Network Security Proposal Template
Network Security Proposal
Prepared for:
University of Maryland Global Campus
Prepared by:
Student Name
I. Analysis and Planning
A. Vulnerability Assessment
Requirements
A few businesses incline toward competitors with specific
learning of data safety that can be acquired via some certified
preparing program. Some positions need work encounter or
propelled degrees, for example, a Master of Business
Administration in Information Systems. Network security
experts by and large have an assortment of capabilities –
imagination, inventiveness, initiative and collaboration, among
them. Distinctive ace accreditations are available to data
security inspectors, including Certified Information Systems
Security Professional and Certified Information Security
Manager, as are seller attestations offered by relationship, for
example, Microsoft and Cisco. Development from data security
overseer to data security supervisor or data security authority
might be conceivable with experience just as cutting edge
illuminating limits.
Proposed
Solution
As the network analyst in the University I have made the
following recommendations:
· Perform security hazard evaluation.
· Teach the client about strategy of data security.
· Use Operating Systems having good capabilities of fight
against malware.
· Use dedicated firewalls, especially for the tablets being used
by remote clients
· Develop the response plan which is PC incident.
When the “TestOut Security Pro” is utilized it helps to identify
the network infrastructure “TestOut's Security Pro”
confirmation is another affirmation not only measures what you
already know. The “TestOut Security Pro” Certification also
measures the capacity to supervise security dangers and
strengthen security for PC frameworks. The accompanying
information areas are tended to:
· Host Defenses
· Application Defenses
· Access Control and Identity Management
· Audits and Assessments
· Policies, Procedures, and Awareness
· Physical Security
· Perimeter Defenses
· Network Defenses
· Data Defenses
Information systems security directors must consolidate solid
specialized aptitudes in PC security with incredible
interpersonal, authority and authoritative capacities. They are in
charge of employing, rousing, preparing and, if fundamental,
terminating digital security staff. They survey and execute
security strategies, satisfy all legitimate and contractual
security orders, and counteract and recognize security ruptures.
(cybersec.org, cybersec.org)
Justification
As universities keep on confronting developing dangers to data
security, they are experiencing security reviews. Above reviews
include outside and inside evaluations of universities'
procedures and processing framework to gauge consistence with
selected security recommendations and best practices of
industry. The following testing comprises of a security check
and appraisal of all outer (open confronting) web addresses.
We'll perform a sweep on the web address pieces of the
customer and perform a test that acknowledge known security
threats that are powerless to external threats. We'll test your
efforts to establish safety in access endeavours on system and
information.
B. Security Policy
Requirements
In the requirements section, students will make explicit
UMGC’s requirements for a security policy. Given this section
requires information related to security policies, students should
review TestOut LabSim section 3 (Policies, Procedures, and
Awareness), and use additional resources as necessary.
Proposed

Network Security Proposal TemplateNetwork Security Proposal.docx

  • 1.
    Network Security ProposalTemplate Network Security Proposal Prepared for: University of Maryland Global Campus Prepared by: Student Name
  • 2.
    I. Analysis andPlanning A. Vulnerability Assessment Requirements A few businesses incline toward competitors with specific learning of data safety that can be acquired via some certified preparing program. Some positions need work encounter or propelled degrees, for example, a Master of Business Administration in Information Systems. Network security experts by and large have an assortment of capabilities – imagination, inventiveness, initiative and collaboration, among them. Distinctive ace accreditations are available to data security inspectors, including Certified Information Systems Security Professional and Certified Information Security Manager, as are seller attestations offered by relationship, for example, Microsoft and Cisco. Development from data security overseer to data security supervisor or data security authority might be conceivable with experience just as cutting edge illuminating limits. Proposed Solution As the network analyst in the University I have made the following recommendations: · Perform security hazard evaluation.
  • 3.
    · Teach theclient about strategy of data security. · Use Operating Systems having good capabilities of fight against malware. · Use dedicated firewalls, especially for the tablets being used by remote clients · Develop the response plan which is PC incident. When the “TestOut Security Pro” is utilized it helps to identify the network infrastructure “TestOut's Security Pro” confirmation is another affirmation not only measures what you already know. The “TestOut Security Pro” Certification also measures the capacity to supervise security dangers and strengthen security for PC frameworks. The accompanying information areas are tended to: · Host Defenses · Application Defenses · Access Control and Identity Management · Audits and Assessments · Policies, Procedures, and Awareness · Physical Security · Perimeter Defenses · Network Defenses · Data Defenses Information systems security directors must consolidate solid specialized aptitudes in PC security with incredible interpersonal, authority and authoritative capacities. They are in
  • 4.
    charge of employing,rousing, preparing and, if fundamental, terminating digital security staff. They survey and execute security strategies, satisfy all legitimate and contractual security orders, and counteract and recognize security ruptures. (cybersec.org, cybersec.org) Justification As universities keep on confronting developing dangers to data security, they are experiencing security reviews. Above reviews include outside and inside evaluations of universities' procedures and processing framework to gauge consistence with selected security recommendations and best practices of industry. The following testing comprises of a security check and appraisal of all outer (open confronting) web addresses. We'll perform a sweep on the web address pieces of the customer and perform a test that acknowledge known security threats that are powerless to external threats. We'll test your efforts to establish safety in access endeavours on system and information. B. Security Policy Requirements
  • 5.
    In the requirementssection, students will make explicit UMGC’s requirements for a security policy. Given this section requires information related to security policies, students should review TestOut LabSim section 3 (Policies, Procedures, and Awareness), and use additional resources as necessary. Proposed