It454 Security Management
Autor: Azero Naz • November 14, 2016 • Research Paper • 2,839 Words (12 Pages) • 757 Views
IT454 Security Management
The Gym
Alexander Nazario
August 8, 2016
Table of Contents
Information Security Management
Purpose and Scope
Security Requirements
Perimeter Security
Client and Server Security
Back end Database security
Front-end UNIX or Windows server’s security
Client and Server Authentication
Wireless and Remote Access Security
Symmetrical key and public key encryption
Outline the methods to secure VPN access to the network and the back end databases
Securing the wireless components of the network
Security Configuration Management
References
Information Security Management
Purpose and Scope
The Purpose of this plan is to describe how the confidentiality, integrity and availability of information across all five (5) locations of The GYM across the state. The internal control provides a system of check and balances to avoid discrepancies being introduced into the operation of the business. The IT Security measures are intended to protect information assets and preserve the privacy of The GYM employees, clients and suppliers. Inappropriate use exposes risk to include virus to compromise the GYM network
The GYM will open five (5) more locations across the state the next year. The company is composed admin/manager/sales and ten (5) five per location each of them tie up to the main software by their individuals mobile phones to check on schedules and clients. The admin personnel or manager also schedule the sales of memberships, sales of goods and inventory. Once you become a member you can log in to your portal and schedule different types of activities that include group classes, individual classes or tanning bed scheduling. The computers that give access to the admin/ manager that is located in the main office the second computer it for all to use to include members to check their balances, renew or make payments, the main lobby computer is utilized as a POS and check in with both software as web based applications. All access is given by a card that can be replaced if lost, same as entering the rest of the facilities if you leave your card you can also enter your pin number to enter and exit the premises.
...