Company Is a Reputable Organization Research Paper

Total Length: 1201 words ( 4 double-spaced pages)

Total Sources: 4

Page 1 of 4



Apart from the Firewall and IDS for the network security, the company will also integrate encryption system to protect the company network devices.

Encryption

Encryption is very effective for enhancing security devices of our information systems. The encryption system will assist in enhancing confidentiality and integrity of our information systems. More importantly, encryption will be effective in enhancing our network security because it will protect our system from network-based attacks such as eavesdropping and replaying messages. Typically, the encryption solutions will be integrated at application layer because encryption will assist the integrity of data transmitted across our information system. The encryption will change the data transferred across the information system into unreadable texts so that an unauthorized individual will not have access to our data. With the public key system, we will be able to decrypt the text to have access to the data. (Data Center Fabric, 2013).

3. Identification of the Boundary of the Data Center and the client's boundary location

Representation

The company will set an IP address range that we will use as the boundary for the Data Center. The IP address range will be combination of IP addresses of our staff and our clients. Our system will also allow the IP addresses of all the trusted external parties into our data Center. To enhance maximum protection of our information system, we will assign unique IP addresses to:

Mail Server Farm

Web Server Farm

Application Server Farm, and Database Server Farm.

We will also assign unique IP address to each of the computer of our staff, which will assist us to set the boundary of our Data Center. All our boundaries will be configured in the System Center 2012 Configuration Manager, and the boundary will be configured in the Configuration Manager console.
We will use site assignment to find appropriate site to join and this is based on the client's current network locations. (Microsoft (2012).

To protect our information systems, there will be access control to limit access to our sensitive resources that would assist in limiting communication protocol used within our location. The access control will also be used limit the impact of network failures. To ensure boundary protection of our network and manage the risks associated with our network backdoors. We will ensure that:

all devices attached to our network are authorized;

all interfaces with other authorized network are authorized;

all boundary subsystems of system are protected against attack; and We will strictly control host configuration at the perimeter and we enforce appropriate assurance levels.

Moreover, we also ensure appropriate traffic control:

The required traffics that would be allowed to pass through our network system would be controlled.

We will identify malicious traffic and filter whenever possible,

Our outgoing traffic may expose our resources to network risks, thus, we will only direct our traffic to trusted sites.

Conclusion

Integration of effective security systems is very critical to enhance data integrity. This report demonstrates the strategy that would be employed to protect our information systems from unauthorized access. The paper identifies IDS as an effective tool to detect unauthorized activities in our network system .We will integrate IDS to detect activities not authorized. Moreover, we will use firewall to block all non-desirable traffic from our system. Using the high-level security devices discussed in the paper, we will be able to enhance high-level security for our system.

References

Communication Security (2007).Baseline Security Requirements for Network Security Zones in the Government of Canada.

Data Center Fabric (2013).Data-at-Rest Encryption Solutions. Brocade Communications Systems,….....

Need Help Writing Your Essay?