Preview

Nt280 Week 1 Homework

Satisfactory Essays
Open Document
Open Document
359 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt280 Week 1 Homework
1. Violation of a security policy by a user. C. Place employee on probation, review acceptable use policy (AUP) and employee manual, and discuss status during performance reviews.
2. Disgruntled employee sabotage. I. Track and monitor abnormal employee behavior, erratic job performance, and use of IT infrastructure during off-hours. Begin IT access control lockout procedures based on AUP monitoring and compliance.
3. Download of non-business videos using the internet to an employer-owned computer. A. Enable content filtering and antivirus scanning at the entry and exit points of the internet. Enable workstation auto-scans and auto-quarantine for unknown file types.
4. Malware infection of a user’s laptop. L. Use workstation antivirus and malicious code policies, standards, procedures, and guidelines. Enable an automated antivirus protection solution that scans and updates individual workstations with proper protection.
5. Unauthorized physical access to the LAN. N. Make sure wiring closets, data centers, and computer rooms are secure.
Provide no access without proper credentials.
6. LAN server operating system vulnerabilities. F. Define vulnerability window policies, standards, procedures, and guidelines. Conduct LAN domain vulnerability assessments.
7. Download of unknown file types from unknown sources by local users. B. Apply file transfer monitoring, scanning, and alarming for unknown file types and sources.
8. Errors and weaknesses of network router, firewall, and network appliance configuration file. H. Define a strict zero-day vulnerability window definition. Update devices with the security fixes and software patches right away.
9. WAN eavesdropping. M. Use encryption and virtual private network (VPN) tunneling for secure IP communications. 10. WAN Denial of Service or Distributed Denial of service attacks D. Apply filters on exterior

You May Also Find These Documents Helpful

  • Satisfactory Essays

    lower your attack surface, Windows 2008 Server Core would be installed on a group of your servers.…

    • 235 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    MGT2 Task3

    • 5037 Words
    • 21 Pages

    Identify and install the latest security software on all telecommuters' PCs and enforce strict rules for information access including password policy management.…

    • 5037 Words
    • 21 Pages
    Powerful Essays
  • Satisfactory Essays

    NT1230 Unit 1 Lesson 1

    • 208 Words
    • 1 Page

    8. The new Windows 7 feature that renders all of the windows on the desktop transparent when you mouse over the right end of the taskbar is called Aero Peak.…

    • 208 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Nt2580 Project 1

    • 492 Words
    • 2 Pages

    In the workstation domain, we need to make sure that all workstations have antivirus and malware protection installed on them. Laptops and portable devices are very vulnerable to theft…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In the WAN domain, enforce encryption, and VPN tunneling for remote connections. Configure routers, and network firewalls to block Ping requests to reduce chance of Denial of Service attacks. Deployment of…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    A LAN, or local area network, is a group of computers ranging from small to large within a single office or building. Security and access control has to be robust to secure data, applications, and confidential records. Unauthorized access to the network is a massive security risk for the infrastructure. One way to reduce the risk of access is to implement access doors with key cards to only allow authorized personnel. So if there was a breach in security its only limited to select personnel.…

    • 347 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Apply email server and attachment antivirus/malware and email quadrating for unknown file types. Disable for ping, probing, and port scanning on all exterior IP devices. Denying of outbound traffic using source IP addresses. Apply file transfer monitoring, scanning and alarming for unknown file types. Web Surfing should be monitored by filtering out any unknown IP address with trusted cites. Apply domain-name content filtering at the internet entry/access point as well.…

    • 313 Words
    • 2 Pages
    Good Essays
  • Good Essays

    NT2580 Unit 1

    • 578 Words
    • 3 Pages

    A second domain that is affected is the Workstation Domain. The Workstation Domain is where most users connect to the IT infrastructure. A workstation can be a desktop computer, laptop or any device that connects to the network. A role of the workstation domain is that the organization’s staff should have the access necessary to be productive. Some tasks included are configuring hardware, hardening systems, and verifying antivirus files. Threats that are included in the Workstation Domain include Unauthorized access to the workstation, Desktop/laptop computer operating system software vulnerabilities, viruses, and downloading content like photos/music via the Internet. To protect from unauthorized access, enable…

    • 578 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Make sure that I am aware of, and follow, my settings health, safety and security procedures before I start work.…

    • 356 Words
    • 2 Pages
    Good Essays
  • Good Essays

    To secure the network and ensure a degree of protection from external intrusion, the first step is to ensure it is a private network and each host in the different remote locations is part of the private network; this minimizes the intrusion from public networks. Through the use of firewalls in the central computer network enforces authentication of all users in the network thus minimizing internal and external unauthorised access (Stallings, 2007).…

    • 349 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Week3 Hacking

    • 391 Words
    • 2 Pages

    Your employees e-mail file attachments to each other and externally through the organization’s firewall and Internet connection. What security countermeasures can you implement to help mitigate the risk of rogue e-mail attachments and URL web links?…

    • 391 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    homework 1

    • 454 Words
    • 2 Pages

    Place employee on probation, review acceptable use policy (AUP) and employee manual, and discuss status during performance reviews.…

    • 454 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The system should be protected by an Antivirus that could understand the user security needs for offline and online protection. The solution is provided in its most ultimate form by Bitdefender Internet Security. Shielding your system from all sort of unwanted stuff like cyber threats, viruses, and malware; Bitdefender Internet Security is far more than a typical antivirus software available in the market, as it includes an advanced antivirus, enhanced firewall, and exceptional internet security features as well. It bothers the user for only a few clicks and protects the system with the most powerful protection ever experienced.…

    • 822 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Proposal

    • 739 Words
    • 3 Pages

    Oversee security across the entire network from a single location. Enlist a range of customization and reporting features to tweak the system security as you need.…

    • 739 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Report in Love

    • 552 Words
    • 3 Pages

    Install the appropriate antivirus software. The software works by recognizing the code in the virus’s program that is to be executed, and stops it dead. This well-known antivirus software products for the desktop and the enterprise is SENTINEL ANTIVIRUS. Both offer excellent products and services that address a business’s network, the server, and the desktop. Usually the purpose of a virus attack to a business system is to obtain confidential data, such as customer and credit card information. What must an SMB do to protect itself and its clients? Here are a few…

    • 552 Words
    • 3 Pages
    Good Essays