Preview

Is3230 Unit 10 Assignment 1

Satisfactory Essays
Open Document
Open Document
550 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Is3230 Unit 10 Assignment 1
Unit 10 Assignment 1
Tony Stark
ITT Technical Institute
Access Control
IS3230
Katie Lech
February 26, 2015
Unit 10 Assignment 1
In this scenario, the fitness club was hacked from an unknown source. The fitness club has contracted Malcom Testing Solutions to do penetration tests and find any vulnerabilities along with make some security changes to prevent this issue from happening again. The security policies need to be changed as far as account management.
For starters, the security policies for account management need to be updated. The user’s password needs to changed every 90 days. Any employee that has remote access should have a token key on a USB drive that provides the user’s credentials. When an employee retires, quits, or gets fired, they accounts should be locked until IT administrators can go through the account.
…show more content…
Penetration testing should be done to test the network for vulnerabilities. There are several types of penetration testing. “An automated port based scan is generally one of the first steps in a traditional penetration test because it helps obtain a basic overview of what may be available on the target network or host. Port based scanners check to determine whether a port on a remote host is able to receive a connection. Generally, this will involve the protocols which utilize IP (such as TCP, UDP, ICMP, etc.), However, ports on other network protocols could be present as well dependent on the environment (for example, it’s quite common in large mainframe environments for SNA to be in use). Typically, a port can have one of two possible states: open – the port is able to receive data and closed – the port is not able to receive data. A service based vulnerability scanner is one which utilizes specific protocols to communicate with open ports on a remote host, to determine

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Jennifer’s full time position as Sales would need Sales access for her primary position. She should only have By Position access to Accounts Payable when she is working that position. She would need Read Only for Shipping and Receiving in order provide customers with information on inventory availability. Neither of her positions should have required her to have full access to Shipping and Receiving.…

    • 252 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NT1310 Unit 1 Assignment 1

    • 4837 Words
    • 20 Pages

    In order to get some statistical data about the number of formula 1 crashes and their causes, we randomly picked up 1 race from each year starting from 1960 up till 2013, then extrapolated results to the respective entire year, and then calculated average numbers. Based on those figures we compiled the table below.…

    • 4837 Words
    • 20 Pages
    Good Essays
  • Satisfactory Essays

    The benefits of creating a Virtual Local Area Network (VLAN) are numerous and include such things as less bandwidth consumption, greater security, and the ability for users to be in different geographical locations while still sharing resources. One plan to segment the network is to divide it into broadcast domains, reducing network congestion and also increasing security. The network will be segmented according to group functions. For instance, the engineering department will have one segment, the call center will have another segment, operations will have another segment, and the marketing department will have another segment.…

    • 426 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Global Limited is a global provider of infrastructure information systems, whose services cater to a wide range of industry sectors. One of Global Limited’s business objectives is information security for their clients. In order to provide their clients with information security, Global Limited has utilized a risk management approach to protect their client’s information.…

    • 515 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Is3350 Unit 4 Assignment

    • 414 Words
    • 2 Pages

    IT projects are very different from other projects (like construction projects) in almost every aspect from initiating to releasing the project. Because these projects are mostly very diverse in term of cost, size and complexity. They often include a team having members of diverse knowledge, background and skills and the technologies involved are also diverse. A lot of technical teams are involved in developing something that may look acceptable for outsiders.…

    • 414 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Nt1330 Unit 3 Assignment 1

    • 2019 Words
    • 9 Pages

    Subnetting IP Addressing • Internet Protocol (IP) • A unique indentifier for a host, or node, on an IP network • 32-bit binary number, usually expressed as 4 “dotted decimal” values. • Each decimal value represents 8 bits, in the range of 0 to 255 Example 140.179.220.200 140 Written in binary form: .179 .220 .200…

    • 2019 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    1. What vulnerabilities exist for this workgroup LAN based on the advisories? List five of them.…

    • 290 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    I can understand your concern with your network security and better securing your information without losing productivity. You can set up your users to have their passwords be changed at a certain time and I would recommend a short amount of time in-between. And also you can have the passwords be in a certain context or to be made a certain way and make sheer that the security levels are high on them so that a hacker has a harder time to get in to the network. I recommend you use the following format; using capital and lower case letters the first letter of their name, their whole last name and their employee number, ex. “JVentura10415867@Domain*%$.Local” if someone tried to hack the account and all that they knew was the person name and the domain name they could not get in because it is very unlikely that they would know that person employee number and if they do then you have a spy in your company. Can also buy better security items to better your network things like smart card, finger print scanners, retinal scanners, and others. But I only recommend these for really sensitive information and only for certain users in your company. I hope that this has helped you in any way and I wish the best of luck to you.…

    • 327 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    The surveys were designed for three different targeted audiences, survey1 for IT professionals in the IT departments of SCT, CAS and DU, survey 2 for all users types such as staff, employees and students of SCT, CAS and DU from all departments and survey 3 designed for Vendors who are providing technologies to SCT, CAS and DU.…

    • 306 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Don’t share or divulge your passwords to anyone. It is risky. Evil minded people could gain access to your accounts with such passwords. Remember that you would be held responsible for anything done through your accounts.…

    • 599 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Week 4 Assignment

    • 815 Words
    • 3 Pages

    Cybercriminals will never stop trying to compromise systems to obtain data. Organizations need to be aware of where they may be open to attacks, how attackers can enter their environment and what to do if (and when) an attack occurs. This test should be done as a surprise attack, since a hacker…

    • 815 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    P6 Operational Issues

    • 665 Words
    • 3 Pages

    Increase security by providing log in and password verification system for each of their employees that need to access their data.…

    • 665 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    The user must enter the correct username and password otherwise they cannot access through the system. The system should reports invalid log in errors. The system shall provide a facility in changing user accounts: Username and Password allowing the users to modify their accounts. The system should report any violation. The system should automatically generate bills and receipt, and other functional reports. The system can also void purchase order and should include search facility on different products information. The system should keep records on every actions that has been made.…

    • 257 Words
    • 2 Pages
    Good Essays
  • Better Essays

    It325 Assignment 7

    • 1251 Words
    • 6 Pages

    Within each process the statements are executed sequentially, but statements from different processes can be interleaved in any order that's consistent with the constraints imposed by the semaphores. When answering the questions below assume that once execution begins, the processes will be allowed to run until all 3 processes are stuck in a wait() statement, at which point execution is halted.…

    • 1251 Words
    • 6 Pages
    Better Essays
  • Better Essays

    The other challenge which the organization’s face in protecting its information is the lack of management, which is the lack of taking liable actions on time. Even if the organization has a good infrastructure which protects them from intruders, but if they fail to take actions…

    • 1226 Words
    • 4 Pages
    Better Essays