Essay Designing a Security Strategy
Geo-Probe Inc. (GPI) 20 years in business, a company with constant growth and success. GPI provides construction management, engineering design, programming and environmental planning, and other A-E projects in support of a, industry, different government and commercial clients. GPI has 300 employees and ten branch office locations. GPI has many computers and network device attach to their network like any other business.
Here is GPI Current network topology.
Computer networked devices and peripheral is most overlooked and common security threat to corporate assets. (Darb, 2010). Multifunction copiers and digital devices are very intelligent ...view middle of the document...
Company data itself is an asset and need to safeguarded without ample network security, company risk losing that asset. GPI Network security strategy is to protect the digital information assets (Oppenheimer, 2010).
The goal of network security is to protect confidentiality, maintain an integrity and ensure availability with this mind it is important to protect all systems asset from threat and vulnerabilities for the company to achieve its full perspective (Loveland, 2009). Usually, these vulnerabilities arise from following Misconfigured hardware or software, Inherent technology weaknesses, Intentional end-user acts and Poor network design (Loveland, 2009).
The most companies take a sensitive approach to security, where they response to security threat by implementing single point solutions (Loveland, 2009). These kinds of approaches will be costly, and this will result in a patchwork of solutions that ironically make the company less secure (Loveland, 2009). What GPI need is a complete security strategy that clearly outlines the current state of the security environment and bring into line with business objectives for the next three years (Loveland, 2009).
The first step in designing a security strategy is to understand the company network design and current state of the security environment. The best way to plan and execute a security strategy successfully is to breaking down the process of network security design into steps as following (Oppenheimer, 2010).
Analyze security risks, Identify network assets, Develop a security plan, Analyze security requirements and tradeoffs, Define a security policy, Develop a technical and implementation strategy, Develop procedures for applying security policies, Achieve buy-in from users, professional staff and manager, train users and test the security and update it if any problems are found and Maintain safety and...