AllFreePapers.com - All Free Papers and Essays for All Students
Search

It454 Security Management

Autor:   •  November 14, 2016  •  Research Paper  •  2,839 Words (12 Pages)  •  767 Views

Page 1 of 12

IT454 Security Management

The Gym

Alexander Nazario

August 8, 2016

Table of Contents

Information Security Management        

Purpose and Scope        

Security Requirements        

Perimeter Security        

Client and Server Security        

Back end Database security        

Front-end UNIX or Windows server’s security        

Client and Server Authentication        

Wireless and Remote Access Security        

Symmetrical key and public key encryption        

Outline the methods to secure VPN access to the network and the back end databases        

Securing the wireless components of the network        

Security Configuration Management        

References        


Information Security Management

Purpose and Scope

The Purpose of this plan is to describe how the confidentiality, integrity and availability of information across all five (5) locations of The GYM across the state. The internal control provides a system of check and balances to avoid discrepancies being introduced into the operation of the business. The IT Security measures are intended to protect information assets and preserve the privacy of The GYM employees, clients and suppliers. Inappropriate use exposes risk to include virus to compromise the GYM network

The GYM will open five (5) more locations across the state the next year. The company is composed admin/manager/sales and ten (5) five per location each of them tie up to the main software by their individuals mobile phones to check on schedules and clients. The admin personnel or manager also schedule the sales of memberships, sales of goods and inventory. Once you become a member you can log in to your portal and schedule different types of activities that include group classes, individual classes or tanning bed scheduling. The computers that give access to the admin/ manager that is located in the main office the second computer it for all to use to include members to check their balances, renew or make payments, the main lobby computer is utilized as a POS and check in with both software as web based applications. All access is given by a card that can be replaced if lost, same as entering the rest of the facilities if you leave your card you can also enter your pin number to enter and exit the premises.

...

Download as:   txt (16.3 Kb)   pdf (249.3 Kb)   docx (568.7 Kb)  
Continue for 11 more pages »