In your own words 1 discuss how network security contrasts with usability from a
ID: 3794666 • Letter: I
Question
In your own words
1 discuss how network security contrasts with usability from a user’s standpoint. Discuss how to make an obtrusive security policy into a good network security policy that users can understand, obey, and yet still manage to get work done.
2 detail what a Network developer should ask when attempting to secure a network, address costs involved, or what should be protected and how likely a threat is to be an issue. Discuss different levels of security.
3 discuss some of the requirements of a server room, cabling considerations and other issues that should be taken into consideration and how the room as well as how the devices inside the room should be secured.
4 discuss some methods of communication for small business networks accessing the Internet. Cover some of the more common WAN setups for this environment and how equipment often takes on a multirole function. Examine how VPN can be used to connect offices or various sites for small business networks, eliminating the problem of how to handle wiring between remote locations.
Explanation / Answer
1.Every organization has something that someone else wants. Someone might want that something for himself, or he might want the satisfaction of denying something to its rightful owner. Your assets are what need the protection of security policy.A security policy comprises a set of objectives for the company, rules of behavior for users and administrators, and requirements for system and management that collectively ensure the security of network and computer systems in an organization. A security policy is a “living document,” meaning that the document is never finished and is continuously updated as technology and employee requirements change.
2.Unauthorized network access by an outside hacker or a disgruntled employee can cause damage or destruction to proprietary data, negatively affect company productivity, and impede the capability to compete. The Computer Security Institute reported in its 2010/2011 CSI Computer Crime and Security Survey (available at http://gocsi.com/survey) that on an average day, 41.1 percent of respondents dealt with at least one security incident (see page 11 of the survey). Unauthorized network access can also harm relationships with customers and business partners, who might question the capability of a company to protect its confidential information. The definition of “data location” is being blurred by cloud computing services and other service trends. Individuals and corporations benefit from the elastic deployment of services in the cloud, available at all times from any device, but these dramatic changes in the business services industry exacerbate the risks in protecting data and the entities using it (individuals, businesses, governments, and so on). Security policies and architectures require sound principles and a lifecycle approach, including whether the data is in the server farm, mobile on the employee’s laptop, or stored in the cloud.
Levels of Security:
Top Secret is applied to information that reasonably could be expected to cause exceptionally grave damage to the national security if disclosed to unauthorized sources.
This level needs to be reinvestigated every 5 years.
Secret Clearance
Secret is applied to information that reasonably could be expected to cause serious damage to the national security if disclosed to unauthorized sources.
This level is reinvestigated every 10 years.
Confidential Clearance
Confidential is applied to information that reasonably could be expected to cause damage to the national security if disclosed to unauthorized sources. The vast majority of military personnel are given this very basic level of clearance.
This level needs to be reinvestigated every 15 years.
Clearance Reinvestigation
Reinvestigations are more important than the original investigation because those individuals who have held clearances longer are more likely to be working with increasingly critical information.
3.A server room is the physical space that houses all the data running through the computer network of a business or organization. Most Information Technology professionals spend a lot of their time there, troubleshooting server or network issues and performing routine maintenance. Putting together a safe and accessible data center for the storing of technology and files is essential in creating a hub for IT infrastructure and operations. Design a server room that is safe, spacious and computer friendly for the entire IT team.
Six tips to follow
1.The basics
2.Security
3.Environment
4.Monitoring
5.Cabling for speed and flexibility.
6.Keep the big picture in mind
4.WAN services have become increasingly relevant to businesses in large part because of the proliferation of branch offices, remote workers, and the need for access to centrally provided data and applications As services like MPLS, Ethernet, and Internet become more critical, so does the need for more reliable WAN connections. This SearchEnterpriseWAN.com WAN Nation series will look at how WAN evaluation and selection procedures are evolving and keeping pace with new user and applications demands.