-within-the-lan-to-wan-domain.
“Assignment 4: Designing Compliance Within the LAN-to-WAN Domain”, n.d. https://studentshare.org/information-technology/1648651-assignment-4-designing-compliance-within-the-lan-to-wan-domain.
  • Cited: 0 times

CHECK THESE SAMPLES OF Designing Compliance within the LAN-to-WAN Domain

Rock N Reggae - Work Breakdown Structure

From the paper "Rock N Reggae - Work Breakdown Structure" it is clear that the potential threats and uncertainties associated with staging the Rock 'n' Reggae concert can be many such as securities breach, fire and riots as it is a public event and these hazards are always associated where a huge crowd....
6 Pages (1500 words) Case Study

Network Security setup

ther security measures that can be implemented within the company's IT infrastructure includes eliminating single point of failure, improving security access to sensitive data and ensuring that there is data backup in servers outside the main data centre.... User domain usually entails all the employees of Richman investments, these also includes consultants, contractors and even other third party users.... WAN domain is a necessary domain especially when connecting with remote users....
7 Pages (1750 words) Research Paper

Intellectual Property: Domain Name Issues in Hong Kong

The purpose of this paper is to shed a light on the conflict between trademarks in Hong Kong concerning a dispute over domain names.... The global system of domain names is used to facilitate navigation of the Internet.... The principle of this system is rather simple: the domain name is mapped a numeric Internet Protocol Number corresponding to it.... Global nature of the domain name system means that users from any place can access the corresponding online address....
14 Pages (3500 words) Term Paper

The Development Information Security

However, most of the Security Frameworks stress more on compliance requirements and controls rather than effectiveness.... These ISMS are based on ISO standards which enable SMEs to see the value of security outside of technical constraints and regulatory compliance.... Moreover, it provides support for effective use of technology, central management, adaptability, flexibility, performance, interoperability and compliance on the forefront....
25 Pages (6250 words) Essay

LAN and LAN to WAN Infrastructure

The problems to be discussed in the paper revolve around improving the security domains of the organization, more specifically the LAN domain and LAN to WAN domain.... This paper will analyze a security problem, a proposed technical change to address the problem and an estimated budget of the proposed solution....
4 Pages (1000 words) Essay

Market-Based Policy Instruments

Communities within different regions at some point experience environmental challenges depending on their sensitivity towards sustainability (Stavins, 1991; Bovenberg and de Mooij, 1994).... The changing interest of consumers is also one of the good indicators revealing the necessity of sustainability within economic growth (Figge, 2005; Stavins, 1996)....
12 Pages (3000 words) Essay

Implementing Hospital Information Support System to Keep All the Patients Data Records

The paper 'Implementing Hospital Information Support System to Keep All the Patients Data Records' is a spectacular example of an information technology research proposal.... 'The City' a metropolitan hospital in the UK whose management board answered directly to government ministers was the favored organization to be a pilot site for the implementation of a Hospital Information Support System (HISS)....
14 Pages (3500 words) Research Proposal

The Impact of Adopting IT Governance on Financial Performance

Furthermore, it stresses on regulatory compliance, helps businesses to raise the value acquired through IT, facilitates alignment and makes execution of the organization's IT governance and control frameworks easier (Weill & Ross 2004).... The paper "The Impact of Adopting IT Governance on Financial Performance" is a great example of information technology coursework....
8 Pages (2000 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us