Get Similar Answers, Custom Writing & Assignment Help Services

To hire a writer, fill the order form in a few guided steps - with details from your paper's instructions.

Posted: July 1st, 2022

Physical Network Security Strategy

Physical Network Security Strategy
Physical security threats and vulnerabilities usually cause destruction computer infrastructure and systems hardware. One of the physical security threats is natural events (for instance, earthquakes, floods, hurricanes, and tornados). Natural calamities are capable of destroying computer systems and networks thus leading to the loss of important data (Kizza, 2019). Another security threat pertains to intentional acts of destruction. Examples of these acts include vandalism, theft and arson. Computer infrastructure and/ or hardware can be stolen or vandalized by people with ill motive. Unintentional acts that are destructive are physical security vulnerability as well. These acts include but are not limited to bad plumbing, spilled drinks and overloaded electrical outlets, which are capable of destroying computer infrastructure.
Physical Security Strategies
Various strategies will be used to protect the data, human resources, and the hardware from various vulnerabilities.
Data
• Use of signage-these will serve to set up boundaries for restricted areas, and identify forbidden and unauthorized material.
• Use of Intrusion Detection System-the aim is to prevent, identify and document intrusion. The IDS must identify an attempted unauthorized entry into a safeguarded environment.
Human resources
• Setting up a video surveillance camera. This will provide a good view of people who enter and leave the room and thus take note of suspicious activities and respond to them promptly.
• Use of smart cards-this will Help to keep unauthorized employees or attackers from getting access to rooms that are not allowed to enter.
Hardware
• Locking up the server room. This will ensure that only authorized persons get access to the room.
• Use of fire suppression systems-these will serve to detect fire during its initial stages via smoke, heat, and other warning signals, and thus avert the destruction of hardware
Protection of the Company’s Network Perimeter
One of the strategies of protecting the company’s network perimeter could be disabling unused portals. The UDPs and TCPs that are not totally necessary through the company’s firewall-particularly ports 135,137 and 139 can be disabled. This makes it possible to detect attacks before they happen. Another strategy entails enabling the Wired Equivalent Privacy (WEP). It is utilized in safeguarding wireless communication from eavesdropping as well as averting unauthorized access to a wireless network (Swaminatha, & Elden, 2013). Scrutinizing the website of the company is yet another strategy. This will greatly Help to identify anything a cyber-attacker could utilize to launch an attack-this encompasses information that could be utilized for purposes of social engineering and information that could help an actual break-in.
Protection of the Company’s Internal and External Network Traffic
For the protection of the company’s internal and external network traffic, one of the proposed approaches is bolstering access control measures and this can be attained by utilizing a strong password system that has a mixture of lower and upper case letters, special characters and numbers. It is also essential to reset default passwords often. Another approach is updating all software often. Using the newest software ensures that the company has a version that encompasses fixes for security threats and vulnerabilities. Employee training is vital as well. This allows the employees to comprehend network security and thus able to detect threats. In addition they gain knowledge on how to avert a network security breach. The network security tools that we could use include Virtual Private Network (VPN) and firewall.
Guidelines for the Organization’s Physical Security Manual
The following guidelines will be applicable in organization’s physical security manual:
• Employees to use access control cards-these are aimed at regulating access to certain rooms that contain valuable hardware and infrastructure.
• Employees to adhere to disaster recovery plan-the plan provides guidelines on ways to respond to natural calamities and emergencies that are caused by internal and external threats that have the capability of threatening data or personal safety.

References
Kizza, J. M. (2019). Guide to Computer Network Security. Springer Science & Business Media.
Swaminatha, T. M., & Elden, C. R. (2013). Wireless Security and Privacy: Best Practices and Design Techniques. Addison-Wesley Professional.

Order | Check Discount

Tags: 150-200 words discussion with a scholarly reference, 200-300 words response to classmate discussion question, 250 word analysis essay, bachelor of nursing assignments, case study

Assignment Help For You!

Special Offer! Get 15-30% Off on Each Order!

Why Seek Our Custom Writing Services

Every Student Wants Quality and That’s What We Deliver

Graduate Essay Writers

Only the most qualified writers are selected to be a part of our research and editorial team, with each possessing specialized knowledge in specific subjects and a background in academic writing.

Affordable Prices

Our prices strike the perfect balance between affordability and quality. We offer student-friendly rates that are competitive within the industry, without compromising on our high writing service standards.

100% Plagiarism-Free

No AI/chatgpt use. We write all our papers from scratch thus 0% similarity index. We scan every final draft before submitting it to a customer.

How it works

When you decide to place an order with Nursing Study Bay, here is what happens:

Fill the Order Form

You will complete our order form, filling in all of the fields and giving us as much guidelines - instruction details as possible.

Assignment of Writer

We assess your order and pair it with a skilled writer who possesses the specific qualifications for that subject. They then start the research/writing from scratch.

Order in Progress and Delivery

You and the assigned expert writer have direct communication throughout the process. Upon receiving the final draft, you can either approve it or request revisions.

Giving us Feedback (and other options)

We seek to understand your experience. You can also review testimonials from other clients, from where you can select your preferred professional writer to assist with your homework assignments.

For Similar Answers, Custom Essay Writing & Assignment Help Services

Find an expert with a few clicks and guided steps, fill an order form for your nursing paper. We write AI-plagiarism free essays and research papers. Anytime!.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00