Sign In
Not register? Register Now!
You are here: HomeResearch PaperIT & Computer Science
7 pages/≈1925 words
3 Sources
IT & Computer Science
Research Paper
English (U.S.)
MS Word
Total cost:
$ 39.95

LASA 2 Internal and External Security Planning IT Research Paper (Research Paper Sample)


You are an IT manager for a small business. You are being asked to create a network security plan both for internal IT workers and for the company in general.
You are to put together a network security plan that addresses each of the following components:
Explain the use of virtual private networks (VPNs) and their security benefits and drawbacks.
Create a standard procedure for adding new users to a network.
Create a summary of a network plan, including the use of a firewall, written for a business person with limited knowledge of IT.
Document the uses of an intrusion detection system.
Identify and explain whether workers should be required to report potential security violations and create a policy based on your viewpoints.
Determine the best e-mail policy for an organization and document it for a business owner.
Create a password-change policy for a networking group.
Provide an executive summary briefing for a non-IT manager to review the business implications for the IT policies that you are recommending.


Internal Security Planning For a Small Business
John Q. Student
University Name
Course ID—Course Name
Module x, Assignment x
Instructor Name
Internal Security Planning For a Small Business
Network security is a very important element for the success of any business, small or large. For this reason, business managers need to create network security plans so as to ensure that their information resources are used in an effective manner. In this paper, I profile a network security plan which addresses various information security components of a small business.
The Use of Virtual Private Networks (VPNs) and their Security Benefits and Drawbacks
A VPN (Virtual Private Network) is defined as a private network that extends across a public network. This makes it easy for the users to receive and send information over the public or shared networks (Stewart, 2013). This communication takes place as if the devices that they use were linked to the private network. Putting it simply, a virtual private network creates an encoded system which is secure. This can be likened to a tunnel between a user’s computing device and the VPN service provider. All the applications which operate on across the VPN are highly likely to benefit from the security, working and private network management.
Through Virtual Private Networks, small business employees are able to have a secure access to the intranet that is within their corporations even when they are not in the offices. These types of networks allow workers in physically separate offices to have a secure and cohesive network connection. Private users of the internet are able to secure their virtual transactions using a virtual private network CITATION JMi13 \l 1033 (Stewart, 2013). This is to avoid censorship and geo-restrictions and to link to proxy servers so as to safeguard their personal location and identity. Nevertheless, access to virtual private networks is restricted by some internet sites in an effort to prevent unauthorized access to their networks.

Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • Direct Event Simulation It & Computer Science Research Paper
    Description: Long before the invention of computers, we are tempted to think that our ancestors must have faced a pretty hard time carrying out their daily activities. In the current age we live in, coupled with the internet and almost everyone owning a technology gadget, it is highly unlikely...
    5 pages/≈1375 words| 4 Sources | APA | IT & Computer Science | Research Paper |
  • Security Concerns In Home Automation And The Internet Of Things
    Description: The first device to be connected to the World Wide Web was the Coke Machine by technicians at the Carnegie Mellon University back in the early 1980s. Anyone who desired a drink could, therefore, check the product availability and status of the machine before actually walking towards it (Kennedy, 2014)....
    5 pages/≈1375 words| 16 Sources | APA | IT & Computer Science | Research Paper |
  • Generic Trademark IT & Computer Science Research Paper
    Description: The generic trademark is a term used as words or symbols that communicate the type of product being offered (Johnson, 2019). The terms ‘cellophane’, ‘aspirin’ and ‘thermos’ generic fell into common usage to represent the type of products that oppose certain company’s products...
    1 page/≈550 words| 1 Source | APA | IT & Computer Science | Research Paper |
Need a Custom Essay Written?
First time 15% Discount!