Topic > Organization Security Requirements - 1046

Organization Security Requirements First we will ensure that the system is physically secured. The room that will house the server will be in a secured area with multi-layered security, such as a keypad and additional locks. The room will have an air conditioner to ensure the system remains cool and protected. Once the routers are configured and secured, the next thing we will put in place is the ACL list. This list would limit movement and access to files that are not related to the job description. We will create restrictions that will apply to workstations and must have user authentication. Once authentication is successful, those restrictions are then applied as registry settings providing an efficient way to manage a large number of computers. This will ensure that the integrity of your data and network are secure. A series of permissions will be added to the files for Teachers, Nurses and Students limiting only to them what they need to carry out their tasks. These controls will give permission to operations they can perform, such as shared files and printers. The key people who should have access to your system One of the key people would be the IT person. He/she will maintain the integrity of the system and take care of all patches and updates as required. The other people would be the chief administrator. Proposed security policies for your new system The security policy will introduce what is and is not acceptable use of the school equipment and its network. There will be interventions on security issues that can bring down the system. The policy will state how social networking can pose a serious threat to system integrity. Employees will also be their assets. All stakeholders, administrators and all IT personnel will participate in establishing policies for Internet use. All pros and cons will be clearly explained and provided to the internal IT department to train staff. Works Cited Emmett Dulaney CompTIA Security 4th Edition www.comptia security pg.229, Retrieved June 20, 2011 http://www.itl.nist .gov/lab/bulletns/bltndec03.htmJonathan Strickland http://electronics.howstuffworks.com /how-to-tech/how-to-secure-home-network1.htm, accessed 24 June 2011http://searchsecurity.techtarget .com/tip/0,289483,sid14_gci1068906,00.htmlKarygiannis, Tom and Owens, Les . “Wireless Network Security.” National Institute of Standards and Technology. November 2002, retrieved June 24, 2011 www.blackmagic.com Protective software, retrieved June 24, 2011 Access Control www.sans.org/access control June 23, 2011