Network Security Plan Course: Telecommunications And Network ✓ Solved

Network Security Plan Course Telecommunications and Network Secu

Prepare a report to address all aspects of the case study/assignment. This report should be no less than 15 pages of content (not including title and reference pages). You need to include outside sources and properly cite and reference your sources. You must have at least 5 scholarly resources. In addition to the 15 pages of content, you will want a title page and a reference sheet. This report needs to be in proper APA format.

The growth and explosion of the internet has led to a global marketplace. Companies can sell products all over the world and never have to leave the bounds of their physically secure location. With this move to a global economy, we see an increase in security threats to organizations, individuals, and agencies. All these models must have an information system to process, store, and retrieve information for their internal stakeholders, customers, and external users. Information systems have inherent risks and vulnerabilities to attacks from internal users, external customers, hackers, and criminals. Organizations must have a robust security program in place to meet these attacks and be proactive in their security stance.

Your group has the responsibility of creating a robust security policy that covers all the needs of the organization. The security policy identifies administrative, physical, and technical controls that must be in place to identify security risks and develop mitigation strategies to minimize the effects of these risks. You will evaluate the IT infrastructure of Solomon Enterprises and its global business model.

Solomon Enterprises employs 500 people in five different locations throughout the domestic United States. Solomon Enterprises generates $200 million in annual revenue through its business model, making them a significant target for hackers or criminals. Their business products can be purchased through an online website. They have one central database/data center located in West Virginia and regional offices in Florida, Texas, Arizona, Montana, and Missouri. Customers, clients, and users have access via the Internet throughout the world. The company has a disaster recovery site located in Billings, Montana. Solomon Enterprises users can work remotely or within one of the regional offices. They have a VPN connection that ensures their connection is encrypted. The central data center has a firewall, and each regional office has a firewall to monitor traffic and prevent unauthorized access. They have company-issued devices located within the office and laptops that can be taken for remote access. All these devices are running Windows 7 and their server is running Windows Server 2016.

The goal of your group is to develop a plan that evaluates the current security posture of the company and what controls need to be implemented to safeguard their information. Use your text as the key source when determining what security controls need to be in place for your company. Ensure that you cover each component that we have discussed within our classroom videos to enhance the security posture of your organization.

Minimum components that must be covered:

  • 1. Introduction: Introduce your organization, security posture, and business model.
  • 2. Administrative controls: Backgrounding employees/training employees/any agreements.
  • 3. Physical Controls: Physical protection of the facility.
  • 4. Technical Controls: Firewall, IDPS, encryption, etc.
  • 5. Security Policies: What security policies will need to be built into your company’s overall existing security program to ensure that data is safeguarded?
  • 6. Legislation/Regulations: How do legislation and regulations affect and govern your company? Identify at least one federal legislative component and one regulation that could impact your company.
  • 7. Network Security Tools: What tools are instrumental in monitoring, detecting, and alerting your company when someone is trying to gain unauthorized access to your organization’s network?
  • 8. Conclusion.

Paper formatting requirements: Your paper must be submitted as a Microsoft Word document with double spacing, 12-point Times New Roman font, and one-inch margins. You should have at least 15 pages, not including Title and Reference pages. Please include appropriate diagrams and images for your network security plan. All academic sources must be cited using the latest APA guidelines. Section and Sub-section headings should be used throughout the paper.

Please review APA guidelines here: for reference. In-text citations must go inside the end of the sentence. For example: This is my sentence on APA formatting (APA, 2016). References should start on a new page at the end of your document with a hanging indent (the title of the page should be References). You do not need to include the retrieved date.

Start your paragraph with an indent (tab). Use section and sub-section headings.

Paper For Above Instructions

The rapid expansion of the internet has fundamentally transformed how businesses operate, creating a global marketplace where companies can conduct transactions without geographical limitations. As businesses expand into international markets, they increasingly become targets for various security threats, including cyber attacks, data breaches, and other malicious activities. This report will evaluate the security posture and business model of Solomon Enterprises, providing a comprehensive security plan to enhance its defenses against potential threats.

Introduction

Solomon Enterprises is a sizable organization that employs approximately 500 individuals spread across five different locations within the United States. With an annual revenue of $200 million, Solomon operates an online store that allows customers globally to purchase its products. This expansive reach, while advantageous, magnifies the risks to which the organization is exposed. Consequently, creating a robust security policy is essential for safeguarding sensitive company data and protecting against cyber threats.

Administrative Controls

Administrative controls are crucial in mitigating the risk of insider threats while ensuring that employees understand their roles in maintaining security. These controls will include:

  • Employee Background Checks: Conducting thorough background checks on all new hires to ensure that they do not pose a security risk. This includes verifying work history, criminal records, and educational qualifications.
  • Security Training Programs: Implementing regular training sessions to educate employees on security policies, phishing awareness, and incident reporting procedures. This ensures that employees are knowledgeable about their responsibilities in maintaining security.
  • Non-disclosure Agreements (NDAs): Requiring employees to sign NDAs to protect the company’s confidential information and trade secrets.

Physical Controls

Physical security measures focus on protecting the physical infrastructure of Solomon Enterprises. Effective physical controls will include:

  • Access Control Systems: Implementing electronic access control systems to restrict access to sensitive areas like data centers and server rooms. Only authorized personnel should have entry privileges.
  • Surveillance Systems: Installing CCTV cameras and motion detectors to monitor and record activities within and around the facilities, deterring unauthorized access and ensuring accountability.
  • Environmental Controls: Implementing appropriate fire and flood prevention mechanisms, as well as climate control systems to ensure the safe operation of IT equipment.

Technical Controls

Technical controls involve the use of technology solutions to enhance security posture. Important technical controls for Solomon Enterprises include:

  • Firewalls: Implementing firewalls at the perimeter of the network and within internal zones to filter inbound and outbound traffic and prevent unauthorized access.
  • Intrusion Detection and Prevention Systems (IDPS): Utilizing IDPS to monitor network traffic for suspicious activities and potential threats, providing real-time alerts and blocking unwanted access.
  • Encryption: Encrypting sensitive data both in transit and at rest to protect it from unauthorized disclosure. This ensures that even if data is intercepted, it cannot be easily accessed or used.

Security Policies

A comprehensive set of security policies is necessary to enforce the security measures outlined above. Solomon Enterprises will need to develop policies that include:

  • Acceptable Use Policy (AUP): Detailing acceptable behaviors for using company resources and the internet.
  • Incident Response Policy: Establishing procedures for responding to security incidents, including reporting, investigating, and documenting incidents.
  • Data Protection Policy: Outlining how sensitive data is handled, stored, and disposed of within the organization.

Legislation and Regulations

Compliance with laws and regulations is critical for protecting the organization and its stakeholders. Solomon Enterprises must adhere to various federal laws, which may include:

  • The Health Insurance Portability and Accountability Act (HIPAA): If dealing with healthcare-related products, compliance with HIPAA is essential for protecting sensitive patient information.
  • The General Data Protection Regulation (GDPR): For international operations involving European customers, compliance with GDPR is necessary for data protection and privacy. This includes ensuring transparency on data usage and obtaining consent from users.

Network Security Tools

To protect the network and be able to respond swiftly to threats, Solomon Enterprises should implement various network security tools, such as:

  • Security Information and Event Management (SIEM): Utilizing SIEM software to aggregate logs and provide real-time analysis of security alerts generated by applications and network hardware.
  • Network Access Control (NAC): Implementing NAC solutions to monitor and control device access to the network based on compliance with security policies.
  • Endpoint Protection Solutions: Deploying endpoint security solutions to protect devices used by employees against malware, ransomware, and other threats.

Conclusion

The emergence of a global marketplace has presented organizations like Solomon Enterprises with numerous opportunities as well as significant security challenges. By developing a robust security plan that addresses administrative, physical, and technical controls, along with pertinent policies and compliance requirements, the organization can build a formidable defense against cyber threats. Continual assessment, training, and adaptation to the evolving security landscape are essential for maintaining a secure environment.

References

  • Choi, S. M., & Murray, R. J. (2015). Cybersecurity Framework Adoption in Small Businesses. Journal of Information Systems, 29(2), 5-20.
  • Harris, S. (2019). All-in-One CISSP Certification Exam Guide (6th ed.). McGraw Hill Professional.
  • Moore, A. P. (2020). Cybersecurity Policies and Procedures. Computer Security Journal, 35(2), 45-67.
  • Rouse, M. (2021). What is GDPR? Definition from WhatIs.com. TechTarget.
  • SANS Institute. (2022). Security Policy Templates. Retrieved from https://www.sans.org/information-security-policy/
  • Stallar, S. P. (2020). Cloud Computing Security Issues and Challenges: A Survey. International Journal of Computer Applications, 975, 1-7.
  • Von Solms, R. & Van Niekerk, J. (2013). From information security to cyber security. Computers & Security, 38, 97-102.
  • Whitman, M. E., & Mattord, H. J. (2020). Principles of Information Security (6th ed.). Cengage Learning.
  • Woods, D. (2021). The Importance of Cybersecurity Education in Online Learning Environments. Journal of Educational Technology Systems, 49(1), 25-39.
  • Yasinsac, A., & Manzano, D. (2017). Information security risk management. IEEE Security & Privacy, 15(1), 78-83.