Sie sind auf Seite 1von 3

Rajiv Nelvoy

D40297481
02/15/2015

NeuroGimmicks Network Security


Policy and Practices

General Security Policy


1. Secure Internal network and Cloud Services
NeuroGimmicks network will be separate from the public Internet by strong user
authentication mechanisms and policy enforcement systems like firewalls and web
filtering proxies. Additional monitoring and security solutions, such as anti-virus software
and intrusion detection systems, should also be employed to identify and stop malicious
code or unauthorized access attempts.
Internal Network
The boundary points on NeuroGimmicks network will be identified and each boundary
will be evaluated to determine what types of security controls are necessary and how they
can be best deployed. Border routers should be configured to only route traffic to and
from NeuroGimmicks public IP addresses, firewalls should be deployed to resist traffic
only to and from the minimum set of necessary services, and intrusion prevention
systems should be configured to monitor for suspicious activity crossing your network
perimeter.
Cloud based services
NeuroGimmicks will consult the terms of service with all cloud service providers to
ensure that its information and activities are protected with the same degree of security
that we want. It will also enquire about additional services.

2. Develop strong password policies


Adopt two-factor authentication methods as they are much more secure than static
passwords for authentication. One common example is a personal security token that
displays changing passcodes to be used in conjunction with an established password.
However, two-factor systems may not always be secure.
NeuroGimmicks encourages employees to use the strongest passwords possible without
creating the need or temptation to reuse passwords or write them down. That means
passwords that are random, complex and long (at least 10 characters), that are changed
regularly, and that are closely guarded by those who know them.
3. Encrypt sensitive company data
Encryption should be employed to protect any data that NeuroGimmicks considers
sensitive, in addition to meeting applicable regulatory requirements on information
safeguarding. Different encryption schemes are appropriate under different
circumstances. However, applications that comply with the OpenPGP standard, such as
PGP and GnuPG, provide a wide range of options for securing data on disk as well as in
transit.
4. Regularly update all applications
All systems and software, including networking equipment, should be updated in a timely
fashion as patches and firmware upgrades become available. Use automatic updating
services whenever possible, especially for security systems such as anti-malware
applications, web filtering tools and intrusion prevention systems.

Technical functionality

NeuroGimmicks has chosen L-com Connectivity Products to provide as a solutions


service for our network.
The three basic components that we will be needing are:
1. Wireless NIC: All PCs and laptops that need to connect to the wireless network
require a Wireless Network Interface Card (NIC). It is an Ethernet card and an
antenna built into one and is present in computers and laptops. They allow for the
computer to communicate with the access point.
2. Wireless AP: This is the Wireless Access Point that acts as the central receiver for all
the wireless PCs and laptops. The Wireless AP is usually connected to a wired
network switch or router.
3. Wireless Router: It is used to connect multiple wireless computers or laptops to a
single Cable/DSL modem so that all wireless clients can share one Internet
connection.

References
[1] FCC Small Biz Cyber Planner 2.0. (n.d.). Retrieved February 16, 2015, from
http://www.fcc.gov/cyberplanner
[2] SOHO Network Design. (n.d.). Retrieved February 16, 2015, from
http://www.stepwise.hk/npwiki/Lecture/HomeNetworkDesign

Das könnte Ihnen auch gefallen