Sie sind auf Seite 1von 3

In the Network Planning project I went over a network plan that would gear towards eyelash

technicians around the DMV area. The software is called LashPOS. PC’s would be interconnected by LAN
(Local Area Network). VPN’s would be used to mirror desktop computers in the salon. Now I will be
going over a plan to implement network security.

One desktop computer would act as the master server which should be in a protected room
(ideally a telecom closet) in the salon with limited key distribution. This room should also be fire
suppressed and have appropriate heating and cooling with backup power.

Four types of control will be needed for network security:

1. Preventative
2. Detective
3. Administrative
4. Technical

First we will take preventative measures to make sure the network is safe from attacks or intrusions.
A DMZ is already in place on the network internally, this makes sure that all information is secured and
confidential within the network.

Second we will have detective controls by using software called McAfee Endpoint Security. This
McAfee software covers intrusion prevention, machine learning, behavior monitoring, EDR, application
containment, migration assistant, web security, firewall and more.

Next we will implement administrative controls. There should be a strong password policy in place.
No accounts should be shared and users should not be allowed to install and run software. All user
accounts should be managed and issued by one person (typically the owner). Log management and
audits should also be done monthly.

Last we will implement technical controls. During the network planning an 802.1x Enabled Switch
(Managed) and 802.1x Enabled Wireless Router were installed to control network traffic. A VPN is
already set in place for access to the local LAN, so users will be able to connect virtually through
company laptops. I recommend a whole disk encryption be installed on all VPN laptops so that data will
be secure. A WPA2 encryption should also be implemented just because it’s up to date for stronger
authentication purposes.

Topology Design for Lash-Tech Software


Password Policy

Passwords should be at least 8 characters with uppercase letter, lowercase letters, numbers and
alphanumeric numbers.

Passwords should be set to expire every 6 months and they should not be able to be reused.

Passwords should be changed every 90 days.

Accounts should be set to lock out after 10 attempts.

All password resets should be done with owner of the company.


Citations:

1. Internet2 Wiki. (n.d.). Retrieved from


https://spaces.internet2.edu/display/2014infosecurityguide/Network Security
2. Wireless security protocols: The difference between WEP, WPA, WPA2. (n.d.). Retrieved from
https://searchnetworking.techtarget.com/feature/Wireless-encryption-basics-Understanding-
WEP-WPA-and-WPA2
3. 11.15 - Password Policy and Guidelines. (n.d.). Retrieved from
https://its.weill.cornell.edu/policies/1115-password-policy-and-guidelines

Das könnte Ihnen auch gefallen