Consequences of threat or vulnerability to infrastructure

Assignment Help Basic Computer Science
Reference no: EM132380116

In a business environment, controlling who has access to business information and at what level is critical for facilitating day-to-day business operations. The emphasis of Network Access Control (NAC) it to decide who or what has authorized permission to access resources on the network. In a new age of risks, it is important to re-identify access controls.

Scenario: You have been hired as an IT Security Specialist for a company called LOTR Experience. The leadership at LOTR has recently expressed concerns over various possible security issues. They would like you to be "a new set of eyes" and lead the efforts to review their current security protocols. As an expert in this field, your first task involves assessing NAC and providing a high-level assessment to leadership.

Review the following documents: LOTR Organization Chart, LOTR Network Design, and LOTR AD Design.

Write a technical assessment in which you:

Analyze NAC Best Practices and how these can be detrimental to LOTR, outlining goals for the following areas:

Endpoint Security

Direct Login

Remote Access

Determine what type of mechanisms will be used to enforce and monitor NAC controls and the frequency with which these should be implemented.

After assessing the LOTR Network Design, outline five (5) potential issues related to NAC that you see in the network's overall design (high-level overview).

Describe any operational risks that could affect business processes.

Describe the consequences of a threat or vulnerability to the infrastructure.

Recommend network changes that will implement the proper NAC controls.

Use at least three quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date.

The specific course learning outcomes associated with this assignment are:

Examine methods that mitigate risk to an IT infrastructure with confidentiality, integrity, availability, and access controls.

Determine appropriate access controls for information systems within IT infrastructures.

Reference no: EM132380116

Questions Cloud

Who is ultimately responsible for security of information : Who is ultimately responsible for the security of information in an organization? What are the disadvantages of using a VPN instead of a leased line?
Identify potential threats-determine how to mitigate risks : Access control starts first with assessing risks so you can properly identify potential threats and determine how to mitigate those risks.
Evaluate findings in terms of its applicability for client : Evaluate the findings in terms of its applicability or appropriateness for the client in your case study. Determine whether you would use or not use the therapy
Develop behavioral definitions of verbal aggression : Develop behavioral definitions of verbal aggression and physical aggression. What exactly do you mean by aggression-a slap, a kick, a put-down...or what?
Consequences of threat or vulnerability to infrastructure : Describe any operational risks that could affect business processes. Describe the consequences of a threat or vulnerability to the infrastructure.
Quality Management Assignment Questions : Quality Management Questions - What steps might the bank take to leverage its strategic challenges and address its strategic advantages
Point of care technology : Point of Care Technology. How might issues surrounding chosen technology be addressed/solved? Statically significant data or evidence to support your findings.
What are the major perceptual errors : What are the major perceptual errors? Why do they occur? What are some cognitive biases, and what can we do to manage them in the negotiation process?
Write response on Vaccinating Children : Write response on Vaccinating Children. I am on both sides of the fence when it comes to vaccinating children. I have two children of my own, one 12 and other 7

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What purposes do views serve

What is the limitation on SELECT statements used in SQL views?

  Constant declaration valid

1) Is the following constant declaration valid? 2) Which of the following C++ statements declares and initializes degrees to 3.25%?

  List several possible causes for the connectivity issues

A few months after you complete the migration you are contacted because one of the employees has had persistent issues logging on to the network and believes that you may have made an error during the migration. You need to check the workstation to v..

  Show that the method is equivalent to dijkstra''s algorithm

In particular, each augmentation uses a shortest path from the origin to some destination, the augmentations are done in the order of the destinations' proximity to the origin, and upon termination, p1 -pi gives the shortest distance from 1 to eac..

  Explain the difference between duties of the ietf and irtf

What is the first principle we discussed in this chapter for protocol layering that needs to be followed to make the communication bidirectional?

  Two theories of intelligence

Explain two theories of intelligence, referring to research evidence in your answer. In your answer you may wish to include:

  Three page double spaced report on your observations

For lab two, observe two types of interaction and write a three page double spaced report on your observations.

  Describe the distribution of profits for these corporations

Profits. Here is a stem-and-leaf display showing profits as a percent of sales for 29 of the Forbes 500 largest U.S. corporations. The stems are split; each stem represents a span of 5%, from a loss of 9% to a profit of 25%.

  Write a program using a beginner c language

Write a program using a beginner C language which calculates the value of ? from the series ?=(4/1)-(4/3)+(4/5)-(4/7)+(4/9)-(4/11)+... Print a table that shows the value of ?

  Social media platform such as pinterest

What are some of the information systems used in a social media platform such as Pinterest?

  Creating an effective business presentation

Creating an Effective Business Presentation For this assignment, you will demonstrate an understanding of creating effective presentations by putting yourself in the place of an IT manager whose company is seeking to be included in an IT/business ..

  What is the advantage of parallel form over the cascade form

It is argued that for a rational system function, its cascade form structure is not unique. Do you agree or disagree? Explain.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd