Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

ZXY Corporation has relocated to a new building that was wired and set up for a

ID: 3583776 • Letter: Z

Question

ZXY Corporation has relocated to a new building that was wired and set up for a local area network (LAN). The company implemented a client/server-based network in which all printers, folders, and other resources are shared but everyone has access to everything and there is no security outside of the defaults that were in place when the system was set up. You have been hired to secure ZXY’s network and ensure that the company has the highest levels of security to protect against internal and external attacks. In an 8-10 page proposal, include the following items to provide a comprehensive secure environment: A plan to provide secure access control methods for all user access A viable password policy, which includes complexity, duration, and history requirements A cryptography method to ensure vital data is encrypted A remote access plan to ensure that users who access the network remotely do so in a secure and efficient manner A thorough plan to protect the network from malware and various types of malicious attacks Your proposal should include all of the elements noted above with support, detail, and elaboration for each section explicitly grounded in knowledge from the assigned readings and media along with any outside sources you may choose to bring into your writing. Your paper should be 8-10 pages in length with document formatting and citations of sources in conformity with CSU-Global Guide to Writing and APA Requirements.

Explanation / Answer

1.


802.1x authentication can be configured for controlled network access. It needs supplicant, network switch and Authentication server. Authentication server communicates with domain controller to get the authentication verified provided by user.Once authentication successful DHCP server releases the IP address to that particular userid (which is domain login id usually). User activity on the network can be tracked and logs can be maintained and only authorised user will get the access of the network.


2.

The best practices :
Password History : Policy to be put to restrict user from using several common passwords.
Password Duration: Define maximum and minimum password duration . you can define maximum duration as 30 days after that user has to change the password.
Compexity: Following value can be enforced.

•Passwords must have at least six characters.
•Passwords must use at least three of the four available character types: lowercase letters, uppercase letters, numbers, and symbols.


3.

First, it is vital to understand what information needs encryption protection to decide where the technology will be deployed.It is also important when to secure the data.what needs to be encrypted is also important. for example: Hard Drives,Individual Files,Removable Media , IM(instant messaging) etc....
Symantec's encryption solutions provide maximum protection, robust management, and increased security with Symantec Data Loss Prevention (DLP) integration.

4.

If you use Checkpoints UTM-1 appliance , you can allow users to access it remotely through their Remote Access VPN Clients .

A VPN client will require to be installed on user machine to access / connect to VPN server.

VPN server then will release the private IP to that user machine and allow defined access to that user.

Configuration details can be refered from UTM configuration manual.

5.

Malware is a combination of the words malicious and software. This term is often used for threats
such as viruses, spyware, adware, and other software installed without a user's consent or knowledge.
Malware attacks are almost entirely an automated activity. Malware can get into your system in various ways, including :

Solution :
Antivirus and Anti-spyware software monitor your computer for potential threats. Such as Symantec Endpoint Protection :
you can use Symantec Endpoint Protection to centrally manage protection for all the endpoints in your organization's network.

This solution combines several Symantec technologies like antivirus and antispyware, Intrusion prevention system, proactive Threat scanning , application control .

Hope, It makes sense.

Thanks