Preview

Security network

Powerful Essays
Open Document
Open Document
9533 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Security network
350CT

Jacob Woodfield

SID: 3098774

350CT Coursework
Part A: Secure Network Design

Introduction
Dear XYZ Ltd.,
My name is Jacob Woodfield and I am writing to you on behalf of Coventry Security Solutions, with whom you recently made contact with to request a security audit of your computer systems.
Firstly, I would like to congratulate you on a very wise choice in deciding to have a security audit take place of your company. Last year 87% of small businesses had a security breach, which is up from
76% in 2012. The median number of these breaches suffered rested at 17 in 2013, which is up from
6 in 2012 (PWC, 2013). This goes to show that cyber-security is becoming increasingly important and with XYZ Ltd making such phenomenal financial improvements, now is the time to take preventative action. Please find attached a detailed report which I have compiled, based on all of the information made available to me. I have made some educated assumptions in regards to some security issues (one such assumption is that it is unlikely that you are using a high enough level of security on your WiFi connections), but the advice in these situations is fairly generic and only serves to reiterate that these security solutions are the most effective option.
I have simplified terminology for the sake of readability in this report. As a result of this, if you have any more specific technical queries regarding this report, please don 't hesitate to contact me via email at jwoodfield91@gmail.com. I aim to reply to all emails within 24 hours, but this might take longer depending on the level of detail required for your response.
Thank you for choosing Coventry Security Solutions for this security audit and we hope that you will stick with us for further analysis and security implementation.
Yours Sincerely,
Jacob Woodfield,
Senior Security Consultant

1

350CT

Jacob Woodfield

SID: 3098774

Table of Contents
Contents
Introduction



References: CVE. (2011, August 19). CVE-2011-3192. Retrieved from CVE: http://cve.mitre.org/cgibin/cvename.cgi?name=CVE-2011-3192 e.wiZzl execution: February 11, 2014. Retrieved from Support.microsoft.com: https://support.microsoft.com/kb/2912390 This section of the coursework’s practical activities were achieved in group exercises with Kieran Mitchell (SID: 3833164) and Lauchlan Wyndham-Birch (SID: 3725010).

You May Also Find These Documents Helpful

  • Powerful Essays

    Asa Tut8

    • 2637 Words
    • 11 Pages

    You are an assurance services senior and your client is Antique Collectibles Pty Ltd (AC), a small company that specialises in buying and selling antique Australian-made bush furniture. AC purchases pieces at auction, cleans and repairs them, then sells them to the general public. This is the first year that your firm has conducted AC’s audit.…

    • 2637 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    For any information security audit to be effective, with the intent to prevent or reduce attacks; it is absolutely necessary to be proactive and first create an insider threat program, that reinforces the fundamental purpose of the CIA triad which highlights information confidentiality, and how protection of company assets is most vital to the preservation of authorized restrictions and how information is accessed and disclosed.…

    • 639 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Btm7101 Activity 4

    • 811 Words
    • 4 Pages

    articles were shown and I read several with this one being most closely related to my search:…

    • 811 Words
    • 4 Pages
    Good Essays
  • Good Essays

    should make up the bulk of your report and serve to answer this question. More speci…cally:…

    • 634 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    SAMPLE Security Policy

    • 3395 Words
    • 13 Pages

    It will be prudent to take time to thoroughly review these proposed security policies that will explain exactly what being articulated in the previous paragraphs. I assure you, that with the outlined proposed security policies, our infrastructure will continue to function as a “guidance so that the organization can continue” to GDI’s…

    • 3395 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    Physical Security

    • 272 Words
    • 2 Pages

    This paper is to outline Riordan Manufacturing’s existing Information Security Systems, determine their weaknesses, and develop solutions to those weaknesses by addressing security issues in the areas of physical, network, data, and the web.…

    • 272 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    abuse assessment hnc

    • 3141 Words
    • 12 Pages

    This is an excellent report but there are some places where you have not included all the information. Please add the details that I’ve requested. I couldn’t see Appendix A.…

    • 3141 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    Cystic Fibrosis

    • 418 Words
    • 2 Pages

    Also from the same article by March and Schub, I have pulled some facts and…

    • 418 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Dell CSR Company Profile

    • 20928 Words
    • 99 Pages

    investigation to gather further information on all issues cited in the report. Investigation is in…

    • 20928 Words
    • 99 Pages
    Powerful Essays
  • Powerful Essays

    Database Security

    • 7064 Words
    • 29 Pages

    Ponemon, L. (2009). Fourth annual US cost of data breach study. Poneomon Institute sponsored by PGP…

    • 7064 Words
    • 29 Pages
    Powerful Essays
  • Satisfactory Essays

    As authorized by you, I submit an analytical report on the above subject in memo form…

    • 600 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Now I would like to move on to some stastistics. According to the internet crime complaint center also know as the IC3 a partnership with the federal beauro of investigation, the national white collar crime center and the bearo of justice assistance. The percentage of people hacked within the last year has increased 22 from last year.…

    • 521 Words
    • 3 Pages
    Good Essays
  • Good Essays

    We hope that this report will meet your requirement. We would be glad to furnish any further clarification in this regard, if needed.…

    • 5936 Words
    • 24 Pages
    Good Essays
  • Satisfactory Essays

    REPORT MARKETING MIXED

    • 1917 Words
    • 8 Pages

    We are pleased to provide you this report with necessary descriptions and we shall be available…

    • 1917 Words
    • 8 Pages
    Satisfactory Essays

Related Topics