It454 Security Management
IT454 Security ManagementThe GymAlexander NazarioAugust 8, 2016Table of ContentsInformation Security Management        Purpose and Scope        Security Requirements        Perimeter Security        Client and Server Security        Back end Database security        Front-end UNIX or Windows server’s security        Client and Server Authentication        Wireless and Remote Access Security        Symmetrical key and public key encryption        Outline the methods to secure VPN access to the network and the back end databases        Securing the wireless components of the network        Security Configuration Management        References        Information Security ManagementPurpose and ScopeThe Purpose of this plan is to describe how the confidentiality, integrity and availability of information across all five (5) locations of The GYM across the state. The internal control provides a system of check and balances to avoid discrepancies being introduced into the operation of the business. The IT Security measures are intended to protect information assets and preserve the privacy of The GYM employees, clients and suppliers. Inappropriate use exposes risk to include virus to compromise the GYM network

The GYM will open five (5) more locations across the state the next year. The company is composed admin/manager/sales and ten (5) five per location each of them tie up to the main software by their individuals mobile phones to check on schedules and clients. The admin personnel or manager also schedule the sales of memberships, sales of goods and inventory. Once you become a member you can log in to your portal and schedule different types of activities that include group classes, individual classes or tanning bed scheduling. The computers that give access to the admin/ manager that is located in the main office the second computer it for all to use to include members to check their balances, renew or make payments, the main lobby computer is utilized as a POS and check in with both software as web based applications. All access is given by a card that can be replaced if lost, same as entering the rest of the facilities if you leave your card you can also enter your pin number to enter and exit the premises.

Get Your Essay

Cite this page

2016Table Of Contentsinformation Security Management        Purpose And Remote Access Security        Symmetrical. (June 27, 2021). Retrieved from https://www.freeessays.education/2016table-of-contentsinformation-security-management-purpose-and-remote-access-security-symmetrical-essay/