Hausarbeiten logo
Shop
Shop
Tutorials
En De
Shop
Tutorials
  • How to find your topic
  • How to research effectively
  • How to structure an academic paper
  • How to cite correctly
  • How to format in Word
Trends
FAQ
Go to shop › Computer Science - Commercial Information Technology

Security Policy for e-Fence Corporation's Network

Title: Security Policy for e-Fence Corporation's Network

Seminar Paper , 2001 , 19 Pages , Grade: B+

Autor:in: Andreas Thiel (Author)

Computer Science - Commercial Information Technology

Excerpt & Details   Look inside the ebook
Summary Excerpt Details

A company’s network serves the purpose of delivering information to all employees as fast and as easily as possible. However, the information that is delivered through such an Intranet has to be secured against attack or misuse from outside the organisation as well as from inside the organisation. Since the need of security always conflicts with the need of fast and easy information access, e-Fence has to decide what level of security is appropriate for different types of information.

Of course, total security can never be provided but a company has to consider several threats to its Intranet. These threats include physical threats (e.g. theft or damage of equipment), natural disasters (e.g. damage due to lightning or earthquakes), mechanical breakdowns, viruses and Trojan Horses, and people from outside or within the organisation attacking the network. (Baker, 1995, pp. 7-9). E-Fence has to mitigate these threats with a well-planned security policy.

Excerpt


Inhaltsverzeichnis (Table of Contents)

  • Introduction
    • How much Security does a Company Need?
    • Procedure and Analysis Objectives
  • Products and Techniques to Enhance Security on e-Fence's Intranet
    • What Security Services have to be Provided?
    • Anti-Virus Software
    • User Management
    • Monitoring and Auditing
    • Hardening the Operating System
    • Firewalls and Proxy Servers
    • Web Server Restrictions
  • Management and Generation of Performance and Security Reports
    • Intrusion Detection Systems
    • Logging
    • Network Administration and Management Tools
  • Secure Document Management Procedure
    • Document Management System
    • Cryptography Service
    • Authentication Service
  • Guidelines for Cost Effective Security Implementation & Management
    • Free Measures to Increase Security
    • Expensive Products to Increase Security

Zielsetzung und Themenschwerpunkte (Objectives and Key Themes)

This report aims to evaluate a security policy suitable for e-Fence Corporation's Intranet. The report outlines the appropriate techniques and products to enhance security on the Intranet, focusing on security measures to prevent attacks from both inside and outside the organization. The report also addresses the deployment of a secure document management procedure and provides guidelines for implementing and managing the security policy cost-effectively.

  • Intranet Security
  • Security Threats and Countermeasures
  • Secure Document Management
  • Cost-Effective Security Implementation
  • Network Security Services

Zusammenfassung der Kapitel (Chapter Summaries)

  • Introduction: This chapter introduces the need for security in a company's Intranet and outlines the threats to e-Fence's network, including physical, natural, and human threats. It also establishes the scope of the report, focusing on security against external and internal attacks.
  • Products and Techniques to Enhance Security on e-Fence's Intranet: This chapter discusses the key security services that must be provided to ensure network security, including confidentiality, authentication, integrity, nonrepudiation, access control, and availability. It then dives into specific products and techniques for enhancing security, such as anti-virus software, user management, monitoring and auditing, hardening the operating system, firewalls and proxy servers, and web server restrictions.
  • Management and Generation of Performance and Security Reports: This chapter explores mechanisms for managing and generating performance and security reports on servers within the Intranet. It covers intrusion detection systems, logging, and network administration and management tools.
  • Secure Document Management Procedure: This chapter examines the implementation of a secure document management procedure, addressing the use of document management systems, cryptography services, and authentication services.
  • Guidelines for Cost Effective Security Implementation & Management: This chapter provides guidelines for implementing and managing a security policy in a cost-effective manner, outlining both free measures and expensive products that can enhance security.

Schlüsselwörter (Keywords)

This report delves into various aspects of intranet security, focusing on key concepts such as network security services, security threats, anti-virus software, intrusion detection systems, document management systems, cryptography, and cost-effective security implementation. The report explores these concepts in the context of securing e-Fence Corporation's intranet.

Excerpt out of 19 pages  - scroll top

Details

Title
Security Policy for e-Fence Corporation's Network
College
UNITEC New Zealand  (School of Information Systems and Computing)
Course
Intranet and Internet Management
Grade
B+
Author
Andreas Thiel (Author)
Publication Year
2001
Pages
19
Catalog Number
V9416
ISBN (eBook)
9783638161251
Language
English
Tags
Internet Intranet Security Sicherheit Netzwerk Virus Firewall Strategie Network
Product Safety
GRIN Publishing GmbH
Quote paper
Andreas Thiel (Author), 2001, Security Policy for e-Fence Corporation's Network, Munich, GRIN Verlag, https://www.hausarbeiten.de/document/9416
Look inside the ebook
  • Depending on your browser, you might see this message in place of the failed image.
  • https://cdn.openpublishing.com/images/brand/2/preview_popup_advertising.jpg
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
Excerpt from  19  pages
Hausarbeiten logo
  • Facebook
  • Instagram
  • TikTok
  • Shop
  • Tutorials
  • FAQ
  • Payment & Shipping
  • About us
  • Contact
  • Privacy
  • Terms
  • Imprint