StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Information Security Implementation Plan - Essay Example

Cite this document
Summary
This essay "Information Security Implementation Plan" is a preparation of MEMATECH Solutions Limited Information Security Implementation Plan. The essay covers and discusses the areas of ISCBK (Information Security Common Body of Knowledge) that incorporate the various groups of information security.

 
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.8% of users find it useful
Information Security Implementation Plan
Read Text Preview

Extract of sample "Information Security Implementation Plan"

Download file to see previous pages

New technologies are coming up in the market daily. Therefore, there is a need to safeguard the evolving technologies. In the case where MEMATECH Solutions limited has this need, I have proposed to develop and install a new security plan for the company. The idea behind the plan is to come up with a network that connects all the machines in the organization in protecting the plan from being publicized during the stage of development and research. I have proposed a security plan for MEMATECH Solutions limited for the connection that will safeguard their new products when researching and developing stages are carried out.

The paper proposes a comprehensive plan that deals with password policy, network policy, authentication of data, and the project’s cost.Various Servers and NetworksTo safeguard the project it is imperative that all information and data are kept on different networks and servers that are not within the access of the general corporation. This can be achieved by developing new networks through the appliances of the Cisco Terascale router or Cisco ASA security, VMware, VLANS, and Windows 2008 with the help of IPV6 private addressing.

Employing the appliances of ASA security and Terascale, I will be able to monitor and control the entire network and access traffic on the corporate network subset through the firewall features. In conjunction with the MAC address, I will implement filtering to offer more security. The IPV6 IP mechanism will be employed to help it from attempts of network intrusion and brute force. I will use a private address to ensure that all the IP addresses are internal free from public access. Windows 2008 will be helpful in creating different domains from the conventional corporate network, where all the information and data can be kept.

Employing the group policies, active directories will undergo implementation to monitor the access of data. For private and important information of the company, the encryption of the folders and files will be implemented.   

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Implementation Plan Essay Example | Topics and Well Written Essays - 5000 words”, n.d.)
Implementation Plan Essay Example | Topics and Well Written Essays - 5000 words. Retrieved from https://studentshare.org/information-technology/1630045-implementation-plan
(Implementation Plan Essay Example | Topics and Well Written Essays - 5000 Words)
Implementation Plan Essay Example | Topics and Well Written Essays - 5000 Words. https://studentshare.org/information-technology/1630045-implementation-plan.
“Implementation Plan Essay Example | Topics and Well Written Essays - 5000 Words”, n.d. https://studentshare.org/information-technology/1630045-implementation-plan.
  • Cited: 0 times

CHECK THESE SAMPLES OF Information Security Implementation Plan

Information Security Program Survey

information security Program Survey (Name) (University) (Date) information security Program Survey Introduction The National Aeronautics and Space Administration (NASA) is the United States' agency to manage the nation's aerospace research, aeronautics, and other civilian space programs.... Since the NASA needs to manage highly sensitive data, information, strategic plans, and space programs, the organization pays particular attention to its information security program....
4 Pages (1000 words) Essay

Social Marketing, Sustainability and Racism in Australia

This report is a security plan for the business of the Batteries+.... In this security plan based report I will outline main security initiative which we will apply for the management and handling of the Batteries+ business and IT security.... The security management can involve the handling and implementation of the security measures for the securing of network and corporate business information.... Therefore, it is imperative that organization takes account of their network for security threats and for this hire a security expert who guides the management on how to secure organization's network and… In addition, it is yet vital and significant to maintain exceptional security in a networked structure....
15 Pages (3750 words) Essay

Security Plan- Human, Electronic Information

nbsp; A recent audit of the information security management system found it to be deficient in some key areas, notably incident response, disaster recovery, and business continuity.... owever, an apparent lack of staff awareness of the various threats to information security indicated a need for a training programme and robust guidelines to enhance information security.... anagement has directed you to design a Security Plan to (1) identify and describe the potential threats to the organization's physical, human, and electronic information holdings; (2) based on the perceived threat, design concise security policy guidelines for use by staff; and (3) develop a comprehensive information security education programme for information users....
17 Pages (4250 words) Essay

Developing the Corporate Strategy for Information Security

This report "Developing the Corporate Strategy for information security" discusses a chief information security officer that is often assigned to perform vital functions within an organization.... nbsp; Moreover, the personnel also perform the operational duty in terms of securing the collected information relating to information security for a longer time period.... Moreover, the CISO is liable for developing as well as implementing an efficient information security plan, strategy, standard, or procedure within an organization through performing the aforementioned function (the State of California, 2008)....
5 Pages (1250 words) Report

Promoting Information Security in Banking Solutions Inc

This case study "Promoting information security in Banking Solutions Inc" focuses on the major information security issue faced by Bank Solutions Inc.... Skipping some item processing facilities poses an information security risk to both customers and the institution.... Skipping some item processing facilities poses an information security risk to both customers and the institution.... ther failures contributing to information security issues include problems regarding critical systems, business processes, alternative processing facility address as well as directions, notification listing, and procedures for public relations management....
5 Pages (1250 words) Case Study

The Implementation of the Security Plan

This case study "The Implementation of the Security Plan" focuses on the action plan that is to beef up the information security in the banks and ensure that all threats and vulnerabilities are reduced to a minimum.... he purpose of the action plan is to beef up the information security in the banks and ensure that all threats and vulnerabilities are reduced to a minimum.... The program will use the various federal laws, policies and regulations together with best practices from the industry to come up with an effective information security plan for the bank (Whitman & Mattord, 2014)....
7 Pages (1750 words) Case Study

Control Systems Security - Resilience Capability Plan

As the paper "Control Systems Security - Resilience Capability plan" tells, the performance of creating resilient security systems is to enable the development of new defense architecture that offers an in-depth defense and which employs interoperable, extensible as well as fail-safe systems.... nbsp;           The road map to providing a sound resilient plan entails several scopes.... nbsp;           The performance of creating resilient security systems is to achieve several objectives aimed at mitigating challenges that come about with energy sector security risks....
8 Pages (2000 words) Essay

Security of Information in Business Organisations

That aside, the concept of information security is interpreted according to the specific purpose(s) for which protecting information by a particular businessman becomes a primary concern (Gupta, 2009).... … INTRODUCTIONSecuring business information may be defined as a process of protecting any form of information that is vital to one's business interests and business's wellbeing (Cisco Systems Inc.... (2012) states that INTRODUCTIONSecuring business information may be defined as a process of protecting any form of information that is vital to one's business interests and business's wellbeing (Cisco Systems Inc....
14 Pages (3500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us