You May Also Find These Documents Helpful
-
Bridges are networking devices that can connect 2 local area networks (LAN). A bridge can learn all of the MAC addresses on the network, and this is done during the bridges data gathering phase. Basically a bridge will receive the data and analyze the address. The bridge will then pass the data on to the correct address. The ports on a bridge are in and out, but they are smart ports with the ability to locate the address on the network.…
- 1249 Words
- 5 Pages
Powerful Essays -
Lock the servers into their own room with keycard or fingerprint access only. Only authorized IT staff shall have access. Management, vendors and all other authorized guest shall be escorted by an authorized IT staff member. Video surveillance should be maintained and monitored at all access…
- 424 Words
- 2 Pages
Satisfactory Essays -
The server roles and features that would be recommended for the company are as follows:…
- 776 Words
- 4 Pages
Good Essays -
There will be 25 employees at the main office and 15 employees at the two new locations. Each employee will have their own workstation at their employed location. Each employee will have their own unique user id and password to log into their workstations. Each employees profile will be set up so they can log into any workstation at all three locations. All the profiles will be connected to a public shared drive that gives all employees access to all documentation under this drive. Each employee will also have a private drive that will give them access to private documentation at any location they may be working at. There are 10 employees that will be traveling to different locations when needed. Although the employees have the capability of logging onto any workstation and/or customer relations workstation at either location; we will also provide laptops and/or tablets connected to the network they will be able to access their profiles…
- 598 Words
- 3 Pages
Good Essays -
You must demonstrate the various methods for using the runas utility to allow administrators to reduce the exposure of administrative accounts.…
- 322 Words
- 2 Pages
Satisfactory Essays -
This multi-layered security plan for Richman Investments will provide a short overview of the security tactics that will be applied at each level of the IT infrastructure.…
- 1234 Words
- 5 Pages
Better Essays -
In order to try and correct the issue of the window of vulnerability (WOV), the LAN administrator needs to get the patch from Microsoft. Upon contact Microsoft has determined that it will take up to no less than three business days for the patch that we requested to be made available to us. Once we receive the patch we would need approximately several hours to download and then test out the patch to be certain that the patch will work and that this is the correct action to take to fix the Window of Vulnerability and seal the security breach on the Server Message Block server. Upon completion of testing the IT staff would need to hold a meeting to assess the quickest and most correct course of action to take after the patch has been installed to determine how to apply the patch apply it to the server and also to client computers depending on the process the IT staff decides to take it can take anywhere from one to three business days for the completion date to be met. If the IT staff were to work around the clock for overtime in shifts and the security breach was reported on a Friday with three days for the patch to be made and a week to troubleshoot and test the patch.…
- 391 Words
- 2 Pages
Satisfactory Essays -
Main Security Concerns: As a rapidly growing business that primarily utilizes IT resources for intranet company communications between and among a single home office and three satellite offices; internal network access controls and remote employee user’s access controls seem to be of primary importance. Priority number one should be hardening and the safeguarding of access and data integrity of the Oracle database servers housed as the main office in Reston, VA. And separately at the San Diego satellite office A comprehensive security policy will be developed and approved by management that will detail the specific guidelines administrators must follow when allowed admin access to company IT resources and services, and when and how those permissions should be denied or allowed. Additionally, auditing and logging of critical events should be implemented utilizing a reliable SEIM (Security Information and Event Management) system. Moreover, control of user access from remote sites via the company intranet via VPN’s and remote access via RADIUS should be strengthened and monitored for both qualitative and quantitate analysis and measuring. Cryptographic techniques will be enhanced and login and password requirements will be strengthened. Of significant importance is the company web presence and corporate access to its knowledge base portal within the company intranet. The company web presence is of vital importance to allow customers to access information concerning the company’s products and services. The knowledge portal is vital for company employees to have access to propriety information while protecting their confidentiality, integrity, and availability of the data. We will separate and hardened both the web server and the knowledge portal via…
- 2606 Words
- 11 Pages
Powerful Essays -
1. Cut-through frame processing by a switch allows the switch to discard frames that fail the FCS check.…
- 1061 Words
- 5 Pages
Satisfactory Essays -
1. What vulnerabilities exist for this workgroup LAN based on the advisories? List five of them.…
- 290 Words
- 1 Page
Satisfactory Essays -
With Google, it’s a little more complicated. There didn't used to be a single locker but now the Big G has taken care of that one with the launch of the Google Drive. You get 5GB of space plus 1GB of Picasa storage for free along with any space in your Docs and Gmail section. There's an apparent maximum storage space on the Google Drive itself up to 100GB but you can rent more space from…
- 581 Words
- 3 Pages
Good Essays -
The Internal Use Only data classification standard of Richman Investments has many different infrastructures domains that are affected via internal use only data classification. More than all others, the three infrastructures that are affected the most are the User Domain, Workstation Domain and the LAN Domain.…
- 285 Words
- 2 Pages
Satisfactory Essays -
One of the security options that we are going to use is Privacy or confidentiality. This will keep all information secret from all people unless you are authorized to see it. This will help with employee’s not finding things that they should not see like social security numbers, address, and sensitive documents for the company and so on. Having this as a security options is great. I would implement this on all of the networks that I would manage.…
- 444 Words
- 2 Pages
Satisfactory Essays -
BitLocker lets you encrypt the hard drive(s) on your Windows 7 and Vista Enterprise, Windows 7 and Vista Ultimate or Windows Server 2008 and R2. BitLocker will not encrypt hard drives for Windows XP, Windows 2000 or Windows 2003. Only Windows 7, Vista and Server 2008 include BitLocker. BitLocker drives can be encrypted with 128 bit or 256 bit encryption, this is plenty strong to protect your data in the event the computer is lost or stolen.…
- 340 Words
- 2 Pages
Good Essays -
In regards to the Internal Use Only data classification field, there are different IT infrastructure domains that can be affected. After researching I have decided that these are at the top of that list: the User Domain, the Workstation Domain, and the LAN Domain. I will identify each domains weaknesses individually.…
- 501 Words
- 3 Pages
Satisfactory Essays