Access control methods for all user access

Assignment Help Basic Computer Science
Reference no: EM13861878

ZXY Corporation has relocated to a new building that was wired and set up for a local area network (LAN). The company implemented a client/server-based network in which all printers, folders, and other resources are shared but everyone has access to everything and there is no security outside of the defaults that were in place when the system was set up.

You have been hired to secure ZXY's network and ensure that the company has the highest levels of security to protect against internal and external attacks. In an 8-10 page proposal, include the following items to provide a comprehensive secure environment:

1. A plan to provide secure access control methods for all user access

2. A viable password policy, which includes complexity, duration, and history requirements

3. A cryptography method to ensure vital data is encrypted

4. A remote access plan to ensure that users who access the network remotely do so in a secure and efficient manner

5. A thorough plan to protect the network from malware and various types of malicious attacks

Your proposal should include all of the elements noted above with support, detail, and elaboration for each section explicitly grounded in knowledge from the assigned readings and media along with any outside sources you may choose to bring into your writing.

Reference no: EM13861878

Questions Cloud

High-lighting mechanisms of deformation : If you choose a metallic material for a single lobe of deformation show how stress and strain profiles and ultimately fracture (if occurs) progress through the deformation, show this via explanations, calculations and images
What are the magnitude of his resultant displacement : A man in search of his dog drives first 10 mi northeast, then 20 mi straight south, and finally 3 mi in a direction 30° north of west. What are the magnitude and direction of his resultant displacement?
What was silvermans net income for first year in operation : What was Silverman's net income for the first year in operation? What is the amount of finished goods inventory on the balance sheet at year-end?
Synthesis essay on the woman in gold : The movie I am using is "The Woman in Gold" by Director Simon Curtis and starring Helen Mirren, Ryan Reynolds and Katie Holmes - Synthesis Essay:
Access control methods for all user access : A plan to provide secure access control methods for all user access-A viable password policy, which includes complexity, duration, and history requirements
Identify fiscal policies that are currently being recommend : Identify fiscal policies that are currently being recommended by government leadership
What factors could work against cadmex''s decision to grant : What factors could work against CadMex's decision to grant sublicensing agreements?
Process the information on the server : JSP Forms The goal of this problem set is to build a form and a way to process the information on the server. You will need to build a form that collects the following information and saves it to a table named SHIPPING_INFO:
Consequence of size of the bhp program for epss decisions : How did the experience with experimental programs affect the nature and pace of innovation at EPS and what was the consequence of the size of the BHP program for EPS's decisions

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Design a digital filter with the following specifications

Design a digital filter with the following specifications: Cutoff frequency = 1,000 Hz Sampling rate = 16,000 Low-pass filter What is the digital normalized frequency in radians?

  Write an isr in c to add the signed value on port t (ptt)

Write an ISR, in C, to add the signed value on PORT T (PTT) to the byte value stored in location data1.

  A hotel salesperson enters sales in a text file

A hotel salesperson enters sales in a text file. Each line contains the following, separated by semicolons: The name of the client, the service sold (such as Dinner, Conference, Lodging, and so on), the amount of the sale, and the date of that event...

  What is the big deal about keeping tracking of units

What is the big deal about keeping tracking of units in the design and operation of an aircraft? Discuss an example of where either designers, pilots, or aircraft mechanics made a mistake in unit conversions that contributed to an incident.

  Explain the importance of information technology and systems

Explain the importance of information technology and systems in businesses today. Include at least one (1) real-world industry example where you believe information technology has changed the way that business is performed in that industry.

  The federal reserve web site

In current business publications or on the Federal Reserve Web site (www.federalreserve.gov), find the press release from the most recent meeting of the FOMC. What is the targeted federal funds rate? How does the FOMC evaluate the balance of risks be..

  Discusses network design element

Write a 1-page summary that discusses network design elements such as Cloud and Virtualization that can be security risks and how they can be applied to your future IT career.

  Alter computation of prefix function-correctly match string

if ‘_' is wild-card, then pattern ‘foo*bar*nad' can be found in ‘foofoowangbarnad'. Alter computation of prefix function to correctly match strings using KMP.

  What is the recommended overlap of wap coverage

What is the recommended overlap of WAP coverage and why?

  Create a base class to store characteristics about a loan

Create a base class to store characteristics about a loan. Include customer details in the Loan base class such as name, loan number, and amount of loan. Define subclasses of auto loan and home loan.

  Determine the operational and enterprise systems

Determine the operational and enterprise systems that support wireless and mobile technologies for each company. Provide a rationale for your response.

  Identify and describe any potential ethical issues

Identify and describe any potential ethical issues that could arise in connection with the new architecture.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd