Preview

Nt1330 Unit 3 Security Risk Management

Good Essays
Open Document
Open Document
940 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1330 Unit 3 Security Risk Management
The security analyst of the accounting firm suggested that it's a good practice to have a dedicated room for server’s equipment to avoid any damages. This could be quite costly for the small company, however it would make a good investment in order to secure the company's network. The servers would be positioned on a server rack in the designated room with network devices such as modems, switches, routers, firewalls, and the Intrusion Detection System. This room should have restricted access and only authorized personnel must have access to it, by using sophisticated keycard systems and even having additional security procedures such as biometrical readers etc. It was also proposed to get rid of Motorola SB3100 and Net Gear MR814 to increase …show more content…

Another important security feature for routers and switches are the extended access list (ACLs), which is a rule and must be implemented to control/filter the network traffic from the un-trusted networks. “You can use access lists to restrict contents of routing updates or to provide traffic flow control, One of the most important reasons to configure access lists is to provide security for your network.” [2] The switching device which is a layer 2, have several ports, are proposed to shut down all unused ports and use MAC addresses to avoid any access point (AP) placement. In the proposed Gliffy network diagram, an Intrusion Detection System (IDS) is depicted. "An IDS is a special network device that can detect attacks and suspicious activities." [4] It will just detect threats and will not take any action to stop the attack. It will be accounting firm's analyst responsibility to monitor the logs and interpret them correctly for the false and real time

You May Also Find These Documents Helpful

  • Good Essays

    Nt1310 Unit 8.1 Summary

    • 346 Words
    • 2 Pages

    The final device is an Arduino-based ball sorter that uses a two-stage approach to sorting the balls. The device starts by isolating a single ball and measuring its weight. Afterwards, the device categorizes the ball based on the measured weight and deposits it in the appropriate receptacle.…

    • 346 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 4 Case Study

    • 294 Words
    • 2 Pages

    A) Thingamajigs and Things has total assets of $45,000 and $9,000 in liabilities. This gives a current ratio of 5.00:1. Wannabees has total assets of $150,000 and $85,000 in liabilities. This gives a current ratio of 1.76:1. Thingamajigs and Things is more likely to be approved for a loan, because it has a higher current ration. This means that their assets are higher than their liabilities (what they owe), and they are more likely to be able to make payments.…

    • 294 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Check the linearity of the Black Box by connecting the DC Power Supply to the input of the Black Box, and the Multimeter to the output of the Black Box, then change the input voltage regularly and notice the changing in the output voltage of the Black Box.…

    • 237 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    PCA 1. The first PCA was conducted to construct the four categories of citizenship norms by using only data collected in 2004 (Table A11). It included the variables Actasoc, Buypol, HelpUSA, Helpwrld, Milserve, Obeylaws, Othreasn, Paytaxes, Voteelec, and Watchgov. Missing cases were deleted listwise, leaving a total of 1,406 valid cases from a population aged 18 to 89 years and older. The PCA was conducted using ten variables with orthogonal (varimax) rotation. An inspection of the correlation matrix revealed that all variables had at least one correlation coefficient r > .3. The KMO measure was .78, with individual measures exceeding the minimum level .5, confirming sample size adequacy. Furthermore, Bartlett’s test of spherity was statistically significant (p < .05), indicating that the data was suitable for PCA.…

    • 502 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 3 Summary

    • 734 Words
    • 3 Pages

    Although Zigbee implements a wide assortment of security measures, there are still a variety of vulnerabilities and attack methods that can be used. These attacks and how they can be carried out will be described in this Section.…

    • 734 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 4 Case Study

    • 359 Words
    • 2 Pages

    Let’s take an average page fault service time of 25 ms and a memory access time of 100 ns, then the effective access time in ns is effective access time = (1-p)*(100) +p(25 ms)…

    • 359 Words
    • 2 Pages
    Good Essays
  • Better Essays

    It Management Mgt2 Task 3

    • 4060 Words
    • 13 Pages

    Time is a risk for this project on several levels. 173 employees this will be affected as well as their customers. The company has agreed that this is a good move, however, if the process of setting up the equipment, managing the security and providing training goes on too long, then it will start to negatively affect the company over-all. Currently there is concern if the technology will be delivered due to an unforeseen fire, this set back will be costly in time and work. Also, a second part of time being a risk is managing faulty or dying equipment. Home offices will take longer to assess and fix in the long run. IT staff will either have travel to employee’s homes, or employees will be held up having to come into the home office for repairs.…

    • 4060 Words
    • 13 Pages
    Better Essays
  • Satisfactory Essays

    Nt1330 Unit 3

    • 472 Words
    • 2 Pages

    Fill in the blanks in the following table. Then use the table to answer the questions:…

    • 472 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It is normal to have some problems after purchasing a new graphics driver, along with installing other drivers. There are many ways to “fix” this. Because it is not common for new drivers to cause more problems than they solve, and most users prefer to go back to their older version. It may not be his best option but at least this persons computer will function. A lot of these drivers need updating every now and then. You have to open the device manager and erase the driver all together. An easy way to check your stuff is to see if its plugged. Restart the system and let windows 7 detect and install the driver over again. It will cause windows to send more resources to the device and could solve your problem. As for…

    • 215 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    You issued all of the commands required by the lab and you answered all of…

    • 680 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Server Domino has multilevel security. The highest security level can be achieved when you work with Domino server, using Lotus Notes (‘thick’ client). IBM says about seven security levels the following:…

    • 767 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Configuration management documentation is important in any large organization or business, so understanding the types of documentation are important. I am going to go over the various types of documents and schematics you will have to be familiar with. I will try and explain the differences between a wiring schematic, physical network diagram, logical network diagram, policy, procedure, configuration, regulation, acceptable use policy, and the security policy.…

    • 518 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 3 Case Study

    • 685 Words
    • 3 Pages

    What can you do to benefit the server: Starting off, I would take care of the chat for the server so that the environment is family friendly. Later on, I would attempt to deal with more blatant rule breakers such as hackers and or people whom abuse glitches or bugs to take advantage of anything. If anyone breaks the rules with the exception of hackers (instantly taken action against) I will first give them a verbal warning so they know they shouldn't repeat what they just did. If did again, either action or another verbal warning will be issued but the third time will call for immediate action. Considering the timezones, I can catch the more 'blatant' rule breakers whom could be ruining the experiences of players in my timezone where other staff aren't online or…

    • 685 Words
    • 3 Pages
    Good Essays
  • Good Essays

    It is a common sense that systems and networks should be protected from the damage caused by Trojans, viruses, and Worms. Practices that can help to prevent infection include these:…

    • 546 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 3 Business

    • 429 Words
    • 2 Pages

    1. I would like to start a business that advises on and creates commercials and other video based advertising for other smaller businesses. With social media and online-video sharing being as large as it ever has been, less people are watching TV, local shop's commercials are not being seen. I want to help create commercials that will be able to rival larger companies and also advise those shops on what platforms will get them the most exposer to farther their business.…

    • 429 Words
    • 2 Pages
    Satisfactory Essays