In this document, I will be producing a plan to protect an IT system. As the head of ‘IT Security’ at the company, I will need to develop and implement this
plan to ensure that the running of financial transactions over our software runs efficiently and securely.
Business Requirements
Within this plan, I will cover the following areas of the network: physical security, software-based security and, policies and procedures. By configuring the
following areas I will make sure that the security on the network is robust against hackers and internal misuse. Separate requirements include protecting
credit/debit card information through the use of encryption, HTTPS and SSL security, whilst ensuring it is protected against denial-of-service attacks as this
will make sure the system, software and website are always live and running.
Gantt Chart
November
December
Septembe
February
October
January
August
March
Tasks
April
June
May
July
r
Meeting with Mr Carter to discuss what types of measures should be put in place
Create documentation with business aims and requirements
Look at the methods which could be used in more detail
Write up a GDPR policy (PP)
Implement the GDPR policy (PP)
Setup CCTV, locks on server, switch and server rooms, and biometric systems to access
financial accounts (PS)
Buy and setup backup servers and off-site storage (PS)
Configure cloud storage solutions to include daily, weekly and monthly backups (PS, SB)
Write up an internet, email and network use policy (PP)
Remove ‘reset’ and ‘factory settings’ capabilities from software (PP)
Setup anti-virus and anti-malware software, and configure weekly scans (SB)
Ensure that Windows Defender is turned on and configured correctly (SB)
Check the Firewall monthly to ensure the correct ports are open/closed (SB)
Unit 7: IT Systems Security and Encryption