Discuss to implement the network security.

Assignment Help Computer Network Security
Reference no: EM13923530

Part 1

Write a ten to fifteen (10-15) page paper in which you analyze and solve the following issues:

Imagine you are a senior systems administrator who has recently been given the task to help improve security of your company's IT infrastructure after a series of network security breaches.

These breaches included someone accessing the network who was not authorized to do so, and authorized users being asked for their passwords by someone who claimed to work in the IT department.

You have also been asked to implement IT troubleshooting best practices to help improve the efficiency of solving IT issues that end users frequently experience.

Your first task is to ensure secure user accounts since most network security breaches have occurred through social engineering means.

1. List and discuss two (2) user authentication policies that you can implement to help improve the network's security.

You have been asked to develop an action plan that you will use to communicate the importance of IT security to all of the company's employees by creating two unique forms of communication material (e.g., detailed email, detailed memo, brochure, electronic presentation, etc.) to help disseminate the security message to company employees.

Approach the communication material from the perspective of the core tasks these employees are responsible for.

2. Create a communication medium that: 1.Caters to all company employees and these employees' core tasks.

3. Approaches this from the perspective of security best practices and awareness from the user perspective.

4. Includes at least four (4) best practice methods.

5. Includes at least two (2) supplemental graphical renderings of best practice methods through the use of Excel, Visio, MS Project, or one of their equivalents such as Open Project, Dia, and OpenOffice (flowcharts, process diagrams, tables, etc.).

Note: The graphically depicted solution is not included in the required page length.

6. Create a communication medium that: 1.Caters to technicians who work in the IT department and these employees' core tasks.

7. Approaches this communication from the perspective of specific technologies the IT technicians can implement to tighten IT security.

8. Includes at least four (4) different Windows 7 technologies, excluding authentication.

You need to present IT troubleshooting best practices to junior systems administrators at an IT department meeting to ensure departmental efficiency with solving issues. You want to present some of these issues from a case scenario perspective.

9. Create and describe (3) scenarios where there is an IT problem that requires troubleshooting.

10 .Describe the steps you would take to handle the situation by modeling them after an effective troubleshooting methodology for each scenario you previously created in Question four (4).

11. Explain the specific IT administration activities required to solve the problems.

18. Use at least three (3) quality resources in this assignment.

Note: Wikipedia and similar Websites do not qualify as quality resources.

Part 2

Develop a three to six (3-6) slide PowerPoint presentation in which you:

19. Illustrate the authentication policies, in which you identified in Part 1 Question 1, by including at least two (2) SmartArt diagrams graphically depicting them.

20. Describe at least two (2) network security breach scenarios that can be prevented by implementing the authentication policies in which you identified in Part 1 Question 1.

21. Include PowerPoint speaker notes that will accompany each slide with five to ten (5-10) sentences and provide more detail about the slide content to be used when presenting this to a group.

 

Reference no: EM13923530

Questions Cloud

What is real underlying asset volatility or foreign currency : What does this mean exactly? From this perspective, what is the real underlying asset: volatility or foreign currency?
Examples of race-based jury nullification : Write a 1,050- to 1,400-word paper in which you address the following: · Summarize the arguments for and against race-based jury nullification·
Beech corporation is a merchandising company : Beech Corporation is a merchandising company that is preparing a master budget for the third quarter of the calendar year.
Track of a customers appliance purchases : The Restaurant Supply Warehouse requires an algorithm which will keep track of a customer's appliance purchases at the Restaurant Supply Warehouse. Customers will not know exactly how many items they will purchase as they browse the store. (Hint: ..
Discuss to implement the network security. : List and discuss two (2) user authentication policies that you can implement to help improve the network's security.
Locate evidenced-based articles : The Assignment will focus solely upon the discipline of nursing with the inclusion of nursing scholarly sources to substantiate the literature review. Locate evidenced-based articles (based on research studies in nursing) that use the concept or d..
Consolidated statements of earnings : What does the Consolidated Statements of Earnings-the income statement-tell you about the company? Why is this statement important? What business decisions could be made using the income statement?
Implement a particular product : In Assignments you will be building up a formal, researched justification report that culminates in a recommendation to implement a particular product, service, or program in your place of employment.
Series of three statements that assign the value : Write a series of three statements that assign the value 40 to the variable HoursWorked, the value 17.50 to the variable HourlyWage, and a statement that multiplies them together and stores the result in the variable GrossPay.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Calculate the crc or fcs for the sender

The pattern or generator is P 1001. Calculate the CRC or FCS for the sender. You must give the details of this calculation.

  Describe best practices in cybersecurity

Describe and apply the 14 areas of common practice in the Department of Homeland Security (DHS) Essential Body of Knowledge. Describe best practices in cybersecurity.

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Experiences with the social networking sites

Your experiences with the social networking sites like Craig list etc etc and Why do you think social networking sites are so popular? In other words, what is their stickiness?

  Explaining wtls does not give message integrity protection

An earlier version of WTLS supported a 40-bit XOR MAC and also supported RC4 stream encryption. Show that this scheme doesn't give message integrity protection.

  Network security

Network Security

  Constructing the parameters of the rsa cryptosystem

The general method for constructing the parameters of the RSA cryptosystem

  Models of cloud computing according to the nist

What are the three models of cloud computing according to the NIST clouding computing reference architecture? List the advantages and disadvantages of each model.

  Reasonable to compute rsa signature on long message

Would it be reasonable to compute an RSA signature on a long message by first finding what the message equals, mod n, and signing that?

  Analyze the fundamentals of pki

Analyze the fundamentals of PKI, and determine the primary ways in which its features and functions could benefit your organization and its information security department.

  Poor cybersecurity policy can disrupt business continuity

Analyze the connection between corporate governance and a company's cybersecurity posture. Provide at least three (3) points to justify whether or not there is an impactful relationship between corporate governance and a company's cybersecurity po..

  Personal information security through public wi-fi

Write paper on Personal information security through public Wi-Fi

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd