Presenter notes section of the presentation

Assignment Help Basic Computer Science
Reference no: EM13922120

As the network administrator for a medium-sized health clinic, you wear many hats in your role. The health clinic recently dismissed a nurse that had been with the clinic for over 10 years. Letting this nurse go is quickly becoming more complicated, since the nurse had access to many files, the computer system, and even building keys. Your supervisor fears that this nurse may retaliate against the clinic.

The staff members at the clinic use the Internet extensively to check patients' insurance and to authorize insurance claims. Shortly after dismissing this nurse, staff members throughout the clinic start to complain that the Internet has become so slow that it is unusable. The clinic uses a network appliance that functions as router, firewall, and wireless network access point. You have noticed that several rules on the firewall that would deny protocols, ports, or IP addresses have been disabled. You suspect that someone may have cracked the password to the firewall to accomplish this. Given that the firewall is remotely accessible, you suspect that the password was cracked without the perpetrator entering the building. The network intrusion detection system (NIDS) currently in place monitors network traffic by means of a sensor. Unfortunately, the NIDS had been slowing down network traffic prior to this most recent incident, so it had been disabled. The initial thought was that someone had re-enabled the NIDS, but that was not the case; it was disabled at the time of the incident.

After further investigation, you discover that the nurse's spouse is a very skilled computer programmer, and you also suspect that the nurse's spouse may have assisted the nurse in sabotaging the clinic's computers. You report your suspicions to your supervisor, who agrees with your conclusions.

You have been asked to evaluate the DoS and intrusion detection system (IDS) security analysis conducted after the recent DoS attack at the clinic. As part of that evaluation, you are to prepare a briefing for the staff at the clinic to help them understand the results of the security analysis, become more aware of the nature of DoS attacks and other network security attacks, and learn how they can help prevent attacks.

For this task you will be expected to follow the incident handling guidelines for DoS attacks as specified in Special Publication 800-61 from the National Institute of Standards and Technology (NIST) titled "Computer Security Incident Handling Guide." The section on incidents/attacks begins on Section 3 "Handling an Incident" (page 21). You can download this publication from the link listed in the web links section.

Task:

A. Create a multimedia presentation (e.g., PowerPoint, Keynote) (suggested length of 12-15 slides) in which you do the following:

Note: The slides in your presentation should include only the main points you wish to make, with more extensive information included in the presenter notes section of the presentation.

1. Discuss the DoS security analysis.

a. Explain how to evaluate a DoS/IDS security analysis in terms that nontechnical personnel would understand. Include the following.

  • Detection and analysis
  • Containment, eradication, and recovery
  • Post-incident recovery

2. Illustrate how all employees can help maintain network security when on the Internet and when using e-mail.

B. Create a memo (suggested length of 1-2 pages) to your supervisor justifying why the clinic should either update the current IDS or acquire and implement a new IDS.

1. Recommend a list of controls to address the security faults mentioned in this scenario.

C. If you use sources, include all in-text citations and references in APA format.

Reference no: EM13922120

Questions Cloud

Calculate operating cash flows of project- firms tax bracket : Laurel’s Lawn Care, Ltd., has a new mower line that can generate revenues of $180,000 per year. Direct production costs are $60,000, and the fixed costs of maintaining the lawn mower factory are $25,000 a year. Calculate the operating cash flows of t..
What is maximum price per share that dunbar should offer : Dunbar LTC, a national nursing home chain is considering purchasing a smaller chain, Eastern Nursing Homes. Dunbar's analysts project that the merger will result in free cash flows to equity holders with a present value of $72.52 million and they ..
Evaluate opportunity costs in the decision making : Missing a hypothetical question on opportunity costs is inconsequential. Managers can destroy significant value if they make mistakes in evaluating opportunity costs in their decision making.
Jesper parnevik plans to contribute : Jesper Parnevik borrowed $96,370 on March 1, 2012. This amount plus accrued interest at 10% compounded semiannually is to be repaid March 1, 2022. To retire this debt, Jesper Parnevik plans to contribute to a debt retirement fund five equal amounts s..
Presenter notes section of the presentation : Note: The slides in your presentation should include only the main points you wish to make, with more extensive information included in the presenter notes section of the presentation.
Explain crummey powers and how they are used : Explain Crummey Powers and how they are used. What is the benefit of such an arrangement? Give some examples.
Calculate a table of interest rates for 5 years : Future value of single sum problem. You put $2,000 in an investment account today which will earn 8% over the next 14 years, what is the future value?
Lease payments and utilities on the production : During its first year of operations, Silverman Company paid $14,000 for direct materials and $19,000 for production workers' wages. Lease payments and utilities on the production facilities amounted to $17,000 while general, selling, and administrati..
Assignment on database management systems : This lab assignment is to practice data modeling of a given user view of an online retail store.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Students and faculty to stay connected as they roam

Imagine that your university uses 802.11b wireless access points and wireless network cards to allow students and faculty to stay connected as they roam the campus.

  Quality of object-oriented language

The quality of a language that allows a programmer to express a computation clearly, correctly, concisely, and quickly is called.

  Discuss how the business requirements drove the system

Discuss how the business requirements drove the system's initial development. Describe the type and basic uses of the system, how the system has helped the organization, and any likely future development plans.

  Analytical skills in analyzing a case scenario

The purpose of this assignment is to promote students analytical skills in analyzing a case scenario and utilizing the given information and resources to design an ER diagram and write SQL script.

  Justification for implementing a database management system

You have been hired as a consultant for a small retail company that sells widgetsonline. The company is interested in learning how to use their data to improve theirbusiness. They have asked you to write a business case (search term business casetemp..

  Write a calculator program that is able to process an input

Write a calculator program that is able to process an input in postfix notation and give the result. You are free to use the built in stack class or create your own ones.

  Why was iris justified in determining who the owner

Why was Iris justified in determining who the owner of the CD was?

  Discuss the backend methods for providing logins

1. Discuss the backend methods for providing logins on a network service running on a Linux/UNIX server.

  Create a summary slide

create a summary slide

  What bit pattern will be in memory cell

What bit patterns will be in registers 0, 1, and 2 when the machine halts? What bit pattern will be in the memory cell at address 30 when the machine halts?

  Write a program that implements a simple spell checker

The program will be tested with two .txt files. One will be random sentences (to be spell checked) and the other will be the dictionary.

  Write a sequence of assembler directives to store

Write a sequence of assembler directives to store the message "Welcome to the robot demonstration!" starting from the memory location $2000.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd