This Allows for a certain high level of security to protect the data sessions

This allows for a certain high level of security to

This preview shows page 7 - 11 out of 16 pages.

Allowing for encapsulation, authentication and data encryption during the call. This Allows for a certain high level of security to protect the data sessions that are Established between the users with the correct role based access implemented onto Their user profile VPN client to access the GFI network. However if the VPN systems are Not kept up to date they do pose a medium risk to availability due to the potential for Denial of service attacks. Access Points. Internal Access All users must read and sign a System Authorization Request before they are given access FINAL RISK ASSESSMENT PAPER 10
Image of page 7
To the network. Annual training is also conducted for all users to ensure that they keep up to date With the latest information technology. User accounts are created within an Active Directory environment where all users are required to login using Common Access Cards and an associated pin from pre-approved company workstations External Access Two external access points are available for remote users. These access points are Defined as the following: Mobile remote dial up users who connect via RAS servers Mobile wireless users who connect directly to core switches through a router. Authentication is require dial up users but is not currently required for wireless users. The SSID currently visible to all those in the current vicinity, but can only be accessed by employees Who know the password? Company Communication System GAI’s infrastructure utilizes smart hosts which are designed to and placed on the Perimeter of the network to ensure that all incoming emails are virus free. Firewalls are put in place to filter the type of communications that are allowed to enter and leave the networks. Scans are also conducted to ensure all computers and servers are updated with the latest updates and patches. The network is protected by anti-virus software and utilized intrusion detection and prevention systems to identify security breaches and threats FINAL RISK ASSESSMENT PAPER 11
Image of page 8
ACCESS CONTROL MANAGEMENT AUTHENTICATION Authentication is a process that protects companies and their networks by keeping Unauthorized individuals and systems from accessing secure networks and handling privileged, Confidential data. There are various methods companies employ to ensure authentication and Many companies use multi-factor authentication begins with the process of verifying that the individual is who they claim to be and ensuring that they have the authorization to access the documents and data they are attempting to access. After the user’s identify is verified and they are given access to the system. Wireless Access Current processes in place call for a configuration which uses open Authenticatio n. This is unacceptable and must be immediately addressed due to the Security threats it poses allowing for anyone within range of the wireless access point to Access the GFI intranet and potentially retrieve sensitive and classified information Email and Wireless communication The email servers are maintained and secured with the ability to secure, block and Remove unwanted or dangerous communications. These abilities are maintained through the use FINAL RISK ASSESSMENT PAPER 12
Image of page 9
Of filters and a screening process. (Manzoor, K. (n.d.)
Image of page 10
Image of page 11

You've reached the end of your free preview.

Want to read all 16 pages?

  • Fall '14
  • GFI

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern

Stuck? We have tutors online 24/7 who can help you get unstuck.
A+ icon
Ask Expert Tutors You can ask You can ask You can ask (will expire )
Answers in as fast as 15 minutes