Friday, June 14, 2019
Implementation Plan Essay Example | Topics and Well Written Essays - 5000 words
Implementation Plan - Essay Exampled guidelines of the end be pertinent to information warrantor and privacy that are currently put forward by bodies of the state, federal regulators, and the state.New technologies are coming up in the market daily. Therefore, there is need to safeguard the evolving technologies. In the case where MEMATECH Solutions limited has this need, I have proposed to develop and install a new security externalize for the company. The idea behind the plan is to come up with a intercommunicate that connects all the machines in the organization in protecting the plan from cosmos publicized during the stage of development and research. The paper therefore, discusses the proposal of MEMATECH Solutions limited security plan proposal for the connections that dwells on the authentication mechanisms, policies of password, and the plans proposed cost (Pipkin, 2000).I have proposed a security plan for MEMATECH Solutions limited for the connection that will safeguar d their new products when researching and developing stages are carried out. The paper proposes a comprehensive plan that deals with password policy, network policy, authentication of data, and the projects cost.To safeguard the project it is imperative that all information and data are kept on divergent networks and servers that are not within the access of the general corporation. This can be achieved by developing new networks through the appliances of Cisco Terascale router or Cisco ASA security, VMware, VLANS, and Windows 2008 with the athletic supporter of IPV6 private addressing. Employing the appliances of ASA security and Terascale, I will be able to monitor and control the entire network and access traffic on the corporate network subset through the firewall features. In conjunction with MAC address, I will implement through filtering to offer more security. The IPV6 IP mechanism will be engaged to help it from attempts of network intrusion and brute force. I will use a private address to ensure that all the IP address are
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.