Describe scenarios where there is an it troubleshooting?

Assignment Help Computer Network Security
Reference no: EM13923430

Part 1

Write a ten to fifteen (10-15) page paper in which you analyze and solve the following issues:

Imagine you are a senior systems administrator who has recently been given the task to help improve security of your company's IT infrastructure after a series of network security breaches.

These breaches included someone accessing the network who was not authorized to do so, and authorized users being asked for their passwords by someone who claimed to work in the IT department.

You have also been asked to implement IT troubleshooting best practices to help improve the efficiency of solving IT issues that end users frequently experience.

Your first task is to ensure secure user accounts since most network security breaches have occurred through social engineering means.

1. List and discuss two

(2) user authentication policies that you can implement to help improve the network's security.

You have been asked to develop an action plan that you will use to communicate the importance of IT security to all of the company's employees by creating two unique forms of communication material (e.g., detailed email, detailed memo, brochure, electronic presentation, etc.) to help disseminate the security message to company employees.

Approach the communication material from the perspective of the core tasks these employees are responsible for.

2. Create a communication medium that: 1.Caters to all company employees and these employees' core tasks.

3. Approaches this from the perspective of security best practices and awareness from the user perspective.

4. Includes at least four (4) best practice methods.

5. Includes at least two (2) supplemental graphical renderings of best practice methods through the use of Excel, Visio, MS

Project, or one of their equivalents such as Open Project, Dia, and OpenOffice (flowcharts, process diagrams, tables, etc.).

Note: The graphically depicted solution is not included in the required page length.

3.Create a communication medium that:

1. Caters to technicians who work in the IT department and these employees' core tasks.

2. Approaches this communication from the perspective of specific technologies the IT technicians can implement to tighten IT security.

3. Includes at least four (4) different Windows 7 technologies, excluding authentication.

You need to present IT troubleshooting best practices to junior systems administrators at an IT department meeting to ensure departmental efficiency with solving issues.

You want to present some of these issues from a case scenario perspective.

4. Create and describe (3) scenarios where there is an IT problem that requires troubleshooting.

5. Describe the steps you would take to handle the situation by modeling them after an effective troubleshooting methodology

for each scenario you previously created in Question four (4).

6. Explain the specific IT administration activities required to solve the problems.

7. Use at least three (3) quality resources in this assignment.

Note: Wikipedia and similar Websites do not qualify as quality resources.

Part 2

Develop a three to six (3-6) slide PowerPoint presentation in which you:

8. Illustrate the authentication policies, in which you identified in Part 1 Question 1, by including at least two (2) SmartArt diagrams graphically depicting them.

9.Describe at least two (2) network security breach scenarios that can be prevented by implementing the authentication policies in which you identified in Part 1 Question 1.

10.Include PowerPoint speaker notes that will accompany each slide with five to ten (5-10) sentences and provide more detail about the slide content to be used when presenting this to a group.

 

Reference no: EM13923430

Questions Cloud

Control the functions of motion detection camera device : My RISC machine automates a motion detection camera by automaticall triggering the record function of the camera when motion is detected.
Capital investment evaluation methods : Select one of the capital investment evaluation methods described in Chapter 10 of your text. Fully explain the capital evaluation method's strengths and weaknesses. Take a position and defend the use of your selected method. Be sure to use at ..
Explain why the market has developed in the given manner : Explain why the market has developed in this manner. What do you think are the most important characteristics for the success of a new futures contract concept?
Manager performance report for the recent monthly period : Home Station is a national home improvement chain with more than 100 stores throughout the country. The manager of each store receives a salary plus a bonus equal to a percent of the store's net income for the reporting period. The following net i..
Describe scenarios where there is an it troubleshooting? : Approaches this communication from the perspective of specific technologies the IT technicians can implement to tighten IT security.
Developments could impact businesses : cloud computing and how do you think its developments could impact businesses
Describe the nature of the basis risk involved in your hedge : If the only available gasoline futures contracts call for the delivery of 42,000 gallons and mature in either two or four months, describe the nature of the basis risk involved in your hedge.
Projects and files for an entire application : Question 1. A(n) _____ is a container that stores the projects and files for an entire application.
Nonvalue-added costs in a doctor office : When comparing various divisions within a company, describe what problems can arise from evaluating divisions that have different accounting methods, as described in Chapter 11 of your text. Cite three examples of accounting methods that could ca..

Reviews

Write a Review

Computer Network Security Questions & Answers

  How to create one overall network

Complete research project, you must do several things - gain sufficient background knowledge to provide a basis for understanding the topic - find sources of information on the topic.

  Research the elements of a multilayered security plan

You need to research the elements of a multilayered security plan and to create a detailed outline. Your outline should indicate one or more general security solutions for each of the seven domains of a typical IT infrastructure

  Summarize the current state of web application security

Summarize the current state of Web application security for your Board of Directors to understand. Determine any common themes that need to be addressed specific to the Web security.

  Nowadays the internet has been very broadly used as a means

nowadays the internet has been very widely used as a means of receiving and processing lots of information which are

  What is the decrypted plaintext

A 1,024-bit message is used to generate a 24-bit hash. On the average, how many other messages could be expected to generate the same hash value? What is the probability that two massages that generate the same 24-bit hash?

  Deliver an it risk assessment case study

Deliver an IT Risk Assessment Case Study in support of a significant technology decision that is to be taken by a fictional company called Aztek that operates in the Australian Financial Services sector.

  Concentrate on the digital signatures and certificate chain

You will concentrate on the digital signatures and certificate chain. Try posting messages signed with your private key and ask your colleagues to verify whether your signature on the message is valid. The message should not be encrypted; that is,..

  Detailed network security recommendations

As the company's subject matter expert/consultant, the CEO wants a 4-6 page report at the end of your assignment. The CEO tells you they will have remote users, so firewall and VPN technologies are needed.

  Denote the des encryption of the plain text

Find another key that also has this property, and explain the structure of the DES key schedule that permit such keys to exist.

  Using vigene table to find key used to encrypt message

You were given the following plaintext and cipertext, and you are needed to find key used by them. plaintext: Using Vigene table, find key used by them to encrypt the message.

  Specific challenges with overlapping of jurisdictions

Identify the specific challenges with overlapping of jurisdictions and propose solution(s) for overcoming these challenges

  What is the difference between authentication and

part 1 review questions what is the difference between authentication and authorization? can a system permit

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd