List and discuss two user authentication policies

Assignment Help Computer Network Security
Reference no: EM131320607

Technical Paper Project: Disseminating Organizational IT Security and Troubleshooting Best


Part 1

Write a ten to fifteen page paper in which you analyze and solve the following issues:

Imagine you are a senior systems administrator who has recently been given the task to help improve security of your company's IT infrastructure after a series of network security breaches. These breaches included someone accessing the network who was not authorized to do so, and authorized users being asked for their passwords by someone who claimed to work in the IT department.

You have also been asked to implement IT troubleshooting best practices to help improve the efficiency of solving IT issues that end users frequently experience. Your first task is to ensure secure user accounts since most network security breaches have occurred through social engineering means.

1. List and discuss two user authentication policies that you can implement to help improve the network's security.

You have been asked to develop an action plan that you will use to communicate the importance of IT security to all of the company's employees by creating two unique forms of communication material (e.g., detailed email, detailed memo, brochure, electronic presentation, etc.) to help disseminate the security message to company employees. Approach the communication material from the perspective of the core tasks these employees are responsible for.

2. Create a communication medium that:

a. Caters to all company employees and these employees' core tasks.

b. Approaches this from the perspective of security best practices and awareness from the user perspective.

c. Includes at least four best practice methods.

d. Includes at least two supplemental graphical renderings of best practice methods through the use of Excel, Visio, MS Project, or one of their equivalents such as Open Project, Dia, and OpenOffice (flowcharts, process diagrams, tables, etc.). Note: The graphically depicted solution is not included in the required page length.

3. Create a communication medium that:

a. Caters to technicians who work in the IT department and these employees' core tasks.

b. Approaches this communication from the perspective of specific technologies the IT technicians can implement to tighten IT security.

c. Includes at least four different Windows 7 technologies, excluding authentication.

You need to present IT troubleshooting best practices to junior systems administrators at an IT department meeting to ensure departmental efficiency with solving issues. You want to present some of these issues from a case scenario perspective.

4. Create and describe scenarios where there is an IT problem that requires troubleshooting.

5. Describe the steps you would take to handle the situation by modeling them after an effective troubleshooting methodology for each scenario you previously created in Question four.

6. Explain the specific IT administration activities required to solve the problems.

Develop a three to six slide PowerPoint presentation in which you:

8. Illustrate the authentication policies, in which you identified in Part 1 Question 1, by including at least two SmartArt diagrams graphically depicting them.

9. Describe at least two network security breach scenarios that can be prevented by implementing the authentication policies in which you identified in Part 1 Question 1.

10. Include PowerPoint speaker notes that will accompany each slide with five to ten sentences and provide more detail about the slide content to be used when presenting this to a group.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions.

Reference no: EM131320607

Organizations security policies and procedures

Analyze the chosen organization's security policies and procedures, and provide an opinion of whether or not its policies and procedures are strong from an information secur

Establishing compliance of it security controls with us laws

Describe the importance of and method of establishing compliance of IT security controls with U.S. laws and regulations, and how organizations can align their policies and con

Give the security levels top secret-secret and confidential

Give the security levels Top SECRET,SECRET,CONFIDENTIAL, and UNCLASSIFIED (order from highest to lowest), and catergories A, B,C, specify what type of access (read,write,

Development for critical infrastructure protection

Identify the state actors and non-state actors that pose the greatest cyber threat to the United States and justify your selections - describe how the mix of state and non-

Overview of information security fundamentals

This assessment task is based on the following topics discussed in the subject: the overview of Information security fundamentals, security threats, cryptography, malicious

Create a security matrix spreadsheet and security strategy

Create a security matrix spreadsheet and security strategy summary. Include the user roles and matching security rights that would be expected to be created for the Akron si

Define the principle of defense in depth

Define the principle of defense in depth. Give two examples of how the principle might be applied: one describing security measures across multiple layers of security archi

Services to three different types of technologies

Asynchronous Transfer Mode (ATM) offers services to three different types of technologies: Constant Bit Rate (CBR), Unspecified Bit Rate (UBR) and Available Bit Rate (ABR).


Write a Review

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd