Security requirements of the organization
First we will ensure that the system is physically secured. The room that will house the server will be in a secured area with multi-leveled security such as a keypad and additional locks. The room will have an air conditioner to ensure that the system remains cool and secured. Once the routers have been configured and secured, the next thing we will put in place is ACL list. This list would restrict movement and access to files that are not related to the job description. We will create restrictions that will apply to workstations and must have user authentication. Once the authentication is successful, those restrictions are then applied as Registry settings providing an efficient way to mange a large number of computers. This will ensure that the integrity of data and network are secure. A set of permissions will be added to the files for the Teachers, Nurse and the Students restricting only to them what they need to perform their duties. These controls will give permission as to what operations they can perform such as shared files and printers.
The Key Individuals who should have access to your system
One of the key people would be the IT person. He / She will maintain the systems integrity and will take care of all patches and upgrades as required. The other people would be the Head Administrator.
Proposed security policies for your new system
The security policy will introduce what is and is not acceptable use of the schools equipment and its network. There will be in-serviced on the security matters that can bring down the system. The policy will state how social networking can have serious threats to the integrity of the system. Employees will also be made aware that internet usage will be monitored and logged. They will also be made aware that they will be restricted from access to files that are not related to their primary jobs.
Any organization security requirements needed.
Hardening the network by conducting updating software and hardware to ensure the security of the system is an important part of network. Hardening involves an ongoing process of ensuring that all networking software together with the routers are password protected. These routers are updated with the latest vendor supplied patches and fixes. Since most routers and wireless access points provide a remote management interface which can be accessed over the network, it is essential that such devices are protected with strong passwords. There is also a need for a security plan that will ensure that the planned security controls are fully documented. It is the configuration management plan, contingency plan and the incident response plan, Security awareness, a training plan and the regulatory compliance.
Detailed suggestions of software, hardware and other security measures required.
We will use Avast antivirus, firewalls and strong passwords. Avast antivirus has a built in...