Nt2580 Final Project

Topics: Biometrics, Internet, Access control Pages: 7 (1848 words) Published: November 27, 2014
Nt2580 Final Project
Richman Investments |
Richman Internet Infrastructure Security Management Upgrade | ITT Technical Institute NT2580 Course Project |

Based on the premises that Richman has 5000 employees throughout the main office and several branch offices, this document dictates research solutions and details the appropriate access controls including policies, standards, and procedures that define who users are, what they can do, which resources they can access, and which operations they can perform on a system. | Final Project

I. Richman Internet Infrastructure Security Management Upgrade A. Purpose
Based on the premises that Richman has 5000 employees throughout the main office and several branch offices, this document dictates research solutions and details the appropriate access controls including policies, standards, and procedures that define who users are, what they can do, which resources they can access, and which operations they can perform on a system. II. Basic Authentication Procedures and Standards, (Who users are.) A. Trinity-Three-factor Authentication Method replaces Basic Authentication It is my view the Administrator’s responsibility is to provide secure communications by adding layers of security at all levels to assure the amount of protection for company’s valuable assets. Richman will provide its employees a new method of authentication I call Trinity. It is a three-factor authentication method requiring updated laptops and new Apple IPhone. Since Microsoft has stopped support for Microsoft Windows Operating System XP, and 87 % of our current systems require upgrade to Windows 7. We should take advantage of the newest technologies available to our Corporation. Trinity is a three-factor authentication combines” “something that you know” (password – PIN), with “something that you have” (hardware- token, mobile phone) and/or “something that you are” (biometric technologies), to make sure that the person is who he/she claims to be.”(1) 1. Biometric Identification - Biometrics is the science of identifying someone from physical characteristics. A user’s fingerprint is one of the strongest authenticators available. Never lost during a commute or forgotten at home, has fingerprint authentication introduced a new plateau of convenience for fast, secure access all users will have, Desktop USB add on, laptops and Iphone6 with biometric fingerprint scanners. This will be level one security. The log records will show GPS coordinates of the scanned process as well. 2. Device Authentication- Entrust IdentityGuard software leads the industry as one of the most robust authentication. We can use Entrust for device authentication, biometrics, digital certificates, mobile soft tokens, and IP Geolocation. 3M Cogent provides the highest-quality fingerprint authentication technology to government, border services and security- conscious organizations across the globe. “Entrust has partnered with 3M Cogent to integrate its world-class fingerprint enrollment and verification technology into the Entrust IdentityGuard software authentication platform.”(2) These are all available through Entrust. 3. Windows Basic Authentication-User ID and password. This is the most common, and typically the simplest, approach to identifying someone because it is fully software-based. B. Strong Password Resolution

Make no mistake: An eight-character password could be very secure, even if attacked by today's high-speed computers. This method will soon be antiquated. Fortune 100 corporations, small firms and even Internet service providers with strong security have an Achilles heel; users who pick easily guessable passwords. Many who think themselves clever place a digit or two on the end of their chosen word. Such feeble attempts at deception are no match for today's computers, which are capable of trying millions of word variations per second and often can guess a good number of passwords in less than a minute. Richman must stay...

References: Entrust (2014),” Entrust Identityguard” Retrieved from: http://www.entrust.com/
Pearl Echo Software (2014).” Pearl Echo.Suite” Retrieved from: http://www.pearlsw.com/
SANS.ORG(2014),”Two Factor Authentication” Retrieved from: http://www.sans.org/reading-room
System Administration, Networking, and Security Institute or SANS.org (2001) “View Employee Internet Use Report (PDF)” retrieved from http://www.sans.org/security-resources/policies/internet.php
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • NT2580 Project part 1 Essay
  • NT2580 Essay
  • NT2580 Project Part 1 Essay
  • Final Project Essay
  • NT2580 Project part 1 Essay
  • NT2580 Final Study Guide Essay
  • nt2580 project part 1 Essay
  • It 255 Final Project Essay

Become a StudyMode Member

Sign Up - It's Free
让开,命运啊 | Disney / Buena Vista | Watch Now