Information Security Polices
Autor: richardcoward • June 10, 2012 • Essay • 521 Words (3 Pages) • 2,170 Views
Table of Contents
1. Executive Summary 1
2. Introduction 1
3. Disaster Recovery
4. References 3
Executive Summary
Due in Week Nine: Write 3 to 4 paragraphs giving a bottom-line summary of the specific measureable goals and objectives of the security plan, which can be implemented to define optimal security architecture for the selected business scenario. In reviewing Sunica Music’s problem, it seems that they are having much difficulty correlating data regarding customer information, purchases, and inventory between their stores. My first goal for them would be to implement a WAN that will connect both networks for both stores using a switch. Not only am I going to recommend the WAN but also many pertinent security features to ensure their information is only shared between the two stores and not any hackers.
One of the most important security features for a WAN in my opinion would be that of a firewall. This will protect any traffic from coming into the network. This will also ensure the safety of the data transmissions between the two stores.
They also need a separate network to allow for customers to access products via the internet. Other than the firewall, another important security feature would be encrypted passwords to access the internet portion of the database. Customers will be given access to the information provided on the internet using a unique username and password. I would recommend a public key cryptography. This is where the same key is used to encrypt and decrypt transmissions.
Lastly, being that steal music and movies is one of the hottest things on the web right now, I would recommend strong IDS to protect against those
...