SlideShare a Scribd company logo
Network Security Proposal Template
Network Security Proposal
Prepared for:
University of Maryland Global Campus
Prepared by:
Student Name
I. Analysis and Planning
A. Vulnerability Assessment
Requirements
A few businesses incline toward competitors with specific
learning of data safety that can be acquired via some certified
preparing program. Some positions need work encounter or
propelled degrees, for example, a Master of Business
Administration in Information Systems. Network security
experts by and large have an assortment of capabilities –
imagination, inventiveness, initiative and collaboration, among
them. Distinctive ace accreditations are available to data
security inspectors, including Certified Information Systems
Security Professional and Certified Information Security
Manager, as are seller attestations offered by relationship, for
example, Microsoft and Cisco. Development from data security
overseer to data security supervisor or data security authority
might be conceivable with experience just as cutting edge
illuminating limits.
Proposed
Solution
As the network analyst in the University I have made the
following recommendations:
· Perform security hazard evaluation.
· Teach the client about strategy of data security.
· Use Operating Systems having good capabilities of fight
against malware.
· Use dedicated firewalls, especially for the tablets being used
by remote clients
· Develop the response plan which is PC incident.
When the “TestOut Security Pro” is utilized it helps to identify
the network infrastructure “TestOut's Security Pro”
confirmation is another affirmation not only measures what you
already know. The “TestOut Security Pro” Certification also
measures the capacity to supervise security dangers and
strengthen security for PC frameworks. The accompanying
information areas are tended to:
· Host Defenses
· Application Defenses
· Access Control and Identity Management
· Audits and Assessments
· Policies, Procedures, and Awareness
· Physical Security
· Perimeter Defenses
· Network Defenses
· Data Defenses
Information systems security directors must consolidate solid
specialized aptitudes in PC security with incredible
interpersonal, authority and authoritative capacities. They are in
charge of employing, rousing, preparing and, if fundamental,
terminating digital security staff. They survey and execute
security strategies, satisfy all legitimate and contractual
security orders, and counteract and recognize security ruptures.
(cybersec.org, cybersec.org)
Justification
As universities keep on confronting developing dangers to data
security, they are experiencing security reviews. Above reviews
include outside and inside evaluations of universities'
procedures and processing framework to gauge consistence with
selected security recommendations and best practices of
industry. The following testing comprises of a security check
and appraisal of all outer (open confronting) web addresses.
We'll perform a sweep on the web address pieces of the
customer and perform a test that acknowledge known security
threats that are powerless to external threats. We'll test your
efforts to establish safety in access endeavours on system and
information.
B. Security Policy
Requirements
In the requirements section, students will make explicit
UMGC’s requirements for a security policy. Given this section
requires information related to security policies, students should
review TestOut LabSim section 3 (Policies, Procedures, and
Awareness), and use additional resources as necessary.
Proposed

More Related Content

PPTX
Database development and security certification and accreditation plan pitwg
PPTX
Advanced Operating System Principles.pptx
PPTX
CS5300 class presentation on managing information systems
PPT
2008: Web Application Security Tutorial
PPT
How To Successfully Defend Against Irc Bots, Compromises, And Information Leaks
PPT
2011 lecture ia orientation
PPT
The Impact Of Breaches On Higher Ed Tlc 27 Sep09
PPTX
LIS3353 SP12 Week 9
Database development and security certification and accreditation plan pitwg
Advanced Operating System Principles.pptx
CS5300 class presentation on managing information systems
2008: Web Application Security Tutorial
How To Successfully Defend Against Irc Bots, Compromises, And Information Leaks
2011 lecture ia orientation
The Impact Of Breaches On Higher Ed Tlc 27 Sep09
LIS3353 SP12 Week 9

Similar to Network Security Proposal TemplateNetwork Security Proposal.docx (20)

DOCX
Final Project – Incident Response Exercise SAMPLE.docx
PPT
How Technology, People, And Processes Converged To Achieve A 95 Percent Reduc...
PDF
Endpoint Protection Platform Invent Youself/tutorialoutletdotcom
PDF
Ch09 Information Security Best Practices
PPTX
Introduction to information security field
DOCX
Security and Ethical Challenges Contributors Kim Wanders.docx
DOCX
Security and Ethical Challenges Contributors Kim Wanders.docx
PDF
Mis 1
PDF
Information Security in term of computer science
PDF
Fundamentals of Securing Network Devices.pptx.pdf
PDF
CNIT 160 4e Security Program Management (Part 5)
DOC
Cyb 610 Enhance teaching / snaptutorial.com
DOCX
CYB610 Project Common computing platforms.docx
DOCX
Many companies and agencies conduct IT audits to test and assess the.docx
DOCX
CMIT 321 Executive Proposal ProjectThe purpose of this project i.docx
DOCX
CMIT 321 Executive Proposal ProjectThe purpose of this project i.docx
DOC
Csec 610 Enhance teaching / snaptutorial.com
DOCX
CSEC 610 Effective Communication/tutorialrank.com
DOCX
CYB 610 Effective Communication/tutorialrank.com
DOCX
4MANUAL OVERVIEW5SECTION 1Introduction Welcome.docx
Final Project – Incident Response Exercise SAMPLE.docx
How Technology, People, And Processes Converged To Achieve A 95 Percent Reduc...
Endpoint Protection Platform Invent Youself/tutorialoutletdotcom
Ch09 Information Security Best Practices
Introduction to information security field
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
Mis 1
Information Security in term of computer science
Fundamentals of Securing Network Devices.pptx.pdf
CNIT 160 4e Security Program Management (Part 5)
Cyb 610 Enhance teaching / snaptutorial.com
CYB610 Project Common computing platforms.docx
Many companies and agencies conduct IT audits to test and assess the.docx
CMIT 321 Executive Proposal ProjectThe purpose of this project i.docx
CMIT 321 Executive Proposal ProjectThe purpose of this project i.docx
Csec 610 Enhance teaching / snaptutorial.com
CSEC 610 Effective Communication/tutorialrank.com
CYB 610 Effective Communication/tutorialrank.com
4MANUAL OVERVIEW5SECTION 1Introduction Welcome.docx
Ad

More from vannagoforth (20)

DOCX
1. Primary sources2. Secondary sources3. La Malinche4. Bacon’s.docx
DOCX
1. Prepare an outline, an introduction, and a summary.docx
DOCX
1. Normative moral philosophy typically focuses on the determining t.docx
DOCX
1. Paper should be 5-pages min. + 1 page works cited2. Should have.docx
DOCX
1. Name and describe the three steps of the looking-glass self.2.docx
DOCX
1. Provide an example of a business or specific person(s) that effec.docx
DOCX
1. Mexico and Guatemala. Research the political and economic situati.docx
DOCX
1. Many scholars have set some standards to judge a system for taxat.docx
DOCX
1. List and (in 1-2 sentences) describe the 4 interlocking factors t.docx
DOCX
1. Please explain how the Constitution provides for a system of sepa.docx
DOCX
1. Please watch the following The Diving Bell & The Butterfly, Amel.docx
DOCX
1. Most sociologists interpret social life from one of the three maj.docx
DOCX
1. Members of one species cannot successfully interbreed and produc.docx
DOCX
1. Of the three chemical bonds discussed in class, which of them is .docx
DOCX
1. Look at your diagrams for hydrogen, lithium, and sodium. What do .docx
DOCX
1. Name the following molecules2. Sketch the following molecules.docx
DOCX
1. List the horizontal and vertical levels of systems that exist in .docx
DOCX
1. Kemal Ataturk carried out policies that distanced the new Turkish.docx
DOCX
1. If we consider a gallon of gas as having 100 units of energy, and.docx
DOCX
1. In 200-250 words, analyze the basic issues of human biology as th.docx
1. Primary sources2. Secondary sources3. La Malinche4. Bacon’s.docx
1. Prepare an outline, an introduction, and a summary.docx
1. Normative moral philosophy typically focuses on the determining t.docx
1. Paper should be 5-pages min. + 1 page works cited2. Should have.docx
1. Name and describe the three steps of the looking-glass self.2.docx
1. Provide an example of a business or specific person(s) that effec.docx
1. Mexico and Guatemala. Research the political and economic situati.docx
1. Many scholars have set some standards to judge a system for taxat.docx
1. List and (in 1-2 sentences) describe the 4 interlocking factors t.docx
1. Please explain how the Constitution provides for a system of sepa.docx
1. Please watch the following The Diving Bell & The Butterfly, Amel.docx
1. Most sociologists interpret social life from one of the three maj.docx
1. Members of one species cannot successfully interbreed and produc.docx
1. Of the three chemical bonds discussed in class, which of them is .docx
1. Look at your diagrams for hydrogen, lithium, and sodium. What do .docx
1. Name the following molecules2. Sketch the following molecules.docx
1. List the horizontal and vertical levels of systems that exist in .docx
1. Kemal Ataturk carried out policies that distanced the new Turkish.docx
1. If we consider a gallon of gas as having 100 units of energy, and.docx
1. In 200-250 words, analyze the basic issues of human biology as th.docx
Ad

Recently uploaded (20)

PDF
Hazard Identification & Risk Assessment .pdf
PDF
1_English_Language_Set_2.pdf probationary
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PDF
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
PDF
IGGE1 Understanding the Self1234567891011
PDF
HVAC Specification 2024 according to central public works department
PDF
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
PDF
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
PDF
Computing-Curriculum for Schools in Ghana
PDF
Empowerment Technology for Senior High School Guide
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
PDF
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
PDF
Indian roads congress 037 - 2012 Flexible pavement
PPTX
Computer Architecture Input Output Memory.pptx
PDF
What if we spent less time fighting change, and more time building what’s rig...
PPTX
Unit 4 Computer Architecture Multicore Processor.pptx
PPTX
B.Sc. DS Unit 2 Software Engineering.pptx
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
Hazard Identification & Risk Assessment .pdf
1_English_Language_Set_2.pdf probationary
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
IGGE1 Understanding the Self1234567891011
HVAC Specification 2024 according to central public works department
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
Computing-Curriculum for Schools in Ghana
Empowerment Technology for Senior High School Guide
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
Indian roads congress 037 - 2012 Flexible pavement
Computer Architecture Input Output Memory.pptx
What if we spent less time fighting change, and more time building what’s rig...
Unit 4 Computer Architecture Multicore Processor.pptx
B.Sc. DS Unit 2 Software Engineering.pptx
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx

Network Security Proposal TemplateNetwork Security Proposal.docx

  • 1. Network Security Proposal Template Network Security Proposal Prepared for: University of Maryland Global Campus Prepared by: Student Name
  • 2. I. Analysis and Planning A. Vulnerability Assessment Requirements A few businesses incline toward competitors with specific learning of data safety that can be acquired via some certified preparing program. Some positions need work encounter or propelled degrees, for example, a Master of Business Administration in Information Systems. Network security experts by and large have an assortment of capabilities – imagination, inventiveness, initiative and collaboration, among them. Distinctive ace accreditations are available to data security inspectors, including Certified Information Systems Security Professional and Certified Information Security Manager, as are seller attestations offered by relationship, for example, Microsoft and Cisco. Development from data security overseer to data security supervisor or data security authority might be conceivable with experience just as cutting edge illuminating limits. Proposed Solution As the network analyst in the University I have made the following recommendations: · Perform security hazard evaluation.
  • 3. · Teach the client about strategy of data security. · Use Operating Systems having good capabilities of fight against malware. · Use dedicated firewalls, especially for the tablets being used by remote clients · Develop the response plan which is PC incident. When the “TestOut Security Pro” is utilized it helps to identify the network infrastructure “TestOut's Security Pro” confirmation is another affirmation not only measures what you already know. The “TestOut Security Pro” Certification also measures the capacity to supervise security dangers and strengthen security for PC frameworks. The accompanying information areas are tended to: · Host Defenses · Application Defenses · Access Control and Identity Management · Audits and Assessments · Policies, Procedures, and Awareness · Physical Security · Perimeter Defenses · Network Defenses · Data Defenses Information systems security directors must consolidate solid specialized aptitudes in PC security with incredible interpersonal, authority and authoritative capacities. They are in
  • 4. charge of employing, rousing, preparing and, if fundamental, terminating digital security staff. They survey and execute security strategies, satisfy all legitimate and contractual security orders, and counteract and recognize security ruptures. (cybersec.org, cybersec.org) Justification As universities keep on confronting developing dangers to data security, they are experiencing security reviews. Above reviews include outside and inside evaluations of universities' procedures and processing framework to gauge consistence with selected security recommendations and best practices of industry. The following testing comprises of a security check and appraisal of all outer (open confronting) web addresses. We'll perform a sweep on the web address pieces of the customer and perform a test that acknowledge known security threats that are powerless to external threats. We'll test your efforts to establish safety in access endeavours on system and information. B. Security Policy Requirements
  • 5. In the requirements section, students will make explicit UMGC’s requirements for a security policy. Given this section requires information related to security policies, students should review TestOut LabSim section 3 (Policies, Procedures, and Awareness), and use additional resources as necessary. Proposed