Order for this Paper or similar Assignment Help Service

Fill the order form in 3 easy steps - Less than 5 mins.

Posted: July 1st, 2022

Physical Network Security Strategy

Physical Network Security Strategy
Physical security threats and vulnerabilities usually cause destruction computer infrastructure and systems hardware. One of the physical security threats is natural events (for instance, earthquakes, floods, hurricanes, and tornados). Natural calamities are capable of destroying computer systems and networks thus leading to the loss of important data (Kizza, 2019). Another security threat pertains to intentional acts of destruction. Examples of these acts include vandalism, theft and arson. Computer infrastructure and/ or hardware can be stolen or vandalized by people with ill motive. Unintentional acts that are destructive are physical security vulnerability as well. These acts include but are not limited to bad plumbing, spilled drinks and overloaded electrical outlets, which are capable of destroying computer infrastructure.
Physical Security Strategies
Various strategies will be used to protect the data, human resources, and the hardware from various vulnerabilities.
Data
• Use of signage-these will serve to set up boundaries for restricted areas, and identify forbidden and unauthorized material.
• Use of Intrusion Detection System-the aim is to prevent, identify and document intrusion. The IDS must identify an attempted unauthorized entry into a safeguarded environment.
Human resources
• Setting up a video surveillance camera. This will provide a good view of people who enter and leave the room and thus take note of suspicious activities and respond to them promptly.
• Use of smart cards-this will Help to keep unauthorized employees or attackers from getting access to rooms that are not allowed to enter.
Hardware
• Locking up the server room. This will ensure that only authorized persons get access to the room.
• Use of fire suppression systems-these will serve to detect fire during its initial stages via smoke, heat, and other warning signals, and thus avert the destruction of hardware
Protection of the Company’s Network Perimeter
One of the strategies of protecting the company’s network perimeter could be disabling unused portals. The UDPs and TCPs that are not totally necessary through the company’s firewall-particularly ports 135,137 and 139 can be disabled. This makes it possible to detect attacks before they happen. Another strategy entails enabling the Wired Equivalent Privacy (WEP). It is utilized in safeguarding wireless communication from eavesdropping as well as averting unauthorized access to a wireless network (Swaminatha, & Elden, 2013). Scrutinizing the website of the company is yet another strategy. This will greatly Help to identify anything a cyber-attacker could utilize to launch an attack-this encompasses information that could be utilized for purposes of social engineering and information that could help an actual break-in.
Protection of the Company’s Internal and External Network Traffic
For the protection of the company’s internal and external network traffic, one of the proposed approaches is bolstering access control measures and this can be attained by utilizing a strong password system that has a mixture of lower and upper case letters, special characters and numbers. It is also essential to reset default passwords often. Another approach is updating all software often. Using the newest software ensures that the company has a version that encompasses fixes for security threats and vulnerabilities. Employee training is vital as well. This allows the employees to comprehend network security and thus able to detect threats. In addition they gain knowledge on how to avert a network security breach. The network security tools that we could use include Virtual Private Network (VPN) and firewall.
Guidelines for the Organization’s Physical Security Manual
The following guidelines will be applicable in organization’s physical security manual:
• Employees to use access control cards-these are aimed at regulating access to certain rooms that contain valuable hardware and infrastructure.
• Employees to adhere to disaster recovery plan-the plan provides guidelines on ways to respond to natural calamities and emergencies that are caused by internal and external threats that have the capability of threatening data or personal safety.

References
Kizza, J. M. (2019). Guide to Computer Network Security. Springer Science & Business Media.
Swaminatha, T. M., & Elden, C. R. (2013). Wireless Security and Privacy: Best Practices and Design Techniques. Addison-Wesley Professional.

Order | Check Discount

Tags: 150-200 words discussion with a scholarly reference, 200-300 words response to classmate discussion question, 250 word analysis essay, bachelor of nursing assignments, case study, essay bishops website

Assignment Help For You!

Special Offer! Get 20-30% Off on Every Order!

Why Seek Our Custom Writing Services

Every Student Wants Quality and That’s What We Deliver

Graduate Essay Writers

Only the finest writers are selected to be a part of our team, with each possessing specialized knowledge in specific subjects and a background in academic writing..

Affordable Prices

We balance affordability with exceptional writing standards by offering student-friendly prices that are competitive and reasonable compared to other writing services.

100% Plagiarism-Free

We write all our papers from scratch thus 0% similarity index. We scan every final draft before submitting it to a customer.

How it works

When you opt to place an order with Nursing StudyBay, here is what happens:

Fill the Order Form

You will complete our order form, filling in all of the fields and giving us as much instructions detail as possible.

Assignment of Writer

We assess your order and pair it with a custom writer who possesses the specific qualifications for that subject. They then start the research/write from scratch.

Order in Progress and Delivery

You and the assigned writer have direct communication throughout the process. Upon receiving the final draft, you can either approve it or request revisions.

Giving us Feedback (and other options)

We seek to understand your experience. You can also peruse testimonials from other clients. From several options, you can select your preferred writer.

Expert paper writers are just a few clicks away

Place an order in 3 easy steps. Takes less than 5 mins.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00