Prepare a security checklist for new century

Assignment Help Computer Network Security
Reference no: EM1353352

The new century clinic associates accepted your interface , output, input, and data designs and your recommendation to install a server and 4 personal computers as clients on a local area network. The network will include a tape backup unit and internet access via modem that can exchange data with insurance companies . A high speed laser printer and an impact printer for multipart forms will be accessible by any of the 4 PC's. now you will determine system architecture for the new century systems.

1. You are willing to charge a lower rate for ongoing support services because you designed the system. You want New Century to use a specific procedure for requesting assistance and changes, however, so that you can plan your activities efficiently. Prepare a complete, written procedure for New Century Health Clinic maintenance change requests. Include appropriate forms with your procedure.

2. What could be causing the periodic slowdowns at New Century? If a problem does exist, which performance and workload measures would you monitor to pinpoint the problem?

3. At the end of the systems analysis phase, you studied the economic feasibility of the system and estimated the future costs and benefits. Now that the system is operational, should those costs and benefits be monitored? Why or why not?

4. You decide to prepare a security checklist for New Century. Prepare a list of security issues that the firm should evaluate and monitor. Be sure to organize the items into categories that match the five security levels.

Reference no: EM1353352

Explain benefits of cloud-based office productivity software

IT 200- Explain Benefits of Cloud-based Office Productivity Software. Create a 5-slide presentation to department head or CEO to convince him or her that using a cloud-based

Develop potential controls that the company could use

For each of the three or more malicious attacks and / or threats identified in Assignment 1, develop potential controls that the company could use to mitigate each associate

For a typical network environment

For a typical network environment (that includes an Internet-facing Website, a human resources database and application, and development workstations that contain copyrighted

Explain factors that help to influence our nations focus

Describe three factors that help to influence our nation's focus on natural or man-made disasters. Should FEMA fall under DHS, or should it be its own cabinet level organizati

What are some of the concerns of mobile device users

Microsoft has announced its Surface tablets, due out late this year, at a time when security is a growing concern for users of mobile devices. What are some of the concerns

What is the resulting cipher

What is the resulting cipher - Given your answer, is security of the a!ne cipher with a given modulus m increased if one encryption is followed by a second encryption with a

Improving the security of the current network

The plan includes improving the security of the current network and establishing a secure environment for data exchange between the headquarters (Brisbane) and other offices

Wireless security assessment

How does this toolkit differ from that you would use for an application security assessment, wireless security assessment. You can list other types of related assessments i


Write a Review

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd