Nobody downloaded yet

Security Design - Essay Example

Comments (0) Cite this document
In comparison with other locations and other networks nearby, it is ranked to be the strongest in terms of security. The firm is opting to relocate to a more secure system than the one it is using currently. Due to…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER98.3% of users find it useful
Security Design
Read TextPreview

Extract of sample "Security Design"

Download file to see previous pages identified were an inappropriate use of emails in the communication of sensitive business information, the connection of public data, and confidential business information to the same physical network. Improper storing of private data that were only to be found on the servers by the end users and transmission some sensitive business information between servers and clients.
For the proper communications of these findings, some policies were formed up by WWTC in the areas. These plans comprised of internet connectivity that was to be separated by the network, classified system; this ensures physical security to prevent any unauthorized access to the detailed information. The other policy introduced was a wide area network. The system made sure that any data that cross wide area network link has to undergo a protection section such as the virtual private network (Berger, 2012).
Public servers was another policy initiated, this ensured that configuration of all public servers using Hypertext transfer protocol system connections and acceptance of all valid requests and pass them through the firewall. Site-to-site virtual private network tunnels were also among the policies that were put in place through the findings enabling mutual authentication and protection to all provided devices (Bansal, 2015). WWTC ended the plans with user education whereby they created awareness and training programs on threats and good security practices.
Recommendations gave some deliverables on the general approach that the project may take. Among the recommendations pointed out were The protection of valuable assets of the company, determination of general architecture of the organization and development of a list of specific policies that could be applied and along with the rationale. Specific details must be written. Selection of the 12 relevant procedures for the addition in the Security Policy Document has to be reviewed in the written policies (Bansal, 2015). Attacks were classified ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Security Design Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
Security Design Essay Example | Topics and Well Written Essays - 750 words. Retrieved from
(Security Design Essay Example | Topics and Well Written Essays - 750 Words)
Security Design Essay Example | Topics and Well Written Essays - 750 Words.
“Security Design Essay Example | Topics and Well Written Essays - 750 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document


Design System and Security Control

... Design System and Security Control Introduction After the development of the project plan for the installation, upgrade as well as the maintenance of the said network which is supposed to support the ACA Technology TM Inventory and control (ACAIC) system, the next step is the designing of the system security and controls for that network. The security model described below aims at ensuring that the security professionals are able to develop a strategy for protecting the availability, integrity as well as the confidentiality of the data in an organization’s IT system. Many are the times the data in the IT system is at risk from a...
13 Pages(3250 words)Essay

Design and security of a small businness network - case study

...Detection System In order to provide advanced intelligence to the network security, IDS is incorporated within the network. It will sense and monitor the activity and match it to the patterns that are installed in it by the network administration staff. If any unfamiliar activity is noted, IDS will provide notifications and alerts for any possible security breach. Redundancy and Failover As seen in Fig 1.2, the switches are interconnected with each other. If any switch fails to respond, the network will still be operational, except from the nodes that are connected to the switch. For future expansions, 16 port switches along with VLAN support are designed. Extra ports will allow...
9 Pages(2250 words)Essay

To Design Secure, Scalable and Responsive Database Security Plan and Requirements Definition Document for a Medical Records SAN

...?INFORMATION SECURITY To design a secure, scalable, and responsive database security plan and requirements definition document for a Medical Records SAN (Storage Area Network) Author Author Affiliation Date Table of Contents Table of Contents 2 Part 1: Project Identification and Business Environment 3 Major responsibilities for database security management 3 Operational and incident management procedures 4 Personnel and procedures for daily administration 4 Part 2: Architecture and Operating System Considerations 4 Architecture of System 4 Requirements relate to database security 6 Part 3: User Accounts and Password Administration 6 User...
10 Pages(2500 words)Research Paper

Design Issues in the System (Security)

...?Design Issues in the System In a software system designing, the usability and security are two vital design objectives among many others include butnot limited to the functionality, performance, robustness, and reliability. The software designers implement access controls, firewalls, and / or encryption techniques to safeguard computer systems from intruders / hackers. On the other hand, the usability and accessibility guidelines have to be followed to develop easy to use software system. It is vital to balance the usability and security among the various design objectives. As per the given case study, the new system...
5 Pages(1250 words)Essay

Reserch paper on Internet Security(Master level) based on Electronic Business Design

...Internet Security Impact on Electronic Business Design Contents Introduction Electronic Business: An Introduction Electronic Business Threats Internet Security: The prevalent perspective Conclusion Introduction The advent of Internet has drastically changed lifestyles. This change has taken its effect on individuals and businesses alike. Corporations are dependant on internet for successful completion of various business activities. Electronic business also known as E Commerce is the latest revolution in Internet which companies to exploit the power of the Internet to boost their sales. It allows users to buy goods while sitting at the luxury of their home. It provides innumerable...
10 Pages(2500 words)Essay

Security - Network Design tradeoffs in attaining reasonable level of security. According to him absolute security would be impractical and cited the example of 9/11 when all planes were grounded to eliminate the recurrence of the disaster. But since that is an impossible situation, and work and life has to go on, security should be viewed in a more balanced manner. In other words there has to be a trade off in the level of acceptable security against possibilities of threats and attacks. He has very aptly remarked that “the only reliable way to measure security is to examine how it fails”. This is a significant factor which needs to be built in security...
54 Pages(13500 words)Essay

Security Design

... Assignment Research Paper Summary The paper d “A systems engineering approach for security system design” (Alston and Campbell, 107-112) was published in the proceedings of the International Conference on Emerging Security Technologies held in 2010. In this paper, the authors have attempted to provide a methodical approach of design to develop security systems. Systems engineering paradigm has been implemented to this approach which is poised to enable a systems designer to comprehend all the contributory factors that lead to a system’s situation and problems. Complex systems that critically need fool proof security solutions include battlefield defences systems, money transaction system, international telephone system, etc... . With the...
1 Pages(250 words)Research Paper

Database Design and data security breeches

...Database and data security Question The most crucial thing that a researcher needs to do before he or she uses patient’s information is to seek the consent from the patient. The rules and regulation governing the health information at that particular time is applicable. The research should prove that the information released is used academic purposes only. This is because avoid the issue where information released to a person are used for other purposes that can be detrimental to both the patient and the healthcare institution. The IRB waiver can be applied if the information is exceptional. The information with de-identified status can be given to the researcher. This is the information that gives details about a...
2 Pages(500 words)Essay

Integrating Security and Usability into the Requirements and Design Process

The user interface design of the touch screen register has features that enable it to attain security. First, the new system enforces access controls by requiring that every cashier supplies a matching pair of user-id and password in order to log in to the register. It is not only helpful in preventing non-legitimate access to the register, but also provides a good avenue to introduce role-based authentication. Moreover, it will be possible associating a given cashier with a certain workstation, and in certain instances, it is possible associating a cashier with a certain workgroup. Second, the registers ability to lock after four unsuccessful login attempts is a good strategy to suppress the efforts of brute force attackers and m...
8 Pages(2000 words)Research Paper

Security Architecture & Design models

...Security Architecture & Design models Security of an information system is the assurance that an information system components are prevented from unauthorized entry, manipulation of data. Security also safeguards against destruction of that systems components like data or resources. Elements of an information system that needs to be secured include file or data, resources like computers, hard drives, and other peripheral networking components. Securing an information system requires that security architecture be created by the management of the information system. Security architecture, therefore, is a...
5 Pages(1250 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Security Design for FREE!

Contact Us