Provide security suggestions for laptop users

Assignment Help Operating System
Reference no: EM1379577

Andersen & Sons is a huge marketing company with four offices in the Chicago area. Each office has Windows Server 2003, and all servers are in a single domain. One office accommodates the administrative and business department, one is used for market research, and the other two are printing and publishing.

The IT department in Andersen is undergoing major restructuring. In the meantime they have hired you as a consultant to craft their security policies.

What security suggestions do you have for laptop users to securely access network resources, and to secure files on their laptops?

Describe to Andersen & Sons how they might create a security template and some useful settings. What security suggestions do you have to secure communications from Human Resources server to the Payroll server?

Describe to Andersen & Sons might set up auditing.

You are in the role of a consultant. Provide a document fitting for your client. Include all the information that your client will find useful. Regarding laptop security, you should think of it from the perspective of data both on the system and on the network. Access to the network should be from both local and remote locations. Explain the technology thoroughly. Be sure to respond to the questions posed directly. But remember, as in any consulting engagement, the client may not have asked all the questions so make sure you consider the entire project. Include any assumptions that you make with regard to this project. Your document length should be 3-5 pages.

 

Reference no: EM1379577

Questions Cloud

Identify various hardware components and network topologies : VaryNet Corporation wishes to create 4-individual offices across the globe. They wish to be able to connect these offices over the internet, and they want to make sure that each network is available to each other,
Analyze concepts of cryptography : You have been asked through the Training Manager to present a lunch and learn seminar on an area within your field of expertise. You select cryptography.
Explanation of it networks : While there are difficult security concerns in any isolated computing environment, addition of a network in geographically distributed facilities.
Information technology security : Assume you are an independent consultant who specializes in IT security issues. You have been retained through the Designer Distributions corporation, a mid-sized and growing customer goods distribution corporation.
Provide security suggestions for laptop users : Andersen & Sons is a huge marketing company with four offices in the Chicago area. Each office has Windows Server 2003, and all servers are in a single domain.
Solving operating system problem : Assume a time sharing operating system allocated time slices of twenty milliseconds and the machine executed an average of 5000 instructions per microsecond.
Program to compute the signature : Assume Fred sees your RSA signaure on m1 and m2, (i.e., he sees (md1 mod n) and (md2 mod n).
Trends in information management : Assume you have been asked to join with many other IT professionals for an hour on the local cable channel, discussing some of the current trends in information management,
Creating a c language code : Prepare a c code or Modify code to ask user to input five gpas. then the program computes the average of the gpa and prints it to screen.

Reviews

Write a Review

Operating System Questions & Answers

  Benefits of using dns

Jan and Kim have decided that they require creating an Intranet. They intend to implement a Web server for internal use. They realize that they require to implement at least one Domain Name Server server.

  Managing network addressing issues

1st national banks president congratulates you on successfully managing her network's addressing issues. She then shares the data that she's about to make an offer to buy Monroe's other banks, Metropolitan savings.

  Web security threats

Think about the given threats to Web security and explain how each is countered by a particular feature of SSL.

  Determine the rang of usable ip addresses

Determine the rang of usable IP addresses for the following IP subnet also determine the bradcast address for the subnet?

  Discussion on operating systems

In recent computer trend sources, it has been discussed that the OS are likely to become more user friendly, voice driven, stable, and even will repair themselves when required.

  Intermediate level tasks

Intermediate Level Tasks :  Below is a simple program. It creates 2 threads. The first thread keeps printing out X on the screen, and the second thread keeps printing out O on the screen.

  Program to compute the signature

Assume Fred sees your RSA signaure on m1 and m2, (i.e., he sees (md1 mod n) and (md2 mod n).

  Solving hipaa privacy issues

Suppose if we learned anything from Katrina and Joplin, paper records are susceptible to loss en masse. Can you assume having 50,000 paper records blown for miles across Joplin and trying to recreate those records later

  Comparing operating systems

There are several operating systems existing in the market that it is difficult to decide which one is the best. Search the Internet for data on the given operating systems.

  Determine the average seek time of traversed disk

Traversed Disk receives request to access random sector on random track. Suppose head starts at track 0. Determine the average seek time?

  Network security case study

In this case study, you require to construct a network checklist to establish certain process that enable you and other network security specialists to assess a network from different possible threats and vulnerabilities.

  Describe benefits of providing synchronization tool

Slim reader-writer locks favor neither readers nor writers, nor are waiting threads ordered in FIFO queue. Describe benefits of providing such a synchronization tool.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd