NETWORK DESIGN: MEDICAL FACILITY J.P. MARSHALL THOMAS ASHEY ROHAN GOTHWAL JENNIFER COLMAN SAMUEL CHERRY

Size: px
Start display at page:

Download "NETWORK DESIGN: MEDICAL FACILITY J.P. MARSHALL THOMAS ASHEY ROHAN GOTHWAL JENNIFER COLMAN SAMUEL CHERRY"

Transcription

1 NETWORK DESIGN: MEDICAL FACILITY J.P. MARSHALL THOMAS ASHEY ROHAN GOTHWAL JENNIFER COLMAN SAMUEL CHERRY

2 Table of Contents Executive Summary 3 Written Description 4 Network Policies. 6 Security Policy. 9 Disaster Recovery Policy. 10 Budget 11 Appendix A: Physical Network Design 12 Appendix B: Logical Network Design 13

3 Executive Summary This proposal describes a networking infrastructure for a new medical facility that cares for the terminally ill. The main components of this design are the actual medical facility made up of four floors, a Data Center, and a Back Up Data Center. The Data Center will be located across the street from the medical facility while the Back Up Data Center will be located at a further location ready to operate immediately to provide the hospital with all the essential resources it uses in order to stay running effectively and efficiently. All the hospital's files and resources kept across the street in the Data Center, a secure building that Allows the servers to be stored in a safe environment. The Back Up Data Center is identical to the data center, except the external IP address. The internal IP is mimicked to reduce errors. There will be a wireless connection from the Data Center to the medical facility across the street. All four floors of the medical facility will be divided into four networks. Fourth floor and first floor have identical network designs, while the third and second have similar designs. Due to the critical nature of this organization there will be a 99.99% uptime. Access will be strictly enforced using strict password and username policies to ensure only verified personnel are logging on. Mobile users can securely login and work remotely using a secure connection through the Internet!

4 Written Description Referencing Appendix A &B Hospital: From the ISP with an IP address of , there is a Cisco 5585 Gateway connection with an IP address of , to the Cisco ASA 5550 Firewall going to the medical facility. The Gateway also contains a back up firewall in case the other firewall fails. The Cisco ASA 5550 Firewall connects to the router with an IP address of , which then connects to each Cisco 2960G-24TC-L Switch on all four floors of the medical facility. Can be referenced to Appendix B for logical design. With the Data Center being across the street from the medical facility there will be two Bridgewave GE60 60GHz GigE Med-Range Links wirelessly connecting the Cisco 5585 Gateway at the Hospital to another Cisco 5585 Gateway at the Data center. Hospital Floors: The fourth floor, which houses the IT and administration department, will have an IP address of x/26 subnetted and divided into 4 networks by the type of device, whether it is a computer, laptop, Wi-Fi, or printer. Can be referenced to Appendix A for physical design. Network IP Host Range Broadcast IP Computer Laptop Wi-Fi Printers The third floor housing HR, billing, and accounting, will have an IP address of x/26 subnetted and divided into 4 networks by departments, leaving one network for anything not concerning the departments on the third floor. Can be referenced to Appendix A for physical design. Network IP Host Range Broadcast IP HR Billing Accounting Other The second floor housing the medical supplies and medical records has an IP address of x/26. This floor will be subnetted divided into four networks by departments, leaving two networks available for anything other than medical supplies and medical records. Can be referenced to Appendix A for physical design.

5 Network IP Host Range Broadcast IP Medical Supplies Medical Records Other Other The first floor, which houses the IT and administration department, will have an IP address of x/26 subnetted and divided into 4 networks by the type of device, whether it is a phone, computer, laptop, or Wi-Fi/printer. The network ranges for the third floor include , , , and Can be referenced to Appendix A for physical design. Network IP Host Range Broadcast IP Computer Laptop Wi-Fi Printers Data Center: From the ISP with an IP address of , there is another Cisco 5585 Gateway connection with an IP address of , to the Cisco ASA 5550 Firewall going to the Data Center. This Gateway also has a backup firewall in case of the other firewall failing. The Cisco ASA 5550 Firewall connects to a Cisco 2960G-24TC-L Switch with an IP address of x/28, which then subnets into 16 networks. Out of the 16 networks nine will be needed for Dell PowerEdge R520 rack Servers including user data files, print and file server, DNS server, database server, server, web server, access directory, patient data files, and application server. Can be referenced to Appendix B for logical design. Network IP Host Range Broadcast IP User Data Files Print and File DNS Database Web Access Patient Data Application Other Other Other Other Other Other

6 Other Back Up Data Center: The back up data center located further away than the original data center will be connected to the ISP through the Internet with an external IP address of connecting to the Cisco 5585 Gateway, which also has a backup firewall. The rest of the back up data center is identical to the original back up center including the internal IP address and divided network IPs. Can be referenced to Appendix B for logical design. 1000Base-T: The cabling used for the Data Center, Back Up Data Center, and all four floors of the medical facility will be 5000' Ft Cat5e UTP Solid LAN Network Cable of 1000Base-T. The benefits include compatibility with network protocols, existing applications, Network Operating Systems, network management platforms and applications.

7 Network Policies SOP Internet Access Each computer operating on the network must be registered on the hospital domain. A security login authentication request will be in place in order to access the network on laptops and desktops. Each user will be given login credentials and be assigned certain roles based on their department and roles. In order to gain access to the network the user must register with the IT department. In order to help increase security and make sure users are keeping their network login credentials private there will be a Statement of understanding. This will state that every user will be responsible for all network activities under their user name. The upper division IT administrators will be the only users that will have access to all systems. VPN network users will have to follow the same instructions for the on-site hospital network. To increase security each user must complete a formal training that complies with HIPPA and any other compliance the hospital must meet. Printing The hospital will be using HP Laser Jet m9050, and each floor in the hospital will have 2 printers. This will be a total of 8 printers. All printers will operate on the printer network through a wireless network. Each printer will be identified by a certain naming convention which correlates with the floor number and room number they are located in. These eight printers will be registered on the domain and will be the only printers used. Storage Allocation Data center will contain a storage files A total of 9 servers will be located in the data center (Users/files, print/file, web, access directory, DNS server, database, , application server) Access to these servers will only be given to certain users who need access and roles that indicate what users have the capability to do. Each department will have a specific amount of storage space. Usage Each employee/user will have an address, which will be used for work purposes only. To increase security users will not be able to use this for and outside activities. Users address will be assigned by their first/last name.

8 In order to receive mass s users will be assigned into different groups. (Ex. Secretaries, Doctors, IT Admin, Nurses). All s will be stored in the file server for security purposes. User Administrations Every 12 hours Wi-Fi will reboot Users will be limited on what they can access based on their roles Naming conventions All of the equipment will follow a basic naming convention which first identifies the floor, followed by the device, and if necessary the number of the printer or count. (Example: 1 st Floor WAP, 2 nd Floor Printer-1, 3 rd Floor Printer-2). This will be the most effective naming convention for each device used in the hospital. Protocol Standards HTTP/HTTPS- Controls the web traffic throughout the hospital. HTTP will control all public network traffic, and HTTPS will control all local network traffic before reaching the firewall. DNS- DNS will automatically resolve all of the domain names that correlate with IP address. DHCP this will automatically assign IP addresses to the users on the network. TCP/IP, IPv4- this will be used to allow the sharing of information between each other and to find each other. VPN- VPN will be used to access systems and computers away from the hospital. SMTP, POP3/IMAP- will be used to allow the sending and receiving of s between users. Workstation Configurations (Hardware/Software) Desktop stations will be equipped with windows 8 and each system will have the complete version of Microsoft Office Other software included will be; Microsoft Outlook, Adobe Reader, Norton Anti-Virus, and Google Chrome. Network Device Placement There will be a designated room on each floor that will be used to place the switches, and wireless access point. There is one router that will be used for each of the floor and this router along with the firewall will be placed on the fourth floor with the IT department. All the switches will connect to the router, and this will allow any printer/computer connect to the network. All network devices will be locked and kept in a secure location. Environmental Issues No food or drinks are allowed inside the data center or near and devices Data center must be kept to a certain temperature at all times to protect servers from being overheated Storage centers must be maintained and checked for any water leaks. Servers must be placed on elevated platforms in order to avoid any water damage. All equipment must be kept in secured locations where access codes or locks are required to enter.

9 Power and Applying Patches to Operating Systems All computer updates will be approved and administer through the hospital IT department Patches will be implemented on a set schedule All devices will be connected to a power surge protector to protect it from any power voltage strike. The backup generator used for the hospital will be power on diesel.

10 Security Policies User account access The hospital will use Microsoft Forefront Identity Manager 2010 as the primary software for control of user accounts. We selected this software because it offers end-to-end identity management solutions with enhanced security technologies. The IT team will issue user account names to new employees of the hospital. The user names will consist of the employee s first name, last name, a letter corresponding to the month the employee was hired, and number code corresponding to the year. Password requirements Password must be changed every 6 months After a password has been used, it cannot be used again for 18 months Password must be a minimum of 8 characters Password must contain one number, one symbol, and one capitol letter Password checker will display relative strength of password Network access Users on the network will only be granted access to necessary networks and data Each device on the network will have a private static IP address assigned to the devices MAC address No devices will be given access to the network through a VPN unless its MAC address is explicitly allowed Permissions granted for printing patient records only to specific medical staff Hardware firewalls The hospital, data center and backup data center will all utilize a Cisco 5585 gateway which also functions as a firewall followed immediately by a Cisco Asa5550 firewall for all incoming and out-going connections. Access will not be granted to enter or leave the network unless the device is explicitly allowed to do so. The purpose of enabling the Cisco 5585 gateways firewall connection is to provide redundancy in the event that either device fails. Encryption use All servers will utilize data encryption certificates so that stored data, and data on the network remains encrypted. Logging practices Logging records will be kept for all system including but not limited to Successful log in attempts Failed log in attempts Time and duration Files/applications accessed VPN access

11 Terminal location Log print attempts, what files, and allowed or denied Physical building/hardware access rules Security cameras and alarm system through third party vendor to prevent from physical break-in to building Server rooms and server racks will be kept locked with access granted to only necessary IT staff Intrusion Detection System (IDS)/Intrusion Prevention (IPS) System & regular vulnerability assessments IDS and IPS systems will be utilized in conjunction with the logging and auditing system. Any tripping of the IDS or IPS will be immediately reported the head security officer. Weekly analysis of audit logs and security tests will also be completed by the security team to ensure that all system, servers, and computers remain secure.!

12 Disaster Recovery Policy Procedures and Polices All of the data will be backed up to an offsite location and this location will contain multiple servers. There will be different storage devices for medical supplies/patient records. This will reduce any data redundancy and increase the integrity of the data being backed up. If there is a need to add more back-up servers to separate data then the policy will permit. Backup Procedures Every 2 hours the hospital data will be backed up to the offsite data center. This data will be kept in a safe location away from any intruders. The backup will be schedule on hours when the hospital is projected to face the least amount of network traffic in order to avoid network collisions. The data center will be approximately 30 minutes away from the closet support personnel and will include 24hr support. Virus Management All laptops and desktop will include anti-virus protection software that will detect and prevent any viruses. The IT department will be responsible for updating the virus software and removing any potential virus, or Trojan Horse Threats. Disk/Fault tolerance The best possible way to avoid losing any data is to implement a RAID Level 5. This will enable the servers to exchange disk if needed. All patient data is critical in the hospital and must be available at all times. Power Failure If a power failure occurs the hospital will rely on the generators, which will be powered by diesel. During the time it takes to start the generators a UPS will power the hospital computers and servers. The UPS will be able to supply power for about minutes max. Warm Site The hospital will have a warm site that includes all storage backup data and will be able to provide data. The site will not be located at the hospital because it will be more efficient to be located off-site.!

13 Budget Quantity! Device!Description! Price!per! unit! Total!price! 1! Microsoft!Forefront!Identity!Manager!2010! $2,700.00! 2,700.00! 2! Bridgewave!GE60!60GHz!GigE!MedARange! $17,900.00!! $35,800.00!! Link! 2! Dell!PowerEdge!R520!rack!Server!(DNS)! $13,728.00! $27,456.00! 2! Dell!PowerEdge!R520!rack!Server!(User!Data! $13,728.00! $27,456.00! Files)! 2! Dell!PowerEdge!R520!rack!Server!(Print!and! $13,728.00! $27,456.00! File)! 2! Dell!PowerEdge!R520!rack!Server!(Database)! $13,728.00! $27,456.00! 2! Dell!PowerEdge!R520!rack!Server!( )! $13,728.00! $27,456.00! 2! Dell!PowerEdge!R520!rack!Server!(Web)! $13,728.00! $27,456.00! 2! Dell!PowerEdge!R520!rack!Server!(Access! $13,728.00! $27,456.00! Directory)! 2! Dell!PowerEdge!R520!rack!Server!(Patient! $13,728.00! $27,456.00! Data!Files)! 2! Dell!PowerEdge!R520!rack!Server! $13,728.00! $27,456.00! (Application)!! 3! Cisco!ASA!5550!Firewall! $13,506.99! $40,520.97! 3! Cisco!5585!Gateway!! $16,497.00! $49,491.00! 4! Cisco!WAP4410N!WirelessAN!Access!Point!A! $125.00!! $500.00!! PoE/Advanced!Security! 5! 1000'!Ft!Cat5e!UTP!Solid!LAN!Network!Cable! $58.88! $294.40!! 6! Cisco!2960GA24TCAL!Switch!!! $2,362.99!! $14,177.94!! 8! HP!LaserJet!M9050!Multifunction!Printer!! $12,499.00! $99,992.00!! Hot!site!(Company:!RecoveryPoint,!! $24,000/Year! Gaithersburg,!MD)!!! TOTAL! $490,580.31!!!

14 Appendix A: Physical Network Design

15 ! Appendix B: Logical Network Design

16 DNS Server Database Server Server Print & File Server Access Directory WAP Web Server Patient Data Files Application Server User Data Files Switch Cisco 2960G 1000Base-T Laptops 1000Base-T Desktop x/28 Printers Switch Cisco 2960G Bridgewave GE60 Firewall Cisco ASA5550 Bridgewave GE60 WAP Gateway Cisco 5585 To Data Center Switch Cisco 2960G 1000Base-T Laptops Desktop ISP To Hospital Gateway Cisco 5585 Firewall Cisco ASA5550 Router Cisco WAP4410N Printers Firewall Cisco ASA5550 Gateway Cisco 5585 To Backup Data Center Switch Cisco 2960G 1000Base-T WAP Laptops Desktop x/28 Switch Cisco 2960G Printers 1000Base-T DNS Server Web Server Database Server Patient Data Files Server Application Server Print & File Server User Data Files Access Directory Switch Cisco 2960G 1000Base-T WAP Laptops Desktop Printers

17 Fourth Floor Dell Precision Workstation T1700 HP Laserjet M9050 Gateway Cisco 5585 Firewall Cisco ASA5550 Router Cisco WAP4410N Switch Cisco 2960G Dell Precision m Base-T Cisco WAP4410-N

18 Third Floor Dell Precision Workstation T1700 From 4 th Floor HP Laserjet M9050 Router Cisco WAP4410N Switch Cisco 2960G Dell Precision m Base-T Cisco WAP4410-N

19 Second Floor Dell Precision Workstation T1700 From 4 th Floor HP Laserjet M9050 Router Cisco WAP4410N Switch Cisco 2960G Dell Precision m Base-T Cisco WAP4410-N

20 First Floor Dell Precision Workstation T1700 From 4 th Floor HP Laserjet M9050 Router Cisco WAP4410N Switch Cisco 2960G Dell Precision m Base-T Cisco WAP4410-N

Network Security Policy

Network Security Policy Network Security Policy Date: January 2016 Policy Title Network Security Policy Policy Number: POL 030 Version 3.0 Policy Sponsor Policy Owner Committee Director of Business Support Head of ICU / ICT Business

More information

Safe Place and Code Alert Customer Information Technology Requirements Series 10.x Software

Safe Place and Code Alert Customer Information Technology Requirements Series 10.x Software Safe Place and Code Alert Customer Information Technology Requirements Series 10.x Software 2017 RF Technologies, Inc. All specifications subject to change without notice. All Rights Reserved. No Part

More information

Juniper Vendor Security Requirements

Juniper Vendor Security Requirements Juniper Vendor Security Requirements INTRODUCTION This document describes measures and processes that the Vendor shall, at a minimum, implement and maintain in order to protect Juniper Data against risks

More information

HikCentral V.1.1.x for Windows Hardening Guide

HikCentral V.1.1.x for Windows Hardening Guide HikCentral V.1.1.x for Windows Hardening Guide Contents Introduction... 1 1. The Operating System - Microsoft Windows Security Configuration... 2 1.1 Strict Password Policy... 2 1.2 Turn Off Windows Remote

More information

HikCentral V1.3 for Windows Hardening Guide

HikCentral V1.3 for Windows Hardening Guide HikCentral V1.3 for Windows Hardening Guide Contents Introduction... 1 1. The Operating System - Microsoft Windows Security Configuration... 2 1.1Strict Password Policy... 2 1.2Turn Off Windows Remote

More information

ISSP Network Security Plan

ISSP Network Security Plan ISSP-000 - Network Security Plan 1 CONTENTS 2 INTRODUCTION (Purpose and Intent)... 1 3 SCOPE... 2 4 STANDARD PROVISIONS... 2 5 STATEMENT OF PROCEDURES... 3 5.1 Network Control... 3 5.2 DHCP Services...

More information

Security+ SY0-501 Study Guide Table of Contents

Security+ SY0-501 Study Guide Table of Contents Security+ SY0-501 Study Guide Table of Contents Course Introduction Table of Contents About This Course About CompTIA Certifications Module 1 / Threats, Attacks, and Vulnerabilities Module 1 / Unit 1 Indicators

More information

Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard

Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure

More information

Network Assessment Your Company s Name

Network Assessment Your Company s Name Network Assessment Your Company s Name October 11 th, 2009 NSK, Inc. Page 1 Contents Section 1 Network... 4 1.1 ISP... 4 1.2 Internal Network... 4 (a) Firewall... 4 (b) Switches...4 (c) Wireless...4 (d)

More information

SECURITY & PRIVACY DOCUMENTATION

SECURITY & PRIVACY DOCUMENTATION Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive

More information

Table of Contents. Page 1 of 6 (Last updated 27 April 2017)

Table of Contents. Page 1 of 6 (Last updated 27 April 2017) Table of Contents What is Connect?... 2 Physical Access Controls... 2 User Access Controls... 3 Systems Architecture... 4 Application Development... 5 Business Continuity Management... 5 Other Operational

More information

World Skills Competition. Trade 39: IT PC and Network Support. Day 2 Competition

World Skills Competition. Trade 39: IT PC and Network Support. Day 2 Competition World Skills Competition Trade 39: IT PC and Network Support Day 2 Competition Small Business Competitor Name: Country Code: 1 of 10 CONTENTS This Test Project proposal consists of the following documentation/files:

More information

ClearPath OS 2200 System LAN Security Overview. White paper

ClearPath OS 2200 System LAN Security Overview. White paper ClearPath OS 2200 System LAN Security Overview White paper Table of Contents Introduction 3 Baseline Security 3 LAN Configurations 4 Security Protection Measures 4 Software and Security Updates 4 Security

More information

SAS SOLUTIONS ONDEMAND

SAS SOLUTIONS ONDEMAND DECEMBER 4, 2013 Gary T. Ciampa SAS Solutions OnDemand Advanced Analytics Lab Birmingham Users Group, 2013 OVERVIEW SAS Solutions OnDemand Started in 2000 SAS Advanced Analytics Lab (AAL) Created in 2007

More information

Chapter 11: Networks

Chapter 11: Networks Chapter 11: Networks Devices in a Small Network Small Network A small network can comprise a few users, one router, one switch. A Typical Small Network Topology looks like this: Device Selection Factors

More information

Code Alert Customer Information Technology Requirements Series 30 Software

Code Alert Customer Information Technology Requirements Series 30 Software Code Alert Customer Information Technology Requirements Series 30 Software 2017 RF Technologies, Inc. All specifications subject to change without notice. All Rights Reserved. No Part of this work may

More information

Department of Public Health O F S A N F R A N C I S C O

Department of Public Health O F S A N F R A N C I S C O PAGE 1 of 7 Category: Information Technology Security and HIPAA DPH Unit of Origin: Department of Public Health Policy Owner: Phillip McDown, CISSP Phone: 255-3577 CISSPCISSP/C Distribution: DPH-wide Other:

More information

Medical Sciences Division IT Services (MSD IT)

Medical Sciences Division IT Services (MSD IT) Medical Sciences Division IT Services (MSD IT) Security Policy Effective date: 1 December 2017 1 Overview MSD IT provides IT support services support and advice to the University of Oxford Medical Sciences

More information

Cisco Network Admission Control (NAC) Solution

Cisco Network Admission Control (NAC) Solution Data Sheet Cisco Network Admission Control (NAC) Solution New: Updated to include the Cisco Secure Network Server (SNS) Cisco Network Admission Control (NAC) solutions allow you to authenticate wired,

More information

Chapter 11: It s a Network. Introduction to Networking

Chapter 11: It s a Network. Introduction to Networking Chapter 11: It s a Network Introduction to Networking Small Network Topologies Typical Small Network Topology IT Essentials v5.0 2 Device Selection for a Small Network Factors to be considered when selecting

More information

Awareness Technologies Systems Security. PHONE: (888)

Awareness Technologies Systems Security.   PHONE: (888) Awareness Technologies Systems Security Physical Facility Specifications At Awareness Technologies, the security of our customers data is paramount. The following information from our provider Amazon Web

More information

Physician Office Name Ambulatory EHR Security Risk Analysis

Physician Office Name Ambulatory EHR Security Risk Analysis Process is in place to verify access granted is appropriate (ie: Role Based access indicates that the biller has access to billing screens and the nurse has access to the patient medical information).

More information

IT Foundations Networking Specialist Certification with Exam

IT Foundations Networking Specialist Certification with Exam IT Foundations Networking Specialist Certification with Exam MSIT113 / 200 Hours / 12 Months / Self-Paced / Materials Included Course Overview: Gain hands-on expertise in CompTIA A+ certification exam

More information

Ready Theatre Systems RTS POS

Ready Theatre Systems RTS POS Ready Theatre Systems RTS POS PCI PA-DSS Implementation Guide Revision: 2.0 September, 2010 Ready Theatre Systems, LLC - www.rts-solutions.com Table of Contents: Introduction to PCI PA DSS Compliance 2

More information

SECURITY PRACTICES OVERVIEW

SECURITY PRACTICES OVERVIEW SECURITY PRACTICES OVERVIEW 2018 Helcim Inc. Copyright 2006-2018 Helcim Inc. All Rights Reserved. The Helcim name and logo are trademarks of Helcim Inc. P a g e 1 Our Security at a Glance About Helcim

More information

DESCRIPTION OF TYPICAL NETWORK SERVICES ON SERVERS

DESCRIPTION OF TYPICAL NETWORK SERVICES ON SERVERS DESCRIPTION OF TYPICAL NETWORK SERVICES ON SERVERS Before you start Objectives: Familiarize yourself with the services such as File and Print, WWW, FTP, E- mail, Faxing, Remote Access, DHCP, DNS and WINS.

More information

Payment Card Industry (PCI) Data Security Standard

Payment Card Industry (PCI) Data Security Standard Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire Version 1.0 Release: December 2004 How to Complete the Questionnaire The questionnaire is divided into six sections. Each

More information

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N CompTIA Network+ (Exam N10-007) Course Description: CompTIA Network+ is the first certification IT professionals specializing in network administration and support should earn. Network+ is aimed at IT

More information

Physical and Environmental Security Standards

Physical and Environmental Security Standards Physical and Environmental Security Standards Table of Contents 1. SECURE AREAS... 2 1.1 PHYSICAL SECURITY PERIMETER... 2 1.2 PHYSICAL ENTRY CONTROLS... 3 1.3 SECURING OFFICES, ROOMS AND FACILITIES...

More information

AXIS Camera Station S20 Appliance Series AXIS Camera Station S2008 Appliance AXIS Camera Station S2016 Appliance AXIS Camera Station S2024 Appliance

AXIS Camera Station S20 Appliance Series AXIS Camera Station S2008 Appliance AXIS Camera Station S2016 Appliance AXIS Camera Station S2024 Appliance AXIS Camera Station S2008 Appliance AXIS Camera Station S2016 Appliance AXIS Camera Station S2024 Appliance User Manual Table of Contents About the AXIS Camera Station S20 Appliance Series.............

More information

Level 3 Certificate in Cloud Services (for the Level 3 Infrastructure Technician Apprenticeship) Cloud Services

Level 3 Certificate in Cloud Services (for the Level 3 Infrastructure Technician Apprenticeship) Cloud Services 9628-08 Level 3 Certificate in Cloud Services (for the Level 3 Infrastructure Technician Apprenticeship) 9628-808 Cloud Services Sample question paper Duration: 60 minutes Candidate s name: Candidate s

More information

The Lighthouse Case Management System

The Lighthouse Case Management System The Lighthouse Case Management System Get everything you need to track hotline reports from beginning to end in one easy-to-use online tool! For most organizations, keeping track of hotline reports can

More information

Cyber Essentials Questionnaire Guidance

Cyber Essentials Questionnaire Guidance Cyber Essentials Questionnaire Guidance Introduction This document has been produced to help companies write a response to each of the questions and therefore provide a good commentary for the controls

More information

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

CompTIA A+ Accelerated course for & exams

CompTIA A+ Accelerated course for & exams CompTIA A+ Accelerated course for 220-901 & 220-902 exams Course overview Target Audience This course is for Participants wishing to take and pass both CompTIA A+ exams (220-901 and 220-902) exam. It is

More information

Inventory and Reporting Security Q&A

Inventory and Reporting Security Q&A Inventory and Reporting Security Q&A General Q. What is Inventory Reporting, Collection, and Analysis? A. Inventory Reporting, Collection, and Analysis is a tool that discovers, collects, and analyzes

More information

Start the Security Walkthrough

Start the Security Walkthrough Start the Security Walkthrough This guide will help you complete your HIPAA security risk analysis and can additionally be used for periodic review. It is based on the methodology used in PrivaPlan Stat

More information

Site Planning and Installation Guide

Site Planning and Installation Guide 3M Clean-Trace ATP Monitoring System Site Planning and Installation Guide This Site Planning and Installation Guide is intended to provide information to help plan for and execute site installation for

More information

5 Tips to Fortify your Wireless Network

5 Tips to Fortify your Wireless Network Article ID: 5035 5 Tips to Fortify your Wireless Network Objective Although Wi-Fi networks are convenient for you and your employees, there may be unwanted clients using up the bandwidth you pay for. In

More information

Windows Server Security Best Practices

Windows Server Security Best Practices University Information Technology Services Windows Server Security Best Practices Page 1 of 13 Initial Document Created by: 2009 Windows Server Security Best Practices Committee Document Creation Date:

More information

CYBERSECURITY RISK LOWERING CHECKLIST

CYBERSECURITY RISK LOWERING CHECKLIST CYBERSECURITY RISK LOWERING CHECKLIST The risks from cybersecurity attacks, whether external or internal, continue to grow. Leaders must make thoughtful and informed decisions as to the level of risk they

More information

Cyber security tips and self-assessment for business

Cyber security tips and self-assessment for business Cyber security tips and self-assessment for business Last year one in five New Zealand SMEs experienced a cyber-attack, so it s essential to be prepared. Our friends at Deloitte have put together this

More information

ENDNOTE SECURITY OVERVIEW INCLUDING ENDNOTE DESKTOP AND ONLINE

ENDNOTE SECURITY OVERVIEW INCLUDING ENDNOTE DESKTOP AND ONLINE ENDNOTE SECURITY OVERVIEW INCLUDING ENDNOTE DESKTOP AND ONLINE INTRODUCTION In line with commercial industry standards, the data center used by EndNote employs a dedicated security team to protect our

More information

Trust Services Principles and Criteria

Trust Services Principles and Criteria Trust Services Principles and Criteria Security Principle and Criteria The security principle refers to the protection of the system from unauthorized access, both logical and physical. Limiting access

More information

Reviewer s guide. PureMessage for Windows/Exchange Product tour

Reviewer s guide. PureMessage for Windows/Exchange Product tour Reviewer s guide PureMessage for Windows/Exchange Product tour reviewer s guide: sophos nac advanced 2 welcome WELCOME Welcome to the reviewer s guide for NAC Advanced. The guide provides a review of the

More information

Morningstar ByAllAccounts Service Security & Privacy Overview

Morningstar ByAllAccounts Service Security & Privacy Overview Morningstar ByAllAccounts Service Security & Privacy Overview Version 3.8 April 2018 April 2018, Morningstar. All Rights Reserved. 10 State Street, Woburn, MA 01801-6820 USA Tel: +1.781.376.0801 Fax: +1.781.376.8040

More information

Access Control Procedure

Access Control Procedure HIPAA Security Procedure # Last Revised: 3/15/2006 Approved: Scope of Procedure The scope of this Policy covers the unique user identification and password, emergency access, automatic logoff, encryption

More information

Unit 4 Research Project. Eddie S. Jackson. Kaplan University. IT540: Management of Information Security. Kenneth L. Flick, Ph.D.

Unit 4 Research Project. Eddie S. Jackson. Kaplan University. IT540: Management of Information Security. Kenneth L. Flick, Ph.D. Running head: UNIT 4 RESEARCH PROJECT 1 Unit 4 Research Project Eddie S. Jackson Kaplan University IT540: Management of Information Security Kenneth L. Flick, Ph.D. 10/14/2014 UNIT 4 RESEARCH PROJECT 2

More information

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Introduction The Criminal Justice Information Security (CJIS) Policy is a publically accessible document that contains

More information

Why Use Cisco Network Storage Systems for Your Business

Why Use Cisco Network Storage Systems for Your Business Why Use Cisco Network Storage Systems for Your Business Introduction This white paper highlights two new additions to the Cisco Small Business Network Storage System (NSS) line of products. The Cisco NSS2000

More information

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

PASS4TEST. IT Certification Guaranteed, The Easy Way!  We offer free update service for one year PASS4TEST IT Certification Guaranteed, The Easy Way! \ http://www.pass4test.com We offer free update service for one year Exam : GSLC Title : GIAC Security Leadership Certification (GSLC) Vendors : GIAC

More information

PTS Customer Protection Agreement

PTS Customer Protection Agreement PTS Customer Protection Agreement Revised: July 26, 2017 Thank you for choosing as your IT provider. Customer s Network environments with the most success have an in-house Network Administrator or someone

More information

Goodwill. Industries of Lower South Carolina, Inc Technology Plan

Goodwill. Industries of Lower South Carolina, Inc Technology Plan Goodwill Industries of Lower South Carolina, Inc. Published 7/23/2008 Reviewed 8/1/2009 Reviewed Revised 8/31/2010 Reviewed Revised 8/31/2011 Reviewed 12/18/2012 Revised 2013 Technology Plan 1 Goodwill

More information

Virtuoso software Information Technology FAQ

Virtuoso software Information Technology FAQ Virtuoso software Information Technology FAQ 1 Virtuoso software Information Technology FAQ Purpose This document answers frequently asked questions about the VENTANA Virtuoso image and workflow management

More information

CompTIA Security+ E2C (2011 Edition) Exam.

CompTIA Security+ E2C (2011 Edition) Exam. CompTIA JK0-018 CompTIA Security+ E2C (2011 Edition) Exam TYPE: DEMO http://www.examskey.com/jk0-018.html Examskey CompTIA JK0-018 exam demo product is here for you to test the quality of the product.

More information

Hardware and Software Requirements

Hardware and Software Requirements Hardware and Software Requirements WideOrbit s WO Media Sales is a full client-server based sales system. Users run a thick client on a Windows 10*, Windows 8 or Windows 7, which connects directly to a

More information

Telephone Master Socket - Is used to link your house s internal cabling and telephone sockets to the ONT.

Telephone Master Socket - Is used to link your house s internal cabling and telephone sockets to the ONT. Quick Set Up Guide seethelight use fibre to bring you high-speed Internet and telephone services - so we use some equipment that you may not be familiar with. This next section will give you a quick overview

More information

Standard For IIUM Wireless Networking

Standard For IIUM Wireless Networking INTERNATIONAL ISLAMIC UNIVERSITY MALAYSIA (IIUM) Document No : IIUM/ITD/ICTPOL/4.3 Effective Date : 13/11/2008 1.0 OBJECTIVE Standard For IIUM Wireless Networking Chapter : Network Status : APPROVED Version

More information

SECURITY DOCUMENT. 550archi

SECURITY DOCUMENT. 550archi SECURITY DOCUMENT 550archi Documentation for XTM Version 10.3 Published by XTM International Ltd. Copyright XTM International Ltd. All rights reserved. No part of this publication may be reproduced or

More information

TEW-211BRP. Wireless AP Router. User s Manual

TEW-211BRP. Wireless AP Router. User s Manual TEW-211BRP Wireless AP Router User s Manual Version 1.4 - Jan 2002 CONTENTS Introduction...3 Hardware Installation...5 General Wireless AP Router System Connection...6 Wireless AP Router Default Settings

More information

Xceedium Xio Framework: Securing Remote Out-of-band Access

Xceedium Xio Framework: Securing Remote Out-of-band Access Xceedium Xio Framework: Securing Remote Out-of-band Access 1 Common Scenario A major corporation, with many domestic and international offices, has a massive network infrastructure that spans across many

More information

CompTIA E2C Security+ (2008 Edition) Exam Exam.

CompTIA E2C Security+ (2008 Edition) Exam Exam. CompTIA JK0-015 CompTIA E2C Security+ (2008 Edition) Exam Exam TYPE: DEMO http://www.examskey.com/jk0-015.html Examskey CompTIA JK0-015 exam demo product is here for you to test the quality of the product.

More information

Security Principles for Stratos. Part no. 667/UE/31701/004

Security Principles for Stratos. Part no. 667/UE/31701/004 Mobility and Logistics, Traffic Solutions Security Principles for Stratos Part no. THIS DOCUMENT IS ELECTRONICALLY APPROVED AND HELD IN THE SIEMENS DOCUMENT CONTROL TOOL. All PAPER COPIES ARE DEEMED UNCONTROLLED

More information

IT Services IT LOGGING POLICY

IT Services IT LOGGING POLICY IT LOGGING POLICY UoW IT Logging Policy -Restricted- 1 Contents 1. Overview... 3 2. Purpose... 3 3. Scope... 3 4. General Requirements... 3 5. Activities to be logged... 4 6. Formatting, Transmission and

More information

Table of Contents. Course Introduction. Table of Contents Getting Started About This Course About CompTIA Certifications. Module 1 / Server Setup

Table of Contents. Course Introduction. Table of Contents Getting Started About This Course About CompTIA Certifications. Module 1 / Server Setup Table of Contents Course Introduction Table of Contents Getting Started About This Course About CompTIA Certifications Module 1 / Server Setup Module 1 / Unit 1 Servers and Racks Server Hardware and Software

More information

Cloud FastPath: Highly Secure Data Transfer

Cloud FastPath: Highly Secure Data Transfer Cloud FastPath: Highly Secure Data Transfer Tervela helps companies move large volumes of sensitive data safely and securely over network distances great and small. Tervela has been creating high performance

More information

Wireless Printing Updated 10/30/2008 POLICY. The use of Wireless Networking is not permitted at any site for full client/server networking of Taxwise.

Wireless Printing Updated 10/30/2008 POLICY. The use of Wireless Networking is not permitted at any site for full client/server networking of Taxwise. Updated 10/30/2008 POLICY Tax-Aide Wireless Printing Policy The use of Wireless Networking is not permitted at any site for full client/server networking of Taxwise. Wireless networking, for the purpose

More information

The Common Controls Framework BY ADOBE

The Common Controls Framework BY ADOBE The Controls Framework BY ADOBE The following table contains the baseline security subset of control activities (derived from the Controls Framework by Adobe) that apply to Adobe s enterprise offerings.

More information

Information Security in Corporation

Information Security in Corporation Information Security in Corporation System Vulnerability and Abuse Software Vulnerability Commercial software contains flaws that create security vulnerabilities. Hidden bugs (program code defects) Zero

More information

CUNY Graduate Center Information Technology. IT Provisioning for Business Continuity & Disaster Recovery Effective Date: April 6, 2018

CUNY Graduate Center Information Technology. IT Provisioning for Business Continuity & Disaster Recovery Effective Date: April 6, 2018 CUNY Graduate Center Information Technology IT for & Effective Date: April 6, 2018 Introduction Organization Information Technology (IT) is the division of the Graduate Center responsible for voice, video

More information

Green Treatment Center

Green Treatment Center Green Treatment Center IT Strategic Goals and Objectives: 2017-2019 Technology Plan The Department s IT strategies for the next four years are grounded in legislative and regulatory drivers that inform

More information

AUTHORITY FOR ELECTRICITY REGULATION

AUTHORITY FOR ELECTRICITY REGULATION SULTANATE OF OMAN AUTHORITY FOR ELECTRICITY REGULATION SCADA AND DCS CYBER SECURITY STANDARD FIRST EDITION AUGUST 2015 i Contents 1. Introduction... 1 2. Definitions... 1 3. Baseline Mandatory Requirements...

More information

Chapter 16: Advanced Security

Chapter 16: Advanced Security : Advanced Security IT Essentials: PC Hardware and Software v4.0 1 Purpose of this Presentation To provide to instructors an overview of : List of chapter objectives Overview of the chapter contents, including

More information

MCITP CURRICULUM Windows 7

MCITP CURRICULUM Windows 7 MCITP CURRICULUM 70-680 Windows 7 Installing, Upgrading, and Migrating to Windows 7 Describe the key features, editions, and hardware requirements of Windows 7 Perform a clean installation of Windows 7

More information

Hosted Testing and Grading

Hosted Testing and Grading Hosted Testing and Grading Technical White Paper July 2010 www.lexmark.com Lexmark and Lexmark with diamond design are trademarks of Lexmark International, Inc., registered in the United States and/or

More information

a. UTRGV owned, leased or managed computers that fall within the regular UTRGV Computer Security Standard

a. UTRGV owned, leased or managed computers that fall within the regular UTRGV Computer Security Standard Kiosk Security Standard 1. Purpose This standard was created to set minimum requirements for generally shared devices that need to be easily accessible for faculty, staff, students, and the general public,

More information

YOUR QUALITY PARTNER FOR SOFTWARE SOLUTIONS TMA SOLUTIONS

YOUR QUALITY PARTNER FOR SOFTWARE SOLUTIONS TMA SOLUTIONS YOUR QUALITY PARTNER FOR SOFTWARE SOLUTIONS TMA SOLUTIONS Security & Intellectual Property Protection Overview Certified ISO 27001:2013 Meet security requirements from global clients Passed all security

More information

Cyber Criminal Methods & Prevention Techniques. By

Cyber Criminal Methods & Prevention Techniques. By Cyber Criminal Methods & Prevention Techniques By Larry.Boettger@Berbee.com Meeting Agenda Trends Attacker Motives and Methods Areas of Concern Typical Assessment Findings ISO-17799 & NIST Typical Remediation

More information

Server Colocation Standards

Server Colocation Standards Server Colocation Standards 1 Overview The purpose of this document is to communicate the minimum requirements and configuration necessary to colocate a server or other equipment in the datacenter of Duke

More information

7.16 INFORMATION TECHNOLOGY SECURITY

7.16 INFORMATION TECHNOLOGY SECURITY 7.16 INFORMATION TECHNOLOGY SECURITY The superintendent shall be responsible for ensuring the district has the necessary components in place to meet the district s needs and the state s requirements for

More information

User Manual DIR-850L. Wireless AC1200 Dual Band Gigabit Router.

User Manual DIR-850L. Wireless AC1200 Dual Band Gigabit Router. User Manual DIR-850L Wireless AC1200 Dual Band Gigabit Router USER MANUAL: DIR-850L Wireless AC1200 Dual Band Gigabit Router SYSTEM REQUIREMENTS Network Requirements Web-based Configuration Utility Requirements

More information

TWO Internet Set-up Instructions

TWO Internet Set-up Instructions Purpose Of This Document This document describes the items needed, and configuration of those items, for connection of TWO workstations to the Internet. The workstations will also need to be networked

More information

Maher Duessel Not for Profit Training July Agenda

Maher Duessel Not for Profit Training July Agenda Maher Duessel Not for Profit Training July 2018 Agenda Review of ITGCs Review of IT Checklist Other Security Issues Questions 2 1 Review of General Computer Controls 3 ITGC What is that? Information Technology

More information

Standard: Data Center Security

Standard: Data Center Security Standard: Data Center Security Page 1 Executive Summary The university data centers provide for the reliable operation of SJSU s computing systems, computing infrastructure, and communication systems.

More information

Cyber Insurance PROPOSAL FORM. ITOO is an Authorised Financial Services Provider. FSP No

Cyber Insurance PROPOSAL FORM. ITOO is an Authorised Financial Services Provider. FSP No PROPOSAL FORM Cyber Insurance Underwritten by The Hollard Insurance Co. Ltd, an authorised Financial Services Provider www.itoo.co.za @itooexpert ITOO is an Authorised Financial Services Provider. FSP.

More information

AWS continually manages risk and undergoes recurring assessments to ensure compliance with industry standards.

AWS continually manages risk and undergoes recurring assessments to ensure compliance with industry standards. Security Practices Freshservice Security Practices Freshservice is online IT service desk software that allows IT teams of organizations to support their users through email, phone, website and mobile.

More information

Computer to Network Connection

Computer to Network Connection Computer to Network Connection Network Installation Steps Having a clear understanding of all the steps required to physically building a network improves the success of a project. You may need to install

More information

IT540 Unit 4 Assignment. Diane Marxen. Kaplan University

IT540 Unit 4 Assignment. Diane Marxen. Kaplan University IT540 Unit 4 1 IT540 UNIT 4 ASSIGNMENT IT540 Unit 4 Assignment Diane Maren Kaplan University IT540 Unit 4 2 Table of Contents Page Abstract 3 Introduction and Assumptions 4 Part 1 5 Part 2 7 Conclusion

More information

Top 10 ICS Cybersecurity Problems Observed in Critical Infrastructure

Top 10 ICS Cybersecurity Problems Observed in Critical Infrastructure SESSION ID: SBX1-R07 Top 10 ICS Cybersecurity Problems Observed in Critical Infrastructure Bryan Hatton Cyber Security Researcher Idaho National Laboratory In support of DHS ICS-CERT @phaktor 16 Critical

More information

Jaringan Komputer (CCNA-1)

Jaringan Komputer (CCNA-1) Jaringan Komputer (CCNA-1) #2 Configuring a Network Operating System Susmini I. Lestariningati, M.T Introduction (1) Home networks typically interconnect a wide variety of end devices including PCs, laptops,

More information

Network Administration Test 6

Network Administration Test 6 Name: Date: Quiz 6: VPN, RRAS, DHCP, Virus Protection, RAID, Setting up Groups, Print and File Servers, DNS, ICS, Subnetting, Security Policies, Predefined Groups and Adding Administrators to a Windows

More information

Information Services IT Security Policies L. Network Management

Information Services IT Security Policies L. Network Management Information Services IT Security Policies L. Network Management Version 1.1 Last updated: 11th August 2010 Approved by Directorate: 2nd July 2009 Review date: 1st August 2011 Primary owner of security

More information

The following topics explain how to get started configuring Firepower Threat Defense. Table 1: Firepower Device Manager Supported Models

The following topics explain how to get started configuring Firepower Threat Defense. Table 1: Firepower Device Manager Supported Models The following topics explain how to get started configuring Firepower Threat Defense. Is This Guide for You?, page 1 Logging Into the System, page 2 Setting Up the System, page 6 Configuration Basics,

More information

Education Network Security

Education Network Security Education Network Security RECOMMENDATIONS CHECKLIST Learn INSTITUTE Education Network Security Recommendations Checklist This checklist is designed to assist in a quick review of your K-12 district or

More information

Google Cloud Platform: Customer Responsibility Matrix. April 2017

Google Cloud Platform: Customer Responsibility Matrix. April 2017 Google Cloud Platform: Customer Responsibility Matrix April 2017 Introduction 3 Definitions 4 PCI DSS Responsibility Matrix 5 Requirement 1 : Install and Maintain a Firewall Configuration to Protect Cardholder

More information

Cisco Meraki Privacy and Security Practices. List of Technical and Organizational Measures

Cisco Meraki Privacy and Security Practices. List of Technical and Organizational Measures Cisco Meraki Privacy and Security Practices List of Technical and Organizational Measures Introduction Meraki takes a systematic approach to data protection, privacy, and security. We believe a robust

More information

Gigabit SSL VPN Security Router

Gigabit SSL VPN Security Router As Internet becomes essential for business, the crucial solution to prevent your Internet connection from failure is to have more than one connection. PLANET is the ideal to help the SMBs increase the

More information

Attachment 3 (B); Security Exhibit. As of March 29, 2016

Attachment 3 (B); Security Exhibit. As of March 29, 2016 Attachment 3 (B); Security Exhibit As of March 29, 2016 UVA Medical Center (UVaMC) Security Requirements The term System shall mean computer equipment, peripheral equipment, system software, application

More information

Chapter 1 B: Exploring the Network

Chapter 1 B: Exploring the Network Chapter 1 B: Exploring the Network Types of Networks The two most common types of network infrastructures are: Local Area Network (LAN) Wide Area Network (WAN). Other types of networks include: Metropolitan

More information