Is589 Belmont State Bank Mini Case

Submitted by: Submitted by

Views: 905

Words: 601

Pages: 3

Category: Science and Technology

Date Submitted: 05/02/2012 05:56 PM

Report This Essay

At looking at this case it is clear that we need a secure network. Once major risk we need to ensure is the bank transaction are being transferred securely. Developing a secure network means developing controls that reduce or eliminate threats to the network. Here are some of the preventions we need to review when creating preventive measures to maintain compliance

Compliance Methods Virus Engine/DAT | All virus definition and DAT file in the organization must be up to date by performing inventory of all employees machine by using a Tool such as SCCM to ensure all machine have the correct version. Push will be perform remotely to ensure all machine have the proper version. |

Wireless Access | In order to access wireless within the organization all employees will be required to have a SSL certificate to enable access to wireless network. Only authorized authentication will be permitted online |

Desktop Firewall | To assist in protecting again spywares or a predator using employees machines as a BOT employee must ensure their Desktop firewall are activated or a Group Policy (GPO) can be setup on the administrator side to ensure they are active and restrict any modification from users. All machines will have Desktop firewall enabled to reduce the risk of remote penetration to assist in avoiding Denial-of-Service (DoS) attacks |

IDS Software | IDS software will be implemented to analyzed internal and network packet for vulnerabilities. This application can also be used for packet filtering to reducing IP spoofing from outsiders by ensuring all IP communication attempts are valid and authorized. |

Router restriction | We need to implement Access Control List (ACL) in the router to control network traffic. The router will look at the internal and external...