Organizational It Security And Troubleshooting Best Practices

Read Complete Research Material



Organizational IT security and Troubleshooting Best Practices

Organizational IT security and Troubleshooting Best Practices

Introduction

Information technology has seen some rapid advancement in the recent eras. These advancements have helped improve the efficiency and performance of the public and private organizations, and other governmental bodies and agencies. With the help of improved IT infrastructure, these entities have been able to better monitor the overall performance of their organization and more specifically their employees with more efficient ways. This has allowed the organizations to increase their productivity, while also help in reducing the overall cost associated with the production, thus allows the organizations to achieve economies of scale (Stewart, 2010).

Though, there are numerous advantages associated with the implementation of advanced technologies, but there also exist certain flaws and disadvantages in the information technology. One of the most important and most common flaws is the issue of security. The IT professionals are still trying to find a better option, which not only helps in improvement of the performance but also tackle the security issues.

The Case Study

The case study involves certain security issues with the infrastructure of the organization. These issues include an intruder trying to access the network of the company, asking the authorized users (organizations employees) to share their passwords. Being a senior systems administrator, I have been assigned a task to help improve the networking system of the organization by implementing some best practices of IT troubleshooting. The entire paper will be discussing and focused on those best practices and how I would lay down an implementation plan.

Current Issues

There are several issues that have been identified in this situation. The core issue is that, there is a series of security breaches in the network of the organization. This lets us identify other issues that are also related to this core problem. These secondary issues are that the intruder, who tried to access the network of the organization, was not an authorized person; he then asked other authorized users of the network to share their log-in details with him. The organization needs to make sure that this breach of security must not happen in the future again, and that it must improve the authentication process of the network. I have to come up with some effective solutions, which are discussed in the coming part of the paper.

Proposed Solutions

The most important area that needs to focused on while improving the security of the infrastructure of the organizations network is the authentication policies an organization implements. Strong authentication policies will help the organization to improve their security concerns.

The plan will include improving the authorization process of the network of organization. For this purpose, certain authentication policies are proposed. These policies include, but are not limited to, Password Aging Policy, Strong Password Policy, Account Aging Policy, and Multi-Factor Authentication Policy.

User Authentication Policies

Password Aging Policy

Firstly, there must be a proper policy of password aging. Through this policy, the organization will be able to take care of those accounts which have not been used for quite a long ...
Related Ads
  • It Security
    www.researchomatic.com...

    These steps can help management ensure that the prop ...

  • Troubleshooting Methodolo...
    www.researchomatic.com...

    Industry Practices for Troubleshooting ... Sy ...

  • Best Practices
    www.researchomatic.com...

    Best Practices, Best Practices Term Papers writing h ...

  • It Security
    www.researchomatic.com...

    Because much of their security relies upon the brevi ...

  • Organizational Security
    www.researchomatic.com...

    Organizational Security, Organizational Security Ess ...