Network security analyst for a small accounting firm

Assignment Help Basic Computer Science
Reference no: EM131046530

Assignment

You have been recently hired as a network security analyst for a small accounting firm. The firm is realizing that they need help to secure their network and customer's data. With your background and skills, they are looking to you to provide guidance. In addition to helping them secure their network, they require that you obtain your CompTIA Security+ certification within 60 days of being hired.

In addition to the owner, who serves as the overall business manager, there are about 20 people on staff:

  • 10 accountants
  • 3 administrative support specialists
  • 1 vice president
  • 1 financial manager
  • 2 interns

There is also one IT support technician on staff, who has basic computer hardware and networking knowledge. He has requested that the firm create a website, hosted internally, so that new customers can get information about the firm. This will be important to remember as you complete your final project.

The firm has a simple network. There are currently 20 computers and two multipurpose printers. All computers and printers are connected wirelessly to a NETGEAR MR814 device. This router is connected to a Motorola SB3100 cable modem. Staff e mail accounts are set up through the company's Internet provider. Employees use a combination of Microsoft Outlook and standard web browsers to access their e-mail. The owner is known to use his personal iPad during work hours to check and respond to e mail messages.

Prior to your hiring, they hired a network cabling contractor to run Cat 6 cables from the central wiring closet to all offices and cubicles. They want to move away from using wireless as the primary network connection, but want to keep wireless access for customers coming to the building. The technician who did the wiring mentioned to your supervisor that he should look into setting up a Windows Server domain to manage user access, instead of the current peer-to-peer network. He also recommended that the firm invest in a managed switch and a firewall, and look into having some backups. The internal IT support technician agreed with these recommendations but needs your help to implement them.

You've been asked to assess the current vulnerabilities and provide a recommendation to the firm's owner on how to better secure the network infrastructure. Now that you are aware of the firm's history, your assessment and recommendation should provide specifics about the network security settings that must be implemented and the equipment that must be procured, installed, and configured. The firm's owner has a basic understanding of computing, so it is important that you explain the technical issues in layman's terms.

In this learning demonstration, you will use the TestOut Security Pro to help you understand how to identify and assess network infrastructure and pass the CompTIA Security+ certification. In order to identify your strengths and weaknesses, you will first complete the practice exams that will prepare you for the certification. The practice exam is designed to assess your preparedness for the CompTIA Security+ certification exam.

The learning materials within LabSim will help you understand the different types of vulnerabilities within a network and how to address them. As you step through each set of activities, you will submit a Vulnerabilities Assessment and Recommendation Document in three separate parts.  Use the results of the certification practice exam you took at the beginning of the class to help guide you on which areas within LabSim you should pay closer attention to. You must complete all online labs in LabSim; these are the activities with the computer mouse icon. Some of the other areas in LabSim are optional. You can complete any or all of those if you feel you need to learn more about the topics at hand.

To get started, follow the steps below

Reference no: EM131046530

Questions Cloud

What are the differences in acute and chronic pain : What risk factors does John have for risk of opioid withdrawal during this hospitalization? Is there a stigma connected to being disabled and/or methadone?
What has your group accomplished : Describe how your group has worked this past week. What has your group accomplished? What challenges has your group faced? How has your group overcome the challenges?
Collector approves some of requests : Step 1: a remote data collector publishes sensing tasks to all mobile users (e.g., through smartphones carried by users) in the system. A task contains a task identifier and a task description. Step 2: the mobile users who are interested in a tas..
What are the benefits and challenges of using cds systems : Consider how a clinical decision support system provides evidence-based content to its users. What are the benefits and challenges of using CDS systems? How can this assist nurses in providing evidence-based care to their patients?
Network security analyst for a small accounting firm : You have been recently hired as a network security analyst for a small accounting firm. The firm is realizing that they need help to secure their network and customer's data. With your background and skills, they are looking to you to provide guid..
Analyze and describe the elements of the triple constraint : Analyze and describe the elements of the triple constraint in project management. Summarize how the triple constraint impacted management of an IT project from your experience.
List three methods of contraception : Discuss three actions that a woman can take to maintain her reproductive health. List three methods of contraception and describe the advantages and disadvantages of each.
Processes to select meaningful data : There are three types of DSS decisions: structured, semi-structured and unstructured. These types of decisions are dependent upon the information management, data qualifications and model manipulation needs of the company. Use the assumptions dire..
Define and provide two examples of web technology : What is the ability to protect IP referred to as? What are charts / graphics generally referred to as? Online business is generally referred to as... What is Web Technology? Define and provide two examples of web technology and where is has been imp..

Reviews

Write a Review

 

Basic Computer Science Questions & Answers

  Technology have changed the way managers perform tasks

The four management tasks (planning, organizing, directing, evaluating) existed long before computers. Discuss how the use of computers and technology have changed the way managers perform these tasks.

  Should ibm bet its business on that assumption

Do you agree with IBM researchers' assumption that IT will remain "hard to use, expensive, and labor-intensive, with customers continuing to need help solving business problems" for along time to come?

  What three functions are the most important

DBMS has many functions. What three functions are the most important and why are they most important?

  Elizabeth george

Elizabeth George

  Name two of the computer components and their functions

Use two resources (Wikipedia sources are not permitted) and list each resource used at the end of paper in the reference list section.

  Write a program that uses the brute-force approach

Write a program that uses the brute-force approach to count the number of inversions in the array and write a program that uses the divide-and-conquer technique to count the number of inversion in the array.

  Detail a team building activity that have found effective

Detail a team building activity that you have found effective

  Explain limitations of operations research technique

Describing your selected operations research technique. You must explain the technique, assumptions and limitations of method, the kinds of problems

  Attacks to do a dos attack on web servers

We have studied in class how to use a variety of "slow" attacks to do a DoS attack on Web Servers. These attacks include SlowLoris, RUDY, Slow Reads etc. Perhaps the easiest such attack is SlowLoris. Recall that in this attack, a client sets up a ..

  Writing java program which can develop anagrams

An anagram is a rearrangement of the letters of a word or phrase into a new word or phrase. Some of them can be quite amusing or apt. For example:

  File metadata is stored in the master file table

In NTFS, file metadata is stored in the Master File Table as opposed to the File Allocation Table in FAT systems. There is much richer data available in the MFT, but what is the one thing provided by the MFT and not the FAT that makes it difficult to..

  Java / xml example that utilizes some form of recursion

Java / XML example that utilizes some form of recursion. Include blocks of code and the XML with your example

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd