Question

For your initial discussion post, you are to expand on the element review below. You need...

For your initial discussion post, you are to expand on the element review below. You need to provide specific examples on what will be reviewed in the audit based on this element. Answer what will be included in the audit plan for this element. If possible, provide a link to another resource. Try not to pick an element already discussed by another student. In your response, provide your comments on the other students posts on their element and any additional information you might have on it. Remember to cite any sources.

Network security review: Review of internal and external connections to the system, perimeter security, firewall review, router access control lists, port scanning and intrusion detection are some typical areas of coverage

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Network security review: Review of internal and external connections to the system, perimeter security, firewall review, router access control lists, port scanning and intrusion detection are some typical areas of coverage

  • Network security might seem too complex, and tackling it might seem like too much work. But you can take a step-by-step approach as described in the checklist below, and then get an outside consultant to help you complete your security plan.
  • You might think network security is an expense that won't help your business grow. Instead of thinking about network security as a technical concern, consider it a business continuity issue. Networks have become a basic part of doing business today, making security planning as important as sales and marketing.
  • You may believe that smaller companies are less likely to be a target of attacks. But as large companies beef up their network security, hackers are increasingly focusing on small and medium-sized businesses.

General Security Planning Tips - The following tips can help you develop and win support for an effective network security plan:

  • Focus on return on value rather than return on investment. Consider the harm a network security breach could do to your business, such as lost revenue or customer litigation.
  • Never assume that network attacks will come only from outsiders. Your employees can accidentally create security vulnerabilities, and disgruntled or former employees can cause considerable damage.
  • Don't be tempted to confront security concerns with a piecemeal approach rather than a single, unified strategy that protects your whole network.
  • Work with others in your company to develop and roll out security strategies, focusing on technology, training, and physical site security with tools like surveillance cameras.
  • Find the right balance between security and usability. The more secure your network is, the more difficult it can be to use.

Network Security Checklist - Every business should have a written (and thoughtfully prepared) network security plan in place. A thorough policy will cover topics such as:

  • Acceptable use policy, to specify what types of network activities are allowed and which ones are prohibited
  • E-mail and communications activities, to help minimize problems from e-mails and attachments
  • Antivirus policy, to help protect the network against threats like viruses, worms, and Trojan horses
  • Identity policy, to help safeguard the network from unauthorized users
  • Password policy, to help employees select strong passwords and protect them
  • Encryption policy, to provide guidance on using encryption technology to protect network data
  • Remote access policy, to help employees safely access the network when working outside the office

Do you have any of the following?:-

  • Firewall, to keep unauthorized users off your network
  • Virtual private network (VPN), to give employees, customers, and partners secure access to your network
  • Intrusion prevention, to detect and stop threats before they harm your network
  • Content security, to protect your network from viruses, spam, spyware, and other attacks
  • Secure wireless network, to provide safe network access to visitors and employees on the go
  • Identity management, to give you control over who and what can access the network
  • Compliance validation, to make sure that any device accessing the network meets your security requirements

Identify Your Most Important Digital Assets and Who Uses Them:-

  • Exactly what are your company's digital assets (such as intellectual property and customer records)?
  • What are they worth?
  • Where do those assets reside?
  • Who has access to these assets, and why? Can all employees access the same assets?
  • Do you extend access to business partners and customers?
  • How do you control that access?

What Would a Security Breach Do to Your Business?:-

  • What is the potential financial impact of a network outage due to a security breach?
  • Could a security breach disrupt your supply chain?
  • What would happen if your Website went down?
  • Do you have e-commerce features on your site? How long could the site be down before you lost money?
  • Are you insured against Internet attacks, or against the misuse of your customers' data? Is this insurance adequate?
  • Do you have backup and recovery capabilities to restore information if necessary after a security breach?

Consider Your Current and Future Needs:-

  • How do you expect your business plan to evolve over the next few years?
  • How recently have you updated your network equipment? Software? Virus definitions?
  • What type of security training do you provide to your employees?
  • How will growth affect your digital assets and their value to your business as a whole?
  • In the future, are you likely to have a greater need for remote employees, customers, or partners to access those digital assets?

Sources:- https://www.cisco.com/c/en/us/solutions/small-business/resource-center/secure-my-business/network-security-checklist.html

http://www.infopercept.com/wp-content/uploads/2017/08/Infopercept-Network-Security-Architecture-Review-Approach.pdf

Please let me know in case of any clarifications required. Thanks!

Add a comment
Know the answer?
Add Answer to:
For your initial discussion post, you are to expand on the element review below. You need...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

  • Go to the Java API and review the Rectangle class briefly. As directed below, create a...

    Go to the Java API and review the Rectangle class briefly. As directed below, create a subclass of the Rectangle class called BetterRectangle as described below. Create another class called RectangleTester, which fully tests the BetterRectangle, by displaying a menu that allows a user to process data for multiple rectangles until they choose to quit. Be sure to include sample runs as block comments in your tester source code file. P9.10 The Rectangle class of the standard Java library does...

  • You work for EGS Testing Solutions; your company is involved in testing related to access control...

    You work for EGS Testing Solutions; your company is involved in testing related to access control systems. A large, private fitness club contacted your company because their Web server was hacked. The fitness club has a corporate office with 50 workstations, 4 application servers, 2 e-mail servers, 2 Web servers, and 129 franchisees with 10 workstations and about 3,500 members at each location. Except for the equipment at the franchisees’ locations, all other equipment resides at the central headquarters. The...

  • THE NEED FOR health information management (HIM) professionals in long-term and post-acute care (LT-ÉAC) settings has...

    THE NEED FOR health information management (HIM) professionals in long-term and post-acute care (LT-ÉAC) settings has grown exponentially in the past decade. With the implementation of setting-specific reimbursement models and quality initiatives, the skill sets that HIM professionals bring to the table are invaluable to any healthcare organization. 'Ihey are a source of expertise in data analysis, documentation, privacy and security, quality, compliance, coding, and information systems. Organizations and HIM professionals from the various LTPAC settings have reached out to...

  • i have the case study question with the answers but i need help to re-write the...

    i have the case study question with the answers but i need help to re-write the answers. please see the attached files Case Study Analysis (CSF3003) Assessment Description and Requirements CLO1: Case Study 1 Ahmad lef home to study master and PhD in Australia. He has fees for the first semester only. After he arrived to Sydney and settled down, he start looking for a part-time job to save money for the next term. Ahmad has some experience on making...

  • Need answers. thank you VOCABULARY BUILDER Misspelled Words Find the words below that are misspelled; circle...

    Need answers. thank you VOCABULARY BUILDER Misspelled Words Find the words below that are misspelled; circle them, and then correctly spell them in the spaces provided. Then fill in the blanks below with the correct vocabulary terms from the following list. amino acids digestion clectrolytes nutrients antioxident nutrition basal metabolic rate extracellulare oxydation calories fat-soluble presearvatives catalist glycogen processed foods cellulose homeostasis saturated fats major mineral coenzyeme trace minerals diaretics metabolism water-soluable 1. Artificial flavors, colors, and commonly added to...

  • please read instructions on the first picture and follow it Discussion Board: Chapter 1 Due: Jun...

    please read instructions on the first picture and follow it Discussion Board: Chapter 1 Due: Jun 28, 2019 at 11:59 PM Please read the article titled Evolution of Operations Planning and Control: from production to supply chains In at least three paragraphs, describe how and why the focus of operations planning and control has changed over time. While one might argue that answers consisting of sentences quoted from articles do not represent plagiarism, I do not consider them acceptable, and...

  • please read instructions on the first picture and follow it Discussion Board: Chapter 1 Due: Jun...

    please read instructions on the first picture and follow it Discussion Board: Chapter 1 Due: Jun 28, 2019 at 11:59 PM Please read the article titled Evolution of Operations Planning and Control: from production to supply chains In at least three paragraphs, describe how and why the focus of operations planning and control has changed over time. While one might argue that answers consisting of sentences quoted from articles do not represent plagiarism, I do not consider them acceptable, and...

  • 1.2 Recruitment is one of the crucial functions of HRM. Based on the information provided below,...

    1.2 Recruitment is one of the crucial functions of HRM. Based on the information provided below, how would you describe THE COMPANY’s approach to recruitment, before and after the implementation of the Brand Ambassador Program? How did the use of social media lead to the revision of the whole approach regarding recruitment? How ‘THE COMPANY’ Developed a Brand Ambassador Program At ‘THE COMPANY’ we usually categorize Employment Brand at ‘THE COMPANY’ into four big ‘buckets’: candidate experience, brand ambassador programs,...

  • Please read the article and answer about questions. You and the Law Business and law are...

    Please read the article and answer about questions. You and the Law Business and law are inseparable. For B-Money, the two predictably merged when he was negotiat- ing a deal for his tracks. At other times, the merger is unpredictable, like when your business faces an unexpected auto accident, product recall, or government regulation change. In either type of situation, when business owners know the law, they can better protect themselves and sometimes even avoid the problems completely. This chapter...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT