You are on page 1of 3

Sunshine Machine Works Information Systems Use Security Policy By: Desiree Carter

Sunshine Machine Works has recently expanded its infrastructure, now needs to ensure that any authorized employee can access the intranet. The sales people and management staff frequently travel to remote locations, and often require access to the documents that are stored on the intranet file server. There is a concern about how remote access is handled for Sunshine Machine Works. There are three key players in the concern about remote access they are Wilma Stone the Chief Executive Officer, Margie Nelson the Chief Financial Officer and Gary Thomas the General Manager. Wilma is concerned about access to the local network. She doesnt want anything compromised because Sunshine Machine Works has lost proprietary information or have customers data leaked. Margie is concerned that the Sunshine Machine Works account will be broken into and their bank account will be drained. Gary Thomas is concerned about how the information is accessed. He would like the intranet to be accessed over a secure connection rather than be sent on laptops or flash drives that anyone can access.

The layers used in the intranet are the Application level which is the highest level in the OSI model. It is most directly related to the user of the intranet. It provides several application services that include file transfer, resource allocation, and the identification and verification of computer availability. Each time someone sends an email on the intranet they invoke protocols at the application layer of the OSI model. The presentation layer shows the data on the intranet. The encryption and decryption occurs in this layer along with data translation. Sunshine machine works uses a virtual private network so its remote users have access to corporate networks. The remote user connects to the Intranet using their

ISP and starts a connection to the protected network which usually uses a RADIUS server. This creates a private tunnel between the two end points it prevents eavesdropping or the modification of data.

The Sunshine Machine Works virtual private network uses strong cryptography to authenticate senders and receivers of messages to encrypt traffic so its not in a vulnerable state. The Intranet is a virtual private network; its technology makes it possible to establish private tunnels over the Internet which is public. This reduces the cost of the private network connections that a dedicated. Sunshine machine works uses their virtual private network so their employees have remote access to corporate networks. They use a specialized firewall, client and server software to start and maintain the connection and an Internet service provider (ISP) connection for Internet connectivity. IP Security performs both encryption and authentication to address the inherent lack of security on IP-based networks. The design of IP Security supports most of the security goals that are needed by Sunshine machine works which is sender authentication, message integrity and data confidentiality.

The IP Security operates by encapsulating the IP packet with another that surrounds it and then it encrypts the result. IP Security allows the information to be secure without requiring Sunshine Machine Works to modify its user applications. IP Security is designed to operate at the Network Layer of the Transmission Control Protocol and IP this enables the applications that operate at higher layers to enhance the security that the IP Security compliant network already provides. The communications of the Sunshine Machine Works virtual private network can only be deemed secure when it meets three characteristics it has sender authentication to prove that messages originate from their advertised source. It has message integrity to assure that messages arrive intact and unaltered. It has confidentiality to assure that only the intended receiver can successfully read private messages that are

sent. In order to meet these requirements IP Security uses two security mechanisms: authentication header (AH) and Encapsulating Security Protocol (ESP).

Authentication header provides a connectionless data integrity, data authentication, and protection against replay attacks. Encapsulation Security Protocol is used to assure that one or more of these security services including confidentiality in the IP Security tunnel mode, connectionless data integrity, data origin authentication and protection against replay attacks. The Encapsulating Security Protocol operates under the principle of encapsulation and encrypted data is sandwiched between an Encapsulating Security Protocol header and Encapsulating Security Protocol trailer. The Secure Sockets Layer is the most used form of Public Private Key cryptography and it is the standard for transporting private information across the Internet. Users fell safe in Secure Sockets Layer protected sessions. It addresses some of the concerns of transporting confidential data via the Internet. The goal of Secure Socket Layer is to ensure that the privacy of the connection, to authenticate a peers identity, and to establish a reliable transport mechanism for the message using integrity checks and hashing functions. Secure Socket Layer was designed for both client and server applications, to prevent the unwanted tampering of data transmission, whether eavesdropping, data alteration, and message forgery. Its purpose is to ensure the privacy and reliability of communications between two applications. In a secure connection the URL begins with https// and a little pad lock appears on the status bar of the browser. Secure Socket Layer would help Sunshine Machine Systems.

You might also like