Preview

IS4560 Unit 3 Assign 1

Good Essays
Open Document
Open Document
779 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IS4560 Unit 3 Assign 1
The University’s systems and security infrastructure has given the IT analysis team a good start in building a security plan by gathering information about the University’s systems from the network diagram. A security control is any mechanism that you put in place to reduce the risk of compromise of any of the three CIA objectives: confidentiality, integrity, and availability. When you plan your network addressing scheme, consider the following factors:
The type of IP address that you want to use: IPv4 or IPv6
The number of potential systems on your network
The number of systems that are multihued or routers, which require multiple network interface cards (NICs) with their own individual IP addresses
Whether to use private addresses on your network
Whether to have a DHCP server that manages pools of IPv4 addresses
The IP address management (IPAM) solutions streamline the management of the entire
IP address lifecycle. The patented container feature is just one innovation brought to market to allow you to organize your IP address space according to your topology.
Allocate blocks and subnets with a mouse click without trying to calculate binary or hexadecimal subnet allocations. And at the same time, automate DHCP pool creation for allocated subnets as well as DNS forward and reverse domains and resource records. The University can allocate multiple subnets, each with address assignments, pool definitions, DNS domains and resource records. Preventive controls exist to prevent compromise. This statement is true whether the control is administrative, technical or physical. The ultimate purpose for these controls is to stop security breaches before they happen. However, a good security design also prepares for failure, recognizing that prevention will not always work. Therefore, detective controls are also part of a comprehensive security program because they enable you to detect a security breach and to determine how the network was breached. With

You May Also Find These Documents Helpful

  • Better Essays

    Mt435 Unit 3 Assignment

    • 1483 Words
    • 6 Pages

    Russell, R. Taylor, B. (2011). Operations Management: Creating Value along the Supply Chain, 7th Edition. Hoboken, New Jersey: John Wiley and Sons…

    • 1483 Words
    • 6 Pages
    Better Essays
  • Good Essays

    As mentioned before in Section II.B, the typical ISP is split up into multiple functional operators.…

    • 782 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Is3350 Unit 4 Assignment

    • 414 Words
    • 2 Pages

    IT projects are very different from other projects (like construction projects) in almost every aspect from initiating to releasing the project. Because these projects are mostly very diverse in term of cost, size and complexity. They often include a team having members of diverse knowledge, background and skills and the technologies involved are also diverse. A lot of technical teams are involved in developing something that may look acceptable for outsiders.…

    • 414 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Secure service: The main objective of this network is to provide secure administrative computing service to DesignIT. It is designed to be functionally and physically isolated from access by people not employed by DesignIT so as to minimize the risk of unauthorized use.…

    • 768 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    The length of this garden is 16 feet and the width is 3 feet. There are not other answers because 16 and 3 are the only numbers that can both be added to equal 19 and multiplied to equal 48. When solving this problem I wrote down the formulas for perimeter and area. We were given both the perimeter and area, 38 ft and 48 ft. I plugged this into the formula P=38= 2(l+w) then divided 38 by 2 and found that 19= l+w. Then I wrote the formula for area A=48=lxw. Then I found the two numbers that added to be 19 and multiplied to be 48.…

    • 108 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    It230 Unit 3 Assignment 1

    • 5629 Words
    • 23 Pages

    We declare that the this project proposal report or part of it was not a copy of a document done by any organization, university, any other institute or a previous student project group at SLIIT and was not copied from the Internet or other sources.…

    • 5629 Words
    • 23 Pages
    Powerful Essays
  • Powerful Essays

    Besides the basic physical security of a site, the next most important aspect is controlling digital access into and out of the organization’s network. In most cases this means controlling the points of connectivity to the outside world, typically the Internet. Partitioning the boundary between the outside Internet and the internal intranet is a critical security piece. Any services not actually needed should be turned off so that they will not become avenues of attack for security threats. Different systems will have different services running by default.…

    • 1578 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    The Internal Use Only data classification standard of Richman Investments has many different infrastructures domains that are affected via internal use only data classification. More than all others, the three infrastructures that are affected the most are the User Domain, Workstation Domain and the LAN Domain.…

    • 285 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 4 Assignment 4

    • 122 Words
    • 1 Page

    As for deciding on the subnet mask, the largest would be 255.255.252.0 or /23. There are a total of 365 devices, including 352 computers, 7 servers, 4 switches, and 2 routers that need IP addresses. Using a /23 subnet, that would allow for 508 devices, whereas /24 would only allow for 254.…

    • 122 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    The data classification policy is intended to provide a framework for classifying a company’s data based on its level of sensitivity. Data classification entails analyzing the data an organization retains, determining its importance and value, and then assigning it to a category. Data is classified to help determine baselines for security controls in that will be implemented to protect the data.…

    • 288 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Johnson Company provides networking components and services. Today we are using the yellow pages for advertising, which is still useful but outdated. In most businesses today use other methods such as In person by using sale representatives. Mostly all the businesses today use the internet to reach out to customers, either by having a website, social media, sending emails or even newsletters. There are some that use a totally different approach, some of which include video conferencing and text messages. Other companies even push it further by utilizing social media sources such as Facebook, twitter, LinkedIn, Instagram and so many more to promote their company.…

    • 811 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    IS3445 Project Part 4

    • 565 Words
    • 2 Pages

    The security of a web application should become top priority when it comes to ensuring the security of the information that the application contains. When we, as an organization, think of security, we should all think of ways that the attacker would attempt to breach the application in order to gain access to the network, or exploit the vulnerability to his or her own benefits. There are many weaknesses pertaining to web applications, and these weaknesses each have an attack associated with it, with the attacker having his or her own motivation for the attack. The attacker’s motivation deeply depends on the type of attack that has occurred at that time. Listed below is a list of the common weaknesses and attacks associated with e-commerce and social networking applications.…

    • 565 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    NT 1210

    • 401 Words
    • 2 Pages

    IP Subnetting- The process of taking a class A, B, or C IP network and subdividing it into a number of smaller groups of addresses (subnets)…

    • 401 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    College Campus

    • 423 Words
    • 2 Pages

    Numbers of students are expected to be doubled every 4 years. There are 4 departments:…

    • 423 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    it control

    • 2296 Words
    • 10 Pages

    Three other types of controls supplement preventive and detective controls. They are usually described as deterrent, corrective, and recovery. Deterrent controls are intended to discourage individuals from intentionally violating information security policies or procedures. These usually take the form of constraints that make it difficult or undesirable to perform unauthorized activities or threats of consequences that influence a potential intruder to not violate security (e.g., threats ranging from embarrassment to severe punishment).…

    • 2296 Words
    • 10 Pages
    Good Essays

Related Topics