Network security analyst for a small accounting firm

Assignment Help Basic Computer Science
Reference no: EM131046530

Assignment

You have been recently hired as a network security analyst for a small accounting firm. The firm is realizing that they need help to secure their network and customer's data. With your background and skills, they are looking to you to provide guidance. In addition to helping them secure their network, they require that you obtain your CompTIA Security+ certification within 60 days of being hired.

In addition to the owner, who serves as the overall business manager, there are about 20 people on staff:

  • 10 accountants
  • 3 administrative support specialists
  • 1 vice president
  • 1 financial manager
  • 2 interns

There is also one IT support technician on staff, who has basic computer hardware and networking knowledge. He has requested that the firm create a website, hosted internally, so that new customers can get information about the firm. This will be important to remember as you complete your final project.

The firm has a simple network. There are currently 20 computers and two multipurpose printers. All computers and printers are connected wirelessly to a NETGEAR MR814 device. This router is connected to a Motorola SB3100 cable modem. Staff e mail accounts are set up through the company's Internet provider. Employees use a combination of Microsoft Outlook and standard web browsers to access their e-mail. The owner is known to use his personal iPad during work hours to check and respond to e mail messages.

Prior to your hiring, they hired a network cabling contractor to run Cat 6 cables from the central wiring closet to all offices and cubicles. They want to move away from using wireless as the primary network connection, but want to keep wireless access for customers coming to the building. The technician who did the wiring mentioned to your supervisor that he should look into setting up a Windows Server domain to manage user access, instead of the current peer-to-peer network. He also recommended that the firm invest in a managed switch and a firewall, and look into having some backups. The internal IT support technician agreed with these recommendations but needs your help to implement them.

You've been asked to assess the current vulnerabilities and provide a recommendation to the firm's owner on how to better secure the network infrastructure. Now that you are aware of the firm's history, your assessment and recommendation should provide specifics about the network security settings that must be implemented and the equipment that must be procured, installed, and configured. The firm's owner has a basic understanding of computing, so it is important that you explain the technical issues in layman's terms.

In this learning demonstration, you will use the TestOut Security Pro to help you understand how to identify and assess network infrastructure and pass the CompTIA Security+ certification. In order to identify your strengths and weaknesses, you will first complete the practice exams that will prepare you for the certification. The practice exam is designed to assess your preparedness for the CompTIA Security+ certification exam.

The learning materials within LabSim will help you understand the different types of vulnerabilities within a network and how to address them. As you step through each set of activities, you will submit a Vulnerabilities Assessment and Recommendation Document in three separate parts.  Use the results of the certification practice exam you took at the beginning of the class to help guide you on which areas within LabSim you should pay closer attention to. You must complete all online labs in LabSim; these are the activities with the computer mouse icon. Some of the other areas in LabSim are optional. You can complete any or all of those if you feel you need to learn more about the topics at hand.

To get started, follow the steps below

Reference no: EM131046530

Questions Cloud

What are the differences in acute and chronic pain : What risk factors does John have for risk of opioid withdrawal during this hospitalization? Is there a stigma connected to being disabled and/or methadone?
What has your group accomplished : Describe how your group has worked this past week. What has your group accomplished? What challenges has your group faced? How has your group overcome the challenges?
Collector approves some of requests : Step 1: a remote data collector publishes sensing tasks to all mobile users (e.g., through smartphones carried by users) in the system. A task contains a task identifier and a task description. Step 2: the mobile users who are interested in a tas..
What are the benefits and challenges of using cds systems : Consider how a clinical decision support system provides evidence-based content to its users. What are the benefits and challenges of using CDS systems? How can this assist nurses in providing evidence-based care to their patients?
Network security analyst for a small accounting firm : You have been recently hired as a network security analyst for a small accounting firm. The firm is realizing that they need help to secure their network and customer's data. With your background and skills, they are looking to you to provide guid..
Analyze and describe the elements of the triple constraint : Analyze and describe the elements of the triple constraint in project management. Summarize how the triple constraint impacted management of an IT project from your experience.
List three methods of contraception : Discuss three actions that a woman can take to maintain her reproductive health. List three methods of contraception and describe the advantages and disadvantages of each.
Processes to select meaningful data : There are three types of DSS decisions: structured, semi-structured and unstructured. These types of decisions are dependent upon the information management, data qualifications and model manipulation needs of the company. Use the assumptions dire..
Define and provide two examples of web technology : What is the ability to protect IP referred to as? What are charts / graphics generally referred to as? Online business is generally referred to as... What is Web Technology? Define and provide two examples of web technology and where is has been imp..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Draw a circuit using only two-input nand gates

Prove this by showing how you can implement the functions of an inverter, and AND gate, and an OR gate just using NAND gates. That is for each function draw a circuit using only two-input NAND gates that implements the operation.

  How much objective function coefficient decreases

Implement the following LP model in a spreadsheet. Use Solver to solver the problem and create a Sensitivity Report. How much can objective function coefficient for variable X2 decrease before changing optimal solution?

  G succeeds then execute goal p else execute goal q

Which one of the following prolog programs correctly implement "if G succeeds then execute goal P else execute goal q ?" (A) if-else (G, P, q) :- !, call(G), call(P). if-else (G, P, q) :- call(q).

  New product development process

Why is it important that a company have a well-defined process for strategically managing its new product development process?

  Why supply-demand-equilibrium price different in short term

Price of product in short-term and long-term also describe why you believe supply, demand, or equilibrium price will be different, if at all, in short-term and long-term.

  Create a web layout which works wonderfully

Functionality Functionality is concerned with how everything actually works. A common design mistake is to create a web layout which works wonderfully for one web page, but not for all of the web pages within a site. The amount of space available ..

  A device or program enabling a user

A device or program enabling a user to communicate with a computer

  Find the standard sop

Find the standard SOP (sum of product) and POS (product of sum) expression of the subsequent Boolean function. F(A,B,C,D) = A(B' + CD') + A'BC'

  Search to terminal nodes

Write a program, to play ?ve-by-?ve tic-tac-toe, where four in a row wins. Can you search to terminal nodes?

  What is the expected number of floors the elevator stops

What is the expected number of floors the elevator stops

  Show your work for the reduction

Find the complement of F(A,B,C) = AB + ( BC' * A) and reduce it. show your work for the reduction using the axioms of boolean algebra. then, implement the simplified expression using AND,OR and NOT gates

  Testing documentation algorithm.

Your assignment files should be zipped into single file named your username.zip, and submitted on blackboard.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd