Recently hired as a network security analyst for a small

Assignment Help Management Information Sys
Reference no: EM13998115

NEED HELP COMPLETING THIS ASSIGNMENT PLEASE. I DONT NECESSARILY NEED SOMEONE TO DO IT BUT I NEED SOMEONE TO HELP ME UNDERSTAND WHAT NEEDS TO BE DONE AND DIRECT ME.

You have been recently hired as a network security analyst for a small accounting firm. The firm is realizing that they need help to secure their network and customer's data. With your background and skills, they are looking to you to provide guidance. In addition to helping them secure their network, they require that you obtain your CompTIA Security+ certification within 60 days of being hired.

In addition to the owner, who serves as the overall business manager, there are about 20 people on staff:

? 10 accountants
? 3 administrative support specialists
? 1 vice president
? 1 financial manager
? 2 interns

There is also one IT support technician on staff, who has basic computer hardware and networking knowledge. He has requested that the firm create a website, hosted internally, so that new customers can get information about the firm. This will be important to remember as you complete your final project.

The firm has a simple network. There are currently 20 computers and two multipurpose printers. All computers and printers are connected wirelessly to a NETGEAR MR814 device. This router is connected to a Motorola SB3100 cable modem. Staff e mail accounts are set up through the company's Internet provider. Employees use a combination of Microsoft Outlook and standard web browsers to access their e-mail. The owner is known to use his personal iPad during work hours to check and respond to e mail messages.

Prior to your hiring, they hired a network cabling contractor to run Cat 6 cables from the central wiring closet to all offices and cubicles. They want to move away from using wireless as the primary network connection, but want to keep wireless access for customers coming to the building. The technician who did the wiring mentioned to your supervisor that he should look into setting up a Windows Server domain to manage user access, instead of the current peer-to-peer network. He also recommended that the firm invest in a managed switch and a firewall, and look into having some backups. The internal IT support technician agreed with these recommendations but needs your help to implement them.

You've been asked to assess the current vulnerabilities and provide a recommendation to the firm's owner on how to better secure the network infrastructure. Now that you are aware of the firm's history, your assessment and recommendation should provide specifics about the network security settings that must be implemented and the equipment that must be procured, installed, and configured. The firm's owner has a basic understanding of computing, so it is important that you explain the technical issues in layman's terms.

In this learning demonstration, you will use the Security Pro (LabSim) to help you understand how to identify and assess network infrastructure and pass the CompTIA Security+ certification. In order to identify your strengths and weaknesses, you will first complete the practice exams that will prepare you for the certification. The practice exam is designed to assess your preparedness for the CompTIA Security+ certification exam.

The learning materials within LabSim will help you understand the different types of vulnerabilities within a network and how to address them. As you step through each set of activities, you will also be drafting sections of the assessment and recommendation document. Use the results of the certification practice exam you took at the beginning of the class to help guide you on which areas within LabSim you should pay closer attention to. You must complete all online labs in LabSim; these are the activities with the computer mouse icon. Some of the other areas in LabSim are optional. You can complete any or all of those if you feel you need to learn more about the topics at hand.

To get started, follow the steps below.

Reference no: EM13998115

Questions Cloud

Find position x of sailboat as a function of base variables : As an equation, the magnitude of fk is equal to αv, where v is in meters per second, fk is in newtons, and α is a constant with units of kilograms per second. Assume the sail boat is moving at speed v at some generic time t. These quantities are kn..
A bia determines the extent of the impact : According to the text, a BIA determines the extent of the impact that a particular incident would have on business operation over time. Determine the major ways in which people, systems, data, and property will impact a BIA. Provide specific examples..
The infrastructure and regulation of the internet : Topic: The infrastructure and regulation of the Internet has seen many changes over the past two decades. It will certainly see as many, if not more, in the next. We have discussed where the Internet came from, why, how it is structured
The infrastructure and regulation of the internet : Topic: The infrastructure and regulation of the Internet has seen many changes over the past two decades. It will certainly see as many, if not more, in the next. We have discussed where the Internet came from, why, how it is structured and how it mo..
Recently hired as a network security analyst for a small : Recently hired as a network security analyst for a small accounting firm. The firm is realizing that they need help to secure their network and customer's data. With your background and skills, they are looking to you to provide guidance. In addition..
Formulate a security planning model : •&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ;&νβσπ; Formulate a security planning model that addresses and solves a security problem at an agency or corporate entity.
Designers can develop the ability to know : In Security Engineering, it's quite common for designers to secure the wrong things. How do you think that system designers can develop the ability to know what the right thing is?
What is the half-life of the radium nuclei : A sample is being analyzed 5800 years after undergoing an alpha decay process. As the technician is analyzing, he observes the sample contains only 8.5% of the radium nuclei it initially contained. What is the half-life of the radium nuclei?
How can managers promote sound leadership : How can managers promote sound leadership practices and good ethical behavior?  Why are they important and how do you promote an environment where they thrive?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Assess how ericsson benefitted from amazon web services

Assess how Ericsson benefitted from Amazon Web Services (AWS) in terms of cost reduction, automated software updates, remote access, and on-demand availability

  Case management software

Information Management - Discuss how the corrections system uses case management software

  Internet backbone and network access point

What is the relationship between the internet backbone, a network access point

  Explain data collection technology

Data Collection Technology and Do you think with the advent of today's data collection technology that we can have too much information?

  Cost benefits to cloud computing using specific examples

Cloud Profitability In a one- to two-page paper (250-500 words), discuss whether or not there are cost benefits to cloud computing using specific examples. Be sure to include at least three reference sources. APA rules for formatting, quoting, paraph..

  Paper - faith-based decision making in business

Choose a social issue affecting the workplace and working environment, and develop a paper that thoroughly discusses the issue from both the workplace and societal viewpoints. Choose one of the following social issues: Faith-based decision making i..

  Important in the creation of a database

Why do we build databases with multiple-related tables rather than one single big table and why is the use of metadata so important in the creation of a database?

  Write research paper for security tools for communication

Write research paper for Security tools for communication and information systems

  How they differ based on organizational requirements

Types of networks, how they differ based on organizational requirements, interconnected devices and geographical area served - Identify PROS and CONS

  Differences between an outpatient and an inpatient record

Compare and discuss the differences between an outpatient and an inpatient record. In your discussion, identify the differences in content and explain why these differences are necessary

  Intellectual property laws and security measures

Assignment: Intellectual Property Laws and Security Measures,Intellectual property law is a major issue facing organizations, and many organizations have been fined significant amounts for violations of intellectual property law

  Description of security planning policies

Write a 4- to 6-page discussion of how policies are used to implement a security plan. Description of security planning policies

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd