List and discuss two user authentication policies

Assignment Help Computer Network Security
Reference no: EM131320607

Technical Paper Project: Disseminating Organizational IT Security and Troubleshooting Best

Practices

Part 1

Write a ten to fifteen page paper in which you analyze and solve the following issues:

Imagine you are a senior systems administrator who has recently been given the task to help improve security of your company's IT infrastructure after a series of network security breaches. These breaches included someone accessing the network who was not authorized to do so, and authorized users being asked for their passwords by someone who claimed to work in the IT department.

You have also been asked to implement IT troubleshooting best practices to help improve the efficiency of solving IT issues that end users frequently experience. Your first task is to ensure secure user accounts since most network security breaches have occurred through social engineering means.

1. List and discuss two user authentication policies that you can implement to help improve the network's security.

You have been asked to develop an action plan that you will use to communicate the importance of IT security to all of the company's employees by creating two unique forms of communication material (e.g., detailed email, detailed memo, brochure, electronic presentation, etc.) to help disseminate the security message to company employees. Approach the communication material from the perspective of the core tasks these employees are responsible for.

2. Create a communication medium that:

a. Caters to all company employees and these employees' core tasks.

b. Approaches this from the perspective of security best practices and awareness from the user perspective.

c. Includes at least four best practice methods.

d. Includes at least two supplemental graphical renderings of best practice methods through the use of Excel, Visio, MS Project, or one of their equivalents such as Open Project, Dia, and OpenOffice (flowcharts, process diagrams, tables, etc.). Note: The graphically depicted solution is not included in the required page length.

3. Create a communication medium that:

a. Caters to technicians who work in the IT department and these employees' core tasks.

b. Approaches this communication from the perspective of specific technologies the IT technicians can implement to tighten IT security.

c. Includes at least four different Windows 7 technologies, excluding authentication.

You need to present IT troubleshooting best practices to junior systems administrators at an IT department meeting to ensure departmental efficiency with solving issues. You want to present some of these issues from a case scenario perspective.

4. Create and describe scenarios where there is an IT problem that requires troubleshooting.

5. Describe the steps you would take to handle the situation by modeling them after an effective troubleshooting methodology for each scenario you previously created in Question four.

6. Explain the specific IT administration activities required to solve the problems.

Develop a three to six slide PowerPoint presentation in which you:

8. Illustrate the authentication policies, in which you identified in Part 1 Question 1, by including at least two SmartArt diagrams graphically depicting them.

9. Describe at least two network security breach scenarios that can be prevented by implementing the authentication policies in which you identified in Part 1 Question 1.

10. Include PowerPoint speaker notes that will accompany each slide with five to ten sentences and provide more detail about the slide content to be used when presenting this to a group.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions.

Reference no: EM131320607

Questions Cloud

Explain the training and hrd process model adie : Write a paper on the given topic:- The topic is: Explain the Training and HRD process Model ADIE.
What is the macaulay duration and the modified duration : You find a bond with 26 years until maturity that has a coupon rate of 10 percent and a yield to maturity of 12 percent. What is the Macaulay duration? The modified duration?
Analyze a particular social problem or issue : The main objective of this project is to provide students with an opportunity to analyze a particular social problem or issue of their choice from a specified theoretical framework
Depreciated straight-line to zero : Down Under Boomerang, Inc., is considering a new three-year expansion project that requires an initial fixed asset investment of $2.61 million. The fixed asset will be depreciated straight-line to zero over its three-year tax life, after which time i..
List and discuss two user authentication policies : List and discuss two user authentication policies that you can implement to help improve the network's security. Caters to all company employees and these employees' core tasks.
Different types of promotion techniques marketers : What is promotion mix? What are the different types of promotion techniques marketers can use? Describe each of them in your own words and give example of each.
Explain why the other two composers were ultimately : Identify three examples of 19th century Impressionist painting or sculpture and three Post-Impressionist works. Explain how the six pieces of art fall into these two styles.In a memo, describe the appearance of your six choices to your CEO so he o..
Different elements-components of the model : Describe the communication process model - what are the different elements/components of the model, describe the processes involved. What is coding and decoding process? Explain it is important for communication participants to understand each oth..
Describing your personal perception of policy-making : Write a 700- to 1,050-word paper, describing your personal perception of policy-making in criminal justice. Identify any assumptions on which your perceptions are based. Be sure to answer the following questions: How would you describe policy-makin..

Reviews

Write a Review

Computer Network Security Questions & Answers

  Examine the different levels of security

Examine the different levels of security and how an organization can provide the proper level of effort to meet each information security need and how this relates to what is in an organization's information security policy

  Describes the characteristics and motivations of the threat

Describes the characteristics and motivations of the threat. Details, as much as possible, how the attack progressed through each phase of the Cyber Kill Chain.

  Difference between a dns resolver and a dns root server

COIT12206 TCP/IP Principles and Protocols - What is partially qualified domain name (PDQN), and what assumption is made by a DNS resolver when processing it and explain the difference between a DNS resolver and a DNS root server.

  Classification of different types of network attacks

Describe and discuss how it works, which computer security principles the attack is against, and what are the possible countermeasures that could be put in place.

  What a great definition of cryptography

Timothy, what a great definition, cryptography is the science of decoding information with a key and like Timothy stated, these keys are both "public (lock) and private (unlock)."

  Network in a gsm system

Consider two mobiles belonging to the same home network in a GSM system. Explain step by step the process in GSM roaming, when one mobile wakes up in a foreign network and makes a call to the other.

  What is the decrypted plaintext

A 1,024-bit message is used to generate a 24-bit hash. On the average, how many other messages could be expected to generate the same hash value? What is the probability that two massages that generate the same 24-bit hash?

  Describe the process used in restoring the scrambled bits

Describe the process used in restoring the scrambled bits and determine the legal and ethical considerations for investigating and prosecuting digital crimesanalyse data.

  Best practices for securing the laptops and tablets

Describe one (1) approach that IT could use in order to ensure that they thoroughly test business critical applications. Describe three (3) best practices for securing the laptops and tablets for the sales staff after the upgrade is complete

  Define the repository usernames and passwords

Install the distributed revision control system subversion from the Debian package of the same name. After installation you will need to configure subversion to be usable.

  Identify the three different kinds of access control

Identify the three different kinds of access control, which one most resembles a Windows OS environment, military. What are the three authentication factors. Provide an example for each one.

  Information systems security

You are the Information Security Officer for a small pharmacy did Has recently been opened in the local shopping mall. The daily operational of a pharmacy is a unique business requires a combination of did Both physical and logical access controls..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd