Top of FormThere are numerous threats to the safety of data and networks. As there is no specific way to avoid all of the incidents that can happen a network, by developing an upbeat security plan that will cover many of the recognized threats data corruption and loss can be reduced. Hardware safety measures start with firewall safeguard of the network. However other physical protection may have restricted access to the network closet as well as smart card access for the sensitive data contained within the network. While all unused ports and cabling within the network will be closed and secured accordingly. The security consulting firm has been awarded a contract to implement a new IT Security Infrastructure to secure the Information Technology data assets of a local government agency. This agency has many remote workers that are in the field and need to connect back to the agency’s system servers. The remote workers use a wireless network infrastructure to connect their electronic pads to servers located within the local government’s facility. The remote workers have needs to access property records, cite zoning violations electronically, and validate building permits. The public demand to expand IT services has grown