Consequences of threat or vulnerability to infrastructure

Assignment Help Basic Computer Science
Reference no: EM132380116

In a business environment, controlling who has access to business information and at what level is critical for facilitating day-to-day business operations. The emphasis of Network Access Control (NAC) it to decide who or what has authorized permission to access resources on the network. In a new age of risks, it is important to re-identify access controls.

Scenario: You have been hired as an IT Security Specialist for a company called LOTR Experience. The leadership at LOTR has recently expressed concerns over various possible security issues. They would like you to be "a new set of eyes" and lead the efforts to review their current security protocols. As an expert in this field, your first task involves assessing NAC and providing a high-level assessment to leadership.

Review the following documents: LOTR Organization Chart, LOTR Network Design, and LOTR AD Design.

Write a technical assessment in which you:

Analyze NAC Best Practices and how these can be detrimental to LOTR, outlining goals for the following areas:

Endpoint Security

Direct Login

Remote Access

Determine what type of mechanisms will be used to enforce and monitor NAC controls and the frequency with which these should be implemented.

After assessing the LOTR Network Design, outline five (5) potential issues related to NAC that you see in the network's overall design (high-level overview).

Describe any operational risks that could affect business processes.

Describe the consequences of a threat or vulnerability to the infrastructure.

Recommend network changes that will implement the proper NAC controls.

Use at least three quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date.

The specific course learning outcomes associated with this assignment are:

Examine methods that mitigate risk to an IT infrastructure with confidentiality, integrity, availability, and access controls.

Determine appropriate access controls for information systems within IT infrastructures.

Reference no: EM132380116

Questions Cloud

Who is ultimately responsible for security of information : Who is ultimately responsible for the security of information in an organization? What are the disadvantages of using a VPN instead of a leased line?
Identify potential threats-determine how to mitigate risks : Access control starts first with assessing risks so you can properly identify potential threats and determine how to mitigate those risks.
Evaluate findings in terms of its applicability for client : Evaluate the findings in terms of its applicability or appropriateness for the client in your case study. Determine whether you would use or not use the therapy
Develop behavioral definitions of verbal aggression : Develop behavioral definitions of verbal aggression and physical aggression. What exactly do you mean by aggression-a slap, a kick, a put-down...or what?
Consequences of threat or vulnerability to infrastructure : Describe any operational risks that could affect business processes. Describe the consequences of a threat or vulnerability to the infrastructure.
Quality Management Assignment Questions : Quality Management Questions - What steps might the bank take to leverage its strategic challenges and address its strategic advantages
Point of care technology : Point of Care Technology. How might issues surrounding chosen technology be addressed/solved? Statically significant data or evidence to support your findings.
What are the major perceptual errors : What are the major perceptual errors? Why do they occur? What are some cognitive biases, and what can we do to manage them in the negotiation process?
Write response on Vaccinating Children : Write response on Vaccinating Children. I am on both sides of the fence when it comes to vaccinating children. I have two children of my own, one 12 and other 7

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd