Task 1: Project Part 1 Outline Security Policy

Improved Essays
Project Part 1 Task 1: Outline Security Policy

First World Bank Savings and Loan; a financial institution that offers banking services (loans and deposits). The bank would like to provide online banking services to the customers, which includes online credit card use for loan applications. Recommendations are based on such factors as: ownership total cost, scalability, and reliability. Decisions and recommendations made need to be appropriate from the CIA triad perspective. My team’s job is to ensure that all recommendations are correct and appropriate. We need to evaluate and prototype a Linux-based infrastructure. We need to study the cost, performance, and the security of maintaining a Linux open source infrastructure. Annually
…show more content…
We want our clients to know that they can count on us to keep their information safe from the outside world; other clients and hackers. Making sure that every server is secure, is one way of ensuring our client’s data will be safe. My recommendations for securing the servers are: Database Server use MySQL, Web Server use Apache, File Server use Samba, SMTP Server use hMailServer, and LDAP Server use OpenLDAP. I recommend securing the database server by using MySQL Enterprise Edition because of the advanced features and management tools it provides. It has technical support that will ensure the highest level of scalability, security, reliability, and uptime are met. The cost, risk, and complexity of managing business-critical MySQL applications are reduced. Some of the features of MySQL Enterprise Edition are: Backup; reduces the risk of data loss, and High Availability; we can make our database infrastructure highly available. Scalability, authentication, and encryption are just a few others on the list of available features in MySQL Enterprise …show more content…
Because of this, we need to specify permissions for all users and groups. Users and groups only need the necessary permissions to be able to do their work/tasks. Groups and users can be created to only have certain permissions; read, write, execute. Not every group or user is going to need all three permissions. Group management can be used to implement these permissions. Setuid can help disperse the permissions to those in the same group, but can also cause some security issues. It is best to use this as little as possible. Sticky Bit can also be used to help prevent users from deleting or renames files. Other attributes that can be enabled are set with chattr command, this prevents the user from being able to rename, move, delete, or modify a file. Using the sudo command will allow access to permissions but in a controlled and limited way. Meaning the sysadmin can set restrictions to a user that would only allow him to run specific privileged commands. Another way to control user permissions is to use Access Control Lists. ACLs can be edited by using getfacl and setfacl. ACL entry has a qualifier (type A) to set the preferred permissions for users and groups. Using pam_listfile will also restrict groups from opening files they do not need to

Related Documents

  • Improved Essays

    Nt1330 Unit 3 Paper

    • 985 Words
    • 4 Pages

    Recommended Kernel Custom kernel can be fantastic for organizations that need to utilize only one or minimum services and applications for their organization. Open source codes of Linux distributions make it possible for Linux administrators to configure kernels for exactly what the company needs. The downside to this is that you would have to employee a Linux administrator adequate enough to configure and update Linux for the company full time.…

    • 985 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Define GPO policies to avoid user to use USB devices or cd devices ( this in order to prevent information stolen) also access based on group access as well as batch files to map drives. 3. Have in place a firewall, I would suggest a cisco firewall or zywall ( zywall is cheaper and it works great) this firewall will need to have UTM to help protect from viruses, malware and intrusions. This firewall can also to deploy VPN connection if needed 4. I remember you talking about you needed a VPN, but I would say that a Remote connection could work better.…

    • 485 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Task 1 In Unix/Linux operating system a user can have root access or not, the root access provides complete access to user of a system. There are some following risks to have a single root user on Unix/Linux operating system. Easy to hack: If any security error broke the security then a hacker can get the access of all data and can get the whole control of hardware. It allow to retrieve all files and data without root access.…

    • 1228 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    The vulnerabilities identified in part 1 assignment was mitigated by recommending the right solutions. In part2, the network security analyst identified and proposed solutions for the right network devices to protect the accounting firm's network from intruders and external cyber threats. In this final assignment section, the network security analyst of the accounting firm will propose the application/end-user security recommendation to protect the company’s sensitive information. The analyst will also ensure that the proper procedure and policies are in place to take care of network security and employees should be trained and aware of those policies from possible threats including cyber-attacks.…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    In today’s Business world it is critical to find the most efficient, cost effective and secure methods to facilitate the functionality of your business infrastructure. A company’s infrastructure can dictate the growth of the business and the capabilities of its effectiveness during business operations. This document has been created to compare three different Linux distributions, focusing on their offerings for server and workstation operating system products offered on an enterprise level. I will discuss the key highlights for each Distribution including Red Hat, Ubuntu, and Debian.…

    • 1782 Words
    • 8 Pages
    Superior Essays
  • Decent Essays

    Nt1330 Unit 1

    • 360 Words
    • 2 Pages

    These days’ security is a critical factor of I.T whether it be protecting physical devices or information. What are some basic examples of ways to provide physical security for a server? What can be done about logical security? Security in the critical factor for everything related to internet.…

    • 360 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 3 Quiz

    • 507 Words
    • 3 Pages

    1. Go to your home directory and run: Most file systems have designated directories to assign permissions or access rights to specific users. File permission controls users to view, change, navigate & execute the designated contents of the file directories. LINUX/UNIX coherently use file permission to enable access to ownership for files & directories. File permission includes rwx is for read, write, and execute permissions.…

    • 507 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 1

    • 768 Words
    • 4 Pages

    Frequently Schedule Vulnerability Scans: With the constant stream of attacks and bots looking and probing for new ways to gain access to the network, the NSA should perform regularly scheduled vulnerability scans, and often. Run a vulnerability scan such as: SecureCheq, Nexpose, or Retina CS Community 6. Off Site Backups: A new and very popular practice is to not only keep dedicated servers off site or in multiple locations to prevent the loss of one site taking down the system, but also, clouding. 7. Secure Remote Access:…

    • 768 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    1.02.01 Warning Banner

    • 567 Words
    • 3 Pages

    Sub section 9.1.02.01 – Warning Banners Current Statement Where possible, a login / warning banner must be displayed on information technology systems upon login (e.g., servers,desktops, VPN connections, network devices). Login banners must be approved by the Information Risk Management Organization and the Legal Department and must adhere to all government regulations and UnitedHealth Group directives. Modify Statement Where possible, a login / warning banner must be displayed on information technology systems upon login (e.g., servers, desktops, VPN connections, network devices, application elevations). Login banners must be approved by the Information Risk Management Organization and the Legal Department and must adhere to all government…

    • 567 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    HGC Case Study

    • 1025 Words
    • 4 Pages

    A1: Business Objective: Healthy Body Wellness Center (HBWC) Office of Grants Giveaway (OGG) business objective is to offer a proficient methodology that promotes improvement in the quality and usefulness of medical grants. HBWC disburses several medical grants through federally supported health research, and implemented the Small Hospital Grant Tracking System (SHGTS) to automate assignment and tracking of the grant disbursement, streamline review of completed evaluation submitted by grant seekers and promote sharing of health information among healthcare professionals. A2: Security Principle The guiding security principle that HBWC should use to meet Federal Information Processing Standards (FIPS) is an ISO 27002 security framework, accompanied…

    • 1025 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Network Comparison Paper

    • 1221 Words
    • 5 Pages

    1) Draw a diagram for the above scenario using a drawing program such as Microsoft Visio (2 marks) 
Please view Microsoft Visio Document. 

2) Provide LAN solution for each office connecting computers and printers together. What types of topology/topologies are you using and why? Explain all connectivity devices used by your selected topology/topologies.…

    • 1221 Words
    • 5 Pages
    Superior Essays
  • Decent Essays

    Common Vulnerabilities

    • 164 Words
    • 1 Pages

    Common vulnerabilities include weak default installation settings, wide open access controls, and devices lacking the latest security patches. Top network level threats include need to make sure that there one entry to the server room. The entrance of the access door should not be directly visible to the location of the office where the majority of the officials work. Before the main access door there should be another small door or space to reduce the risk of piggy backing. The electrical wiring should be placed inside fire-resistance panels and if there are any office desk or cabinets, then use only those equipment’s made of fire-resistance materials.…

    • 164 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Adapting activities and environment: Empowering people through autonomy, which means giving people freedom to make their own decision, is important as people should have control of their own lives so they don’t feel as if someone else is controlling their life for them e.g. making their own decisions in the activity. If they aren’t empowered in their choices then it would lead to the individual being left behind in the activities carried out and therefore be unable to enjoy the activity to its maximum extent. The individual may face barriers in the activity due to their lack of ability for example they might be in a wheel chair which means they need more space to move around so the furniture would need to rearranged or if they have language…

    • 1589 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    Team 3: Vadde Aditya, Bishal Bk, Fang Fang, Suraj Karki, Varshini Paladugu, Raghuveerreddy Suram Week 7 Group Assignment • Discuss what can happen if the framework you choose as a foundation does not fit your organization’s business objectives. If the framework the organization choose as a foundation does not fit the business objectives, it may face several problems as following. 1.…

    • 723 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Security Life Cycle

    • 1189 Words
    • 5 Pages

    Web Server and Security Development Life Cycle Most organizations use web applications through the use of the internet as part of their business process and functions to fulfill their objectives, business requirements and needs of their company. When implementing these applications, they have to make sure that security is a part of each step that they follow in the development lifecycle. If security is not implemented, then such software or applications, such as web server or web application, can be detrimental to the organization and cost in money, time, production, and many other areas of the business. There is so much information that is used and passed along within an organization that it is imperative that the correct information is used…

    • 1189 Words
    • 5 Pages
    Improved Essays