preview

Essay about Technical Security Policy Proposal for Small Company

Good Essays

TicTek Inc is a small company with about a hundred employees and one facility. The company sells home security electronics online. The devices are manufactured by a third party company and shipped to TicTek, whereupon they are warehoused until they are purchased through the company’s website. The warehouse staff prepares and ships customer orders in the same facility which houses the office staff and management. TicTek has a few major stockholders, but the majority of the company’s stock is owned by its executives and employees. Due to the online nature of the company’s business dealings, TicTek has placed a high priority on the security of network resources, including vendor data, customer data, high availability, and incident response. …show more content…

Firewalls will be placed between the web servers and the outer edge of the network, facing the Internet. Such a configuration, called a demilitarized zone (DMZ), will provide an additional layer of defense from a network breach. If the web servers are compromised, there will be an additional barrier between them and the intranet. The firewalls will be configured to deny everything, and then the ports that are needed for the functioning of the network will be allowed. For the sake of expense and administrative simplicity, the firewall will be a stateful packet filter firewall, as opposed to an application proxy firewall, which would offer higher security and configurability at the expense of administrative complexity due to the need for a proxy for each application in use by the company. The packet filtering firewall filters traffic based on predefined rules. A network based IDS will be used on all network subnets and the system will be anomaly based. An anomaly based IDS is preferable for its ability to detect zero day attacks. With a signature based IDS, the system uses a set of definitions to detect threats and the definitions must be updated on a regular and ongoing schedule. The system will be passive in its functioning, in that it will not stop threats that it detects. Rather the IDS will send notifications to the IT staff that are tasked with the security of the network. The IT staff will then

Get Access