Preview

Nt1310 Unit 6 Paper

Good Essays
Open Document
Open Document
712 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1310 Unit 6 Paper
When looking at security of your network first you must determine what laws and regulations you must abide by. Being a police department do you have information stored in your database that would be considered ePHI from when a inmate was treated then you may fall under HIPAA. Do you take credit card for payment of violations? If so you may be required to protect data under SOX or PCI. You must know what data you have and how you must protect it. Are you required to report to the public or the court if your data is breeched? If so at what level or detail?

When proceeding with a Penetration test you must specifically authorize access to X party for conducting Y testing on your network. You should specifically lay out details of what the test will include and not include. When it will be done. What systems they will attempt to breech, what indicators will be done to prove the breech. This will protect both you and the Pen testing company incase something happens during the test or in the future. If a report showing how exactly they breeched your network was released to an outside party and they
…show more content…
If your HQ is in Indiana but the Internet ingress you are wishing them to attack is location in California and the person doing the work is in New Jersey you may have multiple state laws that need to be taken into account. Just because ingress is in California they may be touching computer at the HQ via the network. Each state may or may not have laws regarding accessing a network via a hack. No matter how you look at it this is a forced entry into a company's network, yes you asked them to do it but they still must abide by laws or ensure that they have proper documentation from you the company in regards to this. This becomes even more of an issue if you or they are located in another

You May Also Find These Documents Helpful

  • Good Essays

    Nt1310 Unit 8.1 Summary

    • 346 Words
    • 2 Pages

    The final device is an Arduino-based ball sorter that uses a two-stage approach to sorting the balls. The device starts by isolating a single ball and measuring its weight. Afterwards, the device categorizes the ball based on the measured weight and deposits it in the appropriate receptacle.…

    • 346 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 4 Test Paper

    • 371 Words
    • 2 Pages

    Types of Cables analyzers all in all, analyzers utilized on premises cabling can be separated into three classifications.…

    • 371 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Therefore I decided to choose just a simple phone for my grandmother, one that is not energy consuming and can go for days without requiring to be charged. So Nokia Torch 1203 came in handy as it has no applications, thus reserves battery. As an old woman she has impairment in hearing so this phone has a loudspeaker, the flashlight would help her if she has to look for something in the dark. It can also vibrate if she can’t hear it ringing. Because my grandmother can hardly read, she just need a simple phone to call and receive calls vise…

    • 791 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    What is the molecular geometry of the red carbon atom in the following compound,f[HCequiv {color{red}C }-CH_{3}f]…

    • 476 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 5 Paper

    • 323 Words
    • 2 Pages

    The Media Access Control (MAC) is one of the sublayers contained in the Data Link Layer (DLL) of the Open Systems Interconnection (OSI) model. The MAC layer provides addressing and channel access control mechanisms, and works to transmit data from one Network Interface Card (NIC) to another across a connected network.…

    • 323 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 6 Paper

    • 368 Words
    • 2 Pages

    The stakeholder involved in this decision is Anne Distagne, the CEO of Linkage Construction, Inc. She was the individual involved in the decision-making process. of falsifying information to not display the significant increase in profit.…

    • 368 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    The NETSTAT utility is a command available on most platforms that enables a user to list the sockets in use on a system. The information returned by the command is only for the local host, and there is no provision for monitoring remote hosts using this utility.…

    • 670 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    (i) No, in a datagram network the routing table cannot contain two same destination addresses, since all of the destination addresses are distinct (unique) in a datagram based network i.e. it’s impossible to have duplicates in a routing table because of the distinctiveness…

    • 573 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 4 Paper

    • 567 Words
    • 3 Pages

    Emails provide stability to the organizations. Emails are the backbone that forms the base for the organization structure. Organization has different department for a different purpose. In order to communicate with the environment. Organizations use MS Outlook for maintaining a healthy communication environment in different departments. Every user mailbox data is stored in on exchange server in the form of edb files. In the presence of certain conditions EDB files of MS Outlook get corrupt and are not accessible.…

    • 567 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 6 Paper

    • 853 Words
    • 4 Pages

    and detailed work strategies, monitoring progress, and determining issues solutions. Finally, organizations should dedicate a team of security analysts directed by the expertise of a Chief information security office (CISO) that reports to the Chief information office (CIO) and provides detailed security information to management for assessment and further expansion opportunities to the security infrastructure. Thus, management and a team of dedicated security experts measure system goals, develop strategies towards a more secure organization environment that prevents risks of any magnitude by safeguarding every corner.…

    • 853 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Looking at the network diagram provided I determined that the user, workstation, LAN, LAN-to-WAN, and system/application domains involved in the company should be redesigned to implement better access controls to provide multi-layered security. The most important access control implementation would be the user domain where the company should put emphasis on training; how to recognize social engineering attacks, how to create strong passwords, and how often they should be changed. The workstation domain should focus security via virus and malware scanning, operating system patching, and other types of application-level firewalls. To achieve a multi-layered security approach in the LAN domain I would recommend using an intrusion detection system (IDS) and an intrusion prevention system (IPS) to prevent unauthorized access. Security for the LAN-to-WAN domain should be implemented through the use of a firewall or DMZ to also prevent unauthorized access into the company’s network.…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 1 Test Paper

    • 381 Words
    • 2 Pages

    1. Create an insert function that will take nodes and add them up in the binary tree.…

    • 381 Words
    • 2 Pages
    Good Essays
  • Good Essays

    My recent conflict was at work, I use an application that allows my clients to forward their web responses directly into our customer relationship management application, it parses information based on keywords. This is generally a simple tool that is usually set up on a one for one basis. One tool per company. However, a particularly large client has multiple web response addresses for different departments. The conflict began when my company changed the tool address on a few clients using a particular server, they informed the clients using this particular server, however because most of our clients just have one tool, this meant that the company with multiple tools only had one address updated. Which meant that for almost a month, one of…

    • 811 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Pt1420 Unit 6 Paper

    • 318 Words
    • 2 Pages

    1. The state of Florida is amongst 16 other states that selects judges through the method “appointment-retention election”. A method in which a proposing group shows names to the governor, who then makes the appointment; appointees need to win a retention vote in the next election. It is not necessarily a good system because the selection is placed in the hands of the judges or attorneys who comprise the nominating committee and the governor, with only a impression of voter input. Reorganizers argue that the plan eliminate judges from politics and saves the electorate the problem of voting on judicial candidates when they know little about their professional qualifications.…

    • 318 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 12

    • 348 Words
    • 2 Pages

    All electrical work from and including motor control centers/panels to and including motors and other electrically operated equipment, which is included in the Specification for Mechanical Work or other work, does not form part of the…

    • 348 Words
    • 2 Pages
    Good Essays

Related Topics