Describe basic security concerns

Assignment Help Management Information Sys
Reference no: EM132241124

Assignment

An unsecured network poses risk of internal and external compromises. Users in human resources typically transmit sensitive information across the network. The network should encrypt HR data in transit.

Using the configurations and topology you added to the "WLAN Configuration Design Template" in Week Three, add security and segregate internal traffic.

Secure the network to:

Minimize the risk of intrusions

Identify attempted intrusions

Limit visibility of HR traffic on the network

Modify the "WLAN Configuration Design Template" to include:

Configuration changes to the existing devices

Introduction of other devices required to meet security objectives

Create a 10- to 12-slide PowerPoint® presentation for management to explain from a security standpoint the changes you will make and the reasons for those changes. Include the following in the presentation:

Describe basic security concerns as they relate to wireless networks.

Assess the security vulnerabilities, including active protocols, to the unsecured network.

Describe your selection of devices added to the network and their role in meeting the security needs of the network to include a justification of the WIPS or WIDS and encryption method selection.

Determine how new devices changed the network design and affected configuration settings to include sensors used to monitor the network.

Provide a rationale for all of your choices.

Note: Other applications like Adobe® Spark or Microsoft® Sway® or Mix can be used instead of PowerPoint®. The presentation should be "media-rich," it should include voice-overs, graphics, interaction, and other techniques to create a dynamic multimedia presentation.

Be sure to include supporting images and appropriate backgrounds and styles. All references must be attributed, cited appropriately throughout the document, and adhere to APA guidelines. Images should not be copied unless author permission is obtained or copyright free images are used.

Reference no: EM132241124

Questions Cloud

Write an essay about one major and recent disaster : Write an essay about one major and recent disaster. Illustrate the impact nature can have on humanity and its environment
Explain what policy you are trying to create : Create a new thread. As indicated above, explain how you could use the EMA Workbench software to develop a model to help create a policy for a Smart City.
What type of data marts would you suggest setting up : What type of data marts would you suggest setting up? Make sure you explain who will benefit from the data marts you suggest.
What are protective barriers and what should they entail : What are protective barriers and what should they entail? What mitigation procedures can be used to ensure the resiliency of protective barriers?
Describe basic security concerns : Users in human resources typically transmit sensitive information across the network. The network should encrypt HR data in transit.
Would there be any downsides to these methods : Suppose that your place of employment uses three (3) separate login methods to access different resources on the network.
Briefly describe any four methods of usability testing : Why is it important to understand tradeoffs between usability measures for various kinds of systems?
Distinguish roles of medicare and medicaid managed care plan : Distinguish the roles of Medicare and Medicaid managed care plans in the healthcare delivery system. Assess the similarities and differences between Medicare.
Analyze ethical considerations associated with maintenance : Janice was hired by Dream Massage to be a massage therapist. She is engaged as an independent contractor and, therefore, receives no tax withholding.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Present a detailed proposal of your recommendations

Orange Corporation is a one of the nation's largest manufacturers of mobile phones. They have facilities in San Francisco and Atlanta.

  Discuss about the interviews and questionnaires

A group meeting sometimes is suggested as a useful compromise between interviews and questionnaires.

  Prepare materials for a presentation arguing opposing side

You are required to prepare materials for a presentation arguing the opposing side of the argument that you developed in your case study report. The audience you are aiming this for is senior executives.

  Review of a scholarly article addressing ethics

Review of a scholarly article addressing Ethics and Why it Matters in Negotiation.Reviews should include a synopsis and your opinion of the article.

  Demonstrate knowledge of information systems types

Students will demonstrate their knowledge of information systems types while using this document to communicate the required information.

  Supply-chain managementcross functionalcross organiztional1

supply-chain managementcross functionalcross organiztional1. in what way does the nokia supply chain management

  Description of accounting information system1 what is an

description of accounting information system1. what is an accounting information system? how does it differ from other

  Write a paper about the 10 famous erp disasters

Write a paper about the given topics as follows:10 Famous ERP Disasters, Dustups and Disappointments,The Long, Dismal History of Software Project Failure etc.

  Describe the similarities and differences among social media

Describe the similarities and differences among social media in the US and China. How would you use social media to grow the fast food franchise business in this China?

  Why would change leaders need to align the organizations

why would change leaders need to align the organizations people with the change strategy? would it be easier to just

  Develop skills of dealing with new security trends

Information Security Management (COMP 0400) Analyze the security frameworks challenges, risk and threats and develop skills of dealing with new security trends.

  How the parameters of search and seizure will change

Can you or Mr. Dewberry use a master key to search Jackson's locked desk for digital evidence, after Keith Jackson has left the premises?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd