Order For Similar Custom Papers & Assignment Help Services

Fill the order form details - writing instructions guides, and get your paper done.

Posted: September 28th, 2022

Physical Network Security Strategy

Physical Network Security Strategy
Physical security threats and vulnerabilities usually cause destruction computer infrastructure and systems hardware. One of the physical security threats is natural events (for instance, earthquakes, floods, hurricanes, and tornados). Natural calamities are capable of destroying computer systems and networks thus leading to the loss of important data (Kizza, 2019). Another security threat pertains to intentional acts of destruction. Examples of these acts include vandalism, theft and arson. Computer infrastructure and/ or hardware can be stolen or vandalized by people with ill motive. Unintentional acts that are destructive are physical security vulnerability as well. These acts include but are not limited to bad plumbing, spilled drinks and overloaded electrical outlets, which are capable of destroying computer infrastructure.
Physical Security Strategies
Various strategies will be used to protect the data, human resources, and the hardware from various vulnerabilities.
Data
• Use of signage-these will serve to set up boundaries for restricted areas, and identify forbidden and unauthorized material.
• Use of Intrusion Detection System-the aim is to prevent, identify and document intrusion. The IDS must identify an attempted unauthorized entry into a safeguarded environment.
Human resources
• Setting up a video surveillance camera. This will provide a good view of people who enter and leave the room and thus take note of suspicious activities and respond to them promptly.
• Use of smart cards-this will assist to keep unauthorized employees or attackers from getting access to rooms that are not allowed to enter.
Hardware
• Locking up the server room. This will ensure that only authorized persons get access to the room.
• Use of fire suppression systems-these will serve to detect fire during its initial stages via smoke, heat, and other warning signals, and thus avert the destruction of hardware
Protection of the Company’s Network Perimeter
One of the strategies of protecting the company’s network perimeter could be disabling unused portals. The UDPs and TCPs that are not totally necessary through the company’s firewall-particularly ports 135,137 and 139 can be disabled. This makes it possible to detect attacks before they happen. Another strategy entails enabling the Wired Equivalent Privacy (WEP). It is utilized in safeguarding wireless communication from eavesdropping as well as averting unauthorized access to a wireless network (Swaminatha, & Elden, 2013). Scrutinizing the website of the company is yet another strategy. This will greatly assist to identify anything a cyber-attacker could utilize to launch an attack-this encompasses information that could be utilized for purposes of social engineering and information that could help an actual break-in.
Protection of the Company’s Internal and External Network Traffic
For the protection of the company’s internal and external network traffic, one of the proposed approaches is bolstering access control measures and this can be attained by utilizing a strong password system that has a mixture of lower and upper case letters, special characters and numbers. It is also essential to reset default passwords often. Another approach is updating all software often. Using the newest software ensures that the company has a version that encompasses fixes for security threats and vulnerabilities. Employee training is vital as well. This allows the employees to comprehend network security and thus able to detect threats. In addition they gain knowledge on how to avert a network security breach. The network security tools that we could use include Virtual Private Network (VPN) and firewall.
Guidelines for the Organization’s Physical Security Manual
The following guidelines will be applicable in organization’s physical security manual:
• Employees to use access control cards-these are aimed at regulating access to certain rooms that contain valuable hardware and infrastructure.
• Employees to adhere to disaster recovery plan-the plan provides guidelines on ways to respond to natural calamities and emergencies that are caused by internal and external threats that have the capability of threatening data or personal safety.

References
Kizza, J. M. (2019). Guide to Computer Network Security. Springer Science & Business Media.
Swaminatha, T. M., & Elden, C. R. (2013). Wireless Security and Privacy: Best Practices and Design Techniques. Addison-Wesley Professional.

Order | Check Discount

Tags: Physical Network Security Strategy

Assignment Help For You!

Special Offer! Get 20-25% Off On your Order!

Why choose us

You Want Quality and That’s What We Deliver

Top Skilled Writers

To ensure professionalism, we carefully curate our team by handpicking highly skilled writers and editors, each possessing specialized knowledge in distinct subject areas and a strong background in academic writing. This selection process guarantees that our writers are well-equipped to write on a variety of topics with expertise. Whether it's help writing an essay in nursing, medical, healthcare, management, psychology, and other related subjects, we have the right expert for you. Our diverse team 24/7 ensures that we can meet the specific needs of students across the various learning instututions.

Affordable Prices

The Essay Bishops 'write my paper' online service strives to provide the best writers at the most competitive rates—student-friendly cost, ensuring affordability without compromising on quality. We understand the financial constraints students face and aim to offer exceptional value. Our pricing is both fair and reasonable to college/university students in comparison to other paper writing services in the academic market. This commitment to affordability sets us apart and makes our services accessible to a wider range of students.

100% Plagiarism-Free

Minimal Similarity Index Score on our content. Rest assured, you'll never receive a product with any traces of plagiarism, AI, GenAI, or ChatGPT, as our team is dedicated to ensuring the highest standards of originality. We rigorously scan each final draft before it's sent to you, guaranteeing originality and maintaining our commitment to delivering plagiarism-free content. Your satisfaction and trust are our top priorities.

How it works

When you decide to place an order with Dissertation App, here is what happens:

Complete the Order Form

You will complete our order form, filling in all of the fields and giving us as much detail as possible.

Assignment of Writer

We analyze your order and match it with a writer who has the unique qualifications to complete it, and he begins from scratch.

Order in Production and Delivered

You and your writer communicate directly during the process, and, once you receive the final draft, you either approve it or ask for revisions.

Giving us Feedback (and other options)

We want to know how your experience went. You can read other clients’ testimonials too. And among many options, you can choose a favorite writer.