Create a communication medium

Assignment Help Computer Network Security
Reference no: EM13333625

This assignment will contain two (2) Parts: Written Paper and PowerPoint Presentation. The PowerPoint presentation is not included in the page count but is included in the evaluation of your assignment. You must submit both parts for the completion of this assignment.Part 1Write a ten to fifteen (10-15) page paper in which you analyze and solve the following issues:Imagine you are a senior systems administrator who has recently been given the task to help improve security of your company's IT infrastructure after a series of network security breaches. These breaches included someone accessing the network who was not authorized to do so, and authorized users being asked for their passwords by someone who claimed to work in the IT department.You have also been asked to implement IT troubleshooting best practices to help improve the efficiency of solving IT issues that end users frequently experience. Your first task is to ensure secure user accounts since most network security breaches have occurred through social engineering means.

1.List and discuss two (2) user authentication policies that you can implement to help improve the network's security.You have been asked to develop an action plan that you will use to communicate the importance of IT security to all of the company's employees by creating two unique forms of communication material (e.g., detailed email, detailed memo, brochure, electronic presentation, etc.) to help disseminate the security message to company employees. Approach the communication material from the perspective of the core tasks these employees are responsible for.

2.Create a communication medium that: 1.Caters to all company employees and these employees' core tasks.2.Approaches this from the perspective of security best practices and awareness from the user perspective.3.Includes at least four (4) best practice methods.4.Includes at least two (2) supplemental graphical renderings of best practice methods through the use of Excel, Visio, MS Project, or one of their equivalents such as Open Project, Dia, and OpenOffice (flowcharts, process diagrams, tables, etc.). Note: The graphically depicted solution is not included in the required page length.

3.Create a communication medium that: 1.Caters to technicians who work in the IT department and these employees' core tasks.2.Approaches this communication from the perspective of specific technologies the IT technicians can implement to tighten IT security.3.Includes at least four (4) different Windows 7 technologies, excluding authentication.You need to present IT troubleshooting best practices to junior systems administrators at an IT department meeting to ensure departmental efficiency with solving issues. You want to present some of these issues from a case scenario perspective.

4.Create and describe (3) scenarios where there is an IT problem that requires troubleshooting.

5.Describe the steps you would take to handle the situation by modeling them after an effective troubleshooting methodology for each scenario you previously created in Question four (4).

6.Explain the specific IT administration activities required to solve the problems.

7.Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.Part 2 Develop a three to six (3-6) slide PowerPoint presentation in which you:

8.Illustrate the authentication policies, in which you identified in Part 1 Question 1, by including at least two (2) SmartArt diagrams graphically depicting them.

9.Describe at least two (2) network security breach scenarios that can be prevented by implementing the authentication policies in which you identified in Part 1 Question 1.

10.Include PowerPoint speaker notes that will accompany each slide with five to ten (5-10) sentences and provide more detail about the slide content to be used when presenting this to a group.Your assignment must follow these formatting requirements:•Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions.

•Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required page length.

•Include charts or diagrams created in Excel, Visio, MS Project, or one of their equivalents such as Open Project, Dia, and OpenOffice.

Reference no: EM13333625

Questions Cloud

Calculate current price of berkshire hathaway finance bond : Calculate the current price of the Berkshire Hathaway Finance bond that matures in 2018. What does the spread say about its risk relative to the comparable maturity Treasury
Explain hydrogen atoms in structure : Predict the organic product of the following reaction. Include hydrogen atoms in your structure.
Explain mechanism when n-butyl acetate reacts : What's the reaction mechanism when n-butyl acetate reacts with sodium bromide to form n-buytl bromide
Create a communication medium : Illustrate the authentication policies, in which you identified in Part 1 Question 1, by including at least two (2) SmartArt diagrams graphically depicting them.
Explain synthesized benzyl acetate : A student synthesized benzyl acetate following Fischer esterification, and combined 3.4 mL benzyl alcohol (MW = 108.14 g/mol, ?= 1.044 g/mL) and 0.57 mL acetic acid (MW = 60.05 g/mol, , ?= 1.049 g/mL) under reflux for 50 minutes.
What are the magnitude and direction of the net momentum : Two vehicles are approaching an intersection. One is a 2450-kg pickup traveling at 13.8 m/s from east to west (the ?x-direction), What are the magnitude and direction of the net momentum
Find how many numbers are in the classification code : 1. How many chapters are in the HTSUSA 2. What is the most recent edition of the HTUSUA Why was it updated 3. How many numbers are in the classification code
Describe two lobes of unequal size : A single sp^3 hybrid orbital has a) one lobe b) two lobes of equal size c) two lobes of unequal size d) four lobes of equal size

Reviews

Write a Review

Computer Network Security Questions & Answers

  Defects of gsm networks

Security mechanism, threat, GSM networks, DDoS attacks, IPv4, IPv6, IPsec integrity, authentication and privacy, IPsec AH,  ‘single sign-on' in the context of access control, Secure Electronic Transaction (SET) protoco,  Encryption

  Network security

SLE, ARO, and ALE, behavioural biometric technology, Enterprise Information Security Policy, Issue Specific Security Policy, System Specific Security Policy, firewalls protect network, creating a DMZ during firewall implementation, use of SSL to se..

  Coaxial cable as a transmission medium

The earliest LANs used coaxial cable as a transmission medium. Over time, unshielded twisted pair wiring emerged as a better and faster medium.

  How does it affect performance and security

Sector level hard disk encryption is one of the most interesting problems of all. Assume that AES-128 is used to encrypt your local hard disk. What mode will you use? CBC or ECB?

  What is the principle of adequate protection

What is the difference between a threat and a vulnerability? Define each, and then give at least one example of a threat and of a vulnerability.

  Identify the virus software running on your computer

Explain the origin and effects of at least 3 different types of viruses/malicious programs as well as how your computer can become vulnerable to these threats.

  Find time when station c hears the collision

The size of the frame is long enough to guarantee the detection of collision by both stations. Find: The time when station C hears the collision (t3).

  Data security or computer-network security

The second research report should include applications of the security theories, principles, and techniques of the subject.

  Discuss limitations, omissions,or technical flaws

An abstract where you state what you have done, what is the contribution of the paper to the literature and what is the significance of that contribution (200-300 words).

  Define encryption

In a given encryption system where the messages are expressed only as numbers and "e" is an integer.

  Cryptosystem

Block cipher, Primitive root, Confusion, Diffusion, Digital signature, Conventional Symmetric-Key Encryption

  Generates alternative message that has hash value

Generates an alternative message that has a hash value that collides with Bob's original hash value. Show a message that Alice may have spoofed, and demonstrate that its hash value collides with Bob's original hash."

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd