Describe any operational risks

Assignment Help Computer Engineering
Reference no: EM132149870

Assignment 1: Network Access Control

In a business environment, controlling who has access to business information and at what level is critical for facilitating day-to-day business operations. The emphasis of Network Access Control (NAC) it to decide who or what has authorized permission to access resources on the network. In a new age of risks, it is important to re-identify access controls.

Scenario: You have been hired as an IT Security Specialist for a company called LOTR Experience. The leadership at LOTR has recently expressed concerns over various possible security issues. They would like you to be "a new set of eyes" and lead the efforts to review their current security protocols. As an expert in this field, your first task involves assessing NAC and providing a high-level assessment to leadership.

Review the following documents: LOTR Organization Chart, LOTR Network Design, and LOTR AD Design.

Write a technical assessment in which you:

1. Analyze NAC Best Practices and how these can be detrimental to LOTR, outlining goals for the following areas:

1. Endpoint Security

2. Direct Login

3. Remote Access

2. Determine what type of mechanisms will be used to enforce and monitor NAC controls and the frequency with which these should be implemented.

After assessing the LOTR Network Design, outline five (5) potential issues related to NAC that you see in the network's overall design (high-level overview).

1. Describe any operational risks that could affect business processes.

2. Describe the consequences of a threat or vulnerability to the infrastructure.

3. Recommend network changes that will implement the proper NAC controls.

3. Use at least three quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA format.

The specific course learning outcomes associated with this assignment are:

• Examine methods that mitigate risk to an IT infrastructure with confidentiality, integrity, availability, and access controls.

• Determine appropriate access controls for information systems within IT infrastructures.

Reference no: EM132149870

Questions Cloud

What evidence can you find to support your opinion : Steve Jobs was a strong, charismatic leader who co-founded Apple and is credited with much of the success of the company. Some believe that Tim Cook.
Example like this that misrepresented advertising : Find an other example like this that misrepresented the advertising. Tell us about the results of this misrepresentation on the company’s and product reputation
Define a packet analyzer and describe the use : Define a packet analyzer and describe its use. List best practices for analyzing packets. Describe uses (good and bad, ie. hacker) of a packetanalyzer.
Sam has breached any legal duty to company : Advise the board of Downing Ltd whether Sam has breached any legal duty to the company.
Describe any operational risks : Describe any operational risks that could affect business processes. Describe the consequences of a threat or vulnerability to the infrastructure.
Organizational behavior case-the outdated structure : Jake Harvey has a position on the corporate planning staff of a large company in a high-technology industry.
Specializes in it installations for retailers : Downing Ltd specializes in IT installations for retailers. Sam, a director of Downing Ltd, was approached in a private capacity as a well?
Create the supertype subtype relationships : In the link below it has all the information that needs to be in the crowsfoot erd. Don't take on this assignment if you cant put all the info in the ERD.
Consider relevant for adding value to customers : What other factors do you consider relevant for adding value to customers?

Reviews

Write a Review

Computer Engineering Questions & Answers

  What percentage of your traffic relied on ip

Did any of your traffic use a type of frame that was not Ethernet? What percentage of your traffic relied on IP? How many of your packets used IPv6?

  What strategies can you use to enhance your creativity

Evaluate yourself using the three indices of creativity. What strategies can you use to enhance your creativity?

  Identify a prospective idea for development as an android

For your Portfolio Project, you will identify a prospective idea for development as an Android mobile application.

  Define how much more secure is this double encryption

find two substitution ciphers. One adds a value of i to the ASCII code of the plaintext character. The other adds a value of j to the plaintext character. All additions are modulo 256.

  How to print out all the information in the file

prompt the user for a file name and open the file for reading. Print all the information in the file, numbering each new line of text.

  Describe the significance of diagramming tools for process

discuss the importance of diagramming tools for process modeling. without such tools what would analysts do to model

  Discuss strengths of memory management techniques

Discuss the strengths and weaknesses of the following memory management techniques: Fixed Partitioning: Main memory is divided into a number of static partition

  Thread problem the eaters must give their dishes to the

thread problem the eaters must give their dishes to the dishwasher by putting them on a conveyor belt that has a

  Define a function that returns a stream of random numbers

Define a function that returns a stream of random numbers that uses this linear-congruential formula.

  Describe what a bitmapped graphic format is

Describe what a bitmapped graphic format is and compare: GIF, PNG, and BMP. What are the 16-bit 1's and 2's complements of the following binary numbers?

  Design a system with a processor that is clocked at 10ghz

Determine the maximum distance between the CPU and Cache memory if we want to access cache data within one processor cycle.

  Define the problem as a searching problem

COMP 131 Introduction to Artificial Intelligence Assignment. Define problem as a searching problem. Implement an A* algorithm in your language of preference

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd