To ensure that our network software and applications are safe and user friendly we conduct a series of evaluations prior to providing user's access. These evals include vulnerability testing, website audits, security assessments and software testing levels. Some of our security assessments include adherence to our networks handbook, policies, procedures, admin controls as well as our architectural review. Moreover, when evaluating software levels, we conduct unit testing, installation testing, integration testing, regression testing and acceptance testing. Once evaluations have been completed our third-party applications and software access management authentication protocols/procedures and Discretionary Access Controls (DAC) will ensure that the incidence of unauthorized users having access to our copyright protected content.
Administrative Personnel Controls
1. Least privilege
2. Separation of duties for critical & sensitive transactions
3. Rotation of duties for Admin as we wear many hats
4. NDA non-disclosure agreement upon hiring
5. Background check for education & employment history
Our network coverage area includes the Midwest, Southeast & Southcentral regions which currently accounts for 30% of the United States. This map illustrates the establishing of our network that occurred in two main phases according to the provided timeline data tables as follows:
To ensure security of our network our WANs are layered according to the TCP/IP Model is a multilayer protocol that contains 4 layers
Our model ensures that the internet functionality by identifying errors and breaking data into packages to be distributed
UDP is utilized for Internet speed for live streaming, gaming and VoIP
ICMP reports & sends error message as well as diagnoses connectivity issues