Describe any operational risks

Assignment Help Computer Engineering
Reference no: EM132149870

Assignment 1: Network Access Control

In a business environment, controlling who has access to business information and at what level is critical for facilitating day-to-day business operations. The emphasis of Network Access Control (NAC) it to decide who or what has authorized permission to access resources on the network. In a new age of risks, it is important to re-identify access controls.

Scenario: You have been hired as an IT Security Specialist for a company called LOTR Experience. The leadership at LOTR has recently expressed concerns over various possible security issues. They would like you to be "a new set of eyes" and lead the efforts to review their current security protocols. As an expert in this field, your first task involves assessing NAC and providing a high-level assessment to leadership.

Review the following documents: LOTR Organization Chart, LOTR Network Design, and LOTR AD Design.

Write a technical assessment in which you:

1. Analyze NAC Best Practices and how these can be detrimental to LOTR, outlining goals for the following areas:

1. Endpoint Security

2. Direct Login

3. Remote Access

2. Determine what type of mechanisms will be used to enforce and monitor NAC controls and the frequency with which these should be implemented.

After assessing the LOTR Network Design, outline five (5) potential issues related to NAC that you see in the network's overall design (high-level overview).

1. Describe any operational risks that could affect business processes.

2. Describe the consequences of a threat or vulnerability to the infrastructure.

3. Recommend network changes that will implement the proper NAC controls.

3. Use at least three quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA format.

The specific course learning outcomes associated with this assignment are:

• Examine methods that mitigate risk to an IT infrastructure with confidentiality, integrity, availability, and access controls.

• Determine appropriate access controls for information systems within IT infrastructures.

Reference no: EM132149870

Questions Cloud

What evidence can you find to support your opinion : Steve Jobs was a strong, charismatic leader who co-founded Apple and is credited with much of the success of the company. Some believe that Tim Cook.
Example like this that misrepresented advertising : Find an other example like this that misrepresented the advertising. Tell us about the results of this misrepresentation on the company’s and product reputation
Define a packet analyzer and describe the use : Define a packet analyzer and describe its use. List best practices for analyzing packets. Describe uses (good and bad, ie. hacker) of a packetanalyzer.
Sam has breached any legal duty to company : Advise the board of Downing Ltd whether Sam has breached any legal duty to the company.
Describe any operational risks : Describe any operational risks that could affect business processes. Describe the consequences of a threat or vulnerability to the infrastructure.
Organizational behavior case-the outdated structure : Jake Harvey has a position on the corporate planning staff of a large company in a high-technology industry.
Specializes in it installations for retailers : Downing Ltd specializes in IT installations for retailers. Sam, a director of Downing Ltd, was approached in a private capacity as a well?
Create the supertype subtype relationships : In the link below it has all the information that needs to be in the crowsfoot erd. Don't take on this assignment if you cant put all the info in the ERD.
Consider relevant for adding value to customers : What other factors do you consider relevant for adding value to customers?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd