Plan to provide secure access control methods

Assignment Help Computer Networking
Reference no: EM13753543

ZXY Corporation has relocated to a new building that was wired and set up for a local area network (LAN). The company implemented a client/server-based network in which all printers, folders, and other resources are shared but everyone has access to everything and there is no security outside of the defaults that were in place when the system was set up.

You have been hired to secure ZXY's network and ensure that the company has the highest levels of security to protect against internal and external attacks. In an 8-10 page proposal, include the following items to provide a comprehensive secure environment:

A plan to provide secure access control methods for all user access

A viable password policy, which includes complexity, duration, and history requirements

A cryptography method to ensure vital data is encrypted

A remote access plan to ensure that users who access the network remotely do so in a secure and efficient manner

A thorough plan to protect the network from malware and various types of malicious attacks.

Reference no: EM13753543

Questions Cloud

Write review of poem the life of rodrigo diaz de vivar : The Poem of the Cid looks back at the life of Rodrigo Diaz de Vivar (El Cid) and his exploits beginning around 1090. It thus provides insights into the system of local patronage.
Estimate the demand for combo meals : Specify a linear functional form for the demand for Combination 1 meals, and run a regression to estimate the demand for Combo 1 meals.
The router''s hostname and bri interface : This is Mark's first time configuring routers and switches. Mark thought it was simply a matter of installing them, and they would just work. However, now you are reading a manual on configuring routers and switches. The first thing you notice is ..
What would it cost to replace personal property : What would it cost an insurance company to replace a family's personal property that originally cost $18,000? The replacement costs for the items have increased 15 percent
Plan to provide secure access control methods : A plan to provide secure access control methods for all user access and A viable password policy, which includes complexity, duration, and history requirements
Write a review of article hixson walter red storm rising : Write a review of article Hixson, Walter, "'Red Storm Rising': Tom Clancy Novels and the Cult of National Security," Diplomatic History 17 (Fall 1993): 599-61.
Develop a full contingency plan for the organization : Develop a full contingency plan for the organization. Include all subordinate functions / sub plans, including BIA, IRP, DRP, and BCP efforts
Describe the broad classification of prokaryotic and eukaryo : Describe the broad classification of prokaryotic and eukaryotic genomes, indicating the various types of DNA molecules that are found in each and a detailed description of each of the DNA molecules - Compare prokaryotic DNA with eukaryotic DNA, hig..
Probability chart for values of the eur : Winston has prepared the following probability chart for values of the EUR in the next three months.

Reviews

Write a Review

Computer Networking Questions & Answers

  Wireless access points in your company''s warehouse

As the Project Manager, you have been assigned a project to deploy ten (10) wireless access points in your company's warehouse and break room within the next ninety (90) days. You are free to make assumptions that satisfy the scope of the proje..

  A corporation is in requirement of setting up a new network

a corporation is in need of setting up a new network which requires four subnets of 250 ip addresses which are required

  Quality of service

The ability of a network to deliver predictable results. Quality of Service (QoS) is a major consideration for any new or existing communications implementation.

  Discuss some of the problems nats create for ipsec security

discuss some of the problems nats create for ipsec security. see phifer 2000. can we solve these problems by using

  Design type of lan-windows server network operating system

It has already decided to use the Windows Server 2003 network operating system. What type of LAN will your team design for this company?

  Data Network Identification Code

Discuss the christian concept of trinity and messiah How many digits of the DNIC (Data Network Identification Code) identify the country?  A station in a network forwards incoming packets by placing them on its shortest output queue. What routing al..

  Question 1think about a number of wireless devices nodes

question 1think about a number of wireless devices nodes which are connected to the internet via a single access point

  Problem 1you have four web servers that are serving static

problem 1you have four web servers that are serving static web pages. you want to prevent them from communicating with

  Explain the features of telecommunications networks

assume that you were recently hired by a manufacturing company as a systems administrator trainee. your first

  Explain the features of telecommunications networks

assume that you were recently hired by a manufacturing company as a systems administrator trainee. your first

  Define network diagram data for a small project

Consider Table 6-2, Network Diagram Data for a Small Project. All duration estimates or estimates times are in days, and the network proceeds from Node 1 to Node 9.(Please answer the questions for Chapter 6, number 2 under Exercises, pp 246.)

  Create the technology survey of lans

Create the technology survey of LANs, which means for each LAN determine (or create): Hardware (# of computers, printers, etc.) CPU architecture (Intel, RISC, etc)

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd