.

.
.

Wednesday 1 May 2019

Implementation Plan Essay Example | Topics and Well Written Essays - 5000 words

Implementation Plan - Essay Exampled guidelines of the proposal are pertinent to entropy shelter and privacy that are currently put forward by bodies of the state, federal regulators, and the state.New technologies are coming up in the market daily. Therefore, there is need to safeguard the evolving technologies. In the case where MEMATECH Solutions curb has this need, I have proposed to develop and install a new security program for the company. The idea rat the plan is to come up with a network that connects all the machines in the organization in protect the plan from being publicized during the stage of development and research. The paper therefore, discusses the proposal of MEMATECH Solutions limited security plan proposal for the connections that dwells on the authentication mechanisms, policies of password, and the plans proposed cost (Pipkin, 2000).I have proposed a security plan for MEMATECH Solutions limited for the connection that impart safeguard their new products when researching and developing stages are carried out. The paper proposes a comprehensive plan that deals with password policy, network policy, authentication of data, and the projects cost.To safeguard the project it is instant that all information and data are kept on different networks and servers that are not deep down the access of the general corporation. This can be achieved by developing new networks through the appliances of Cisco Terascale router or Cisco ASA security, VMware, VLANS, and Windows 2008 with the help of IPV6 private addressing. Employing the appliances of ASA security and Terascale, I will be able to monitor and concord the entire network and access traffic on the corporate network subset through the firewall features. In society with MAC address, I will implement through filtering to offer more security. The IPV6 IP mechanism will be employed to help it from attempts of network intrusion and brute force. I will use a private address to ensure that all the IP address are

No comments:

Post a Comment