Describe how you would improve security for system

Assignment Help Basic Computer Science
Reference no: EM133196107

Given the following, describe how you would improve security for this system.

There is a system containing unencrypted sensitive information (Social Security numbers, driver's license numbers, first names, last names, and credit card numbers). The system, running a Windows 2008 server, is used only by employees but is on the public Internet, as employees need to access the system from home. Authentication is provided by NTLM, using username and password. The machine is currently directly plugged into its own dedicated cable modem.

Can you recommend five ways we can improve the security of this system, given a $10,000 budget? We should make sure to recommend solutions for software, hardware, and network security improvements. The data is used by 15 users and is secured using a powerful system with decent authentication.

Tags: Microsoft Baseline Security Analyzer ESET VeraCrypt software.

Reference no: EM133196107

Questions Cloud

Why do you think it is so important to cultivate guanxi : Why do you think it is so important to cultivate guanxi and guanxiwang in China?
Describe qualitative and quantitative research methods : Assignment - Minority Women in Texas in Seeking a Career Discussion - Describe qualitative and quantitative research methods
Concept of the tragedy of the commons : Relate the concept of the Tragedy of the Commons to what is happening on the planet today and the environmental indicators used to measure anthropogenic impacts
Global lifecycle comprehensive plan : ISM 581-Colorado State University-Develop comprehensive plan for keeping PCs upgraded and functional through a proper hardware/software lifecycle.
Describe how you would improve security for system : Florida Technical College-Describe how you would improve security for this system. There is a system containing unencrypted sensitive information
What is meant by extension of anthropocentric ethics : Why is it hard to apply traditional theories to environmental problems? What is meant by extension of anthropocentric ethics?
Develop a syllabus for undergraduate nursing course : You will develop a syllabus for an 8-week undergraduate nursing course in your area of interest that conveys the essential components of that course to learner
Meaning of authentic happiness by dr martin seligman : University of Central Florida Happiness is a relative term. Ponder the meaning of authentic happiness by Dr. Martin Seligman.
Credit union bank project report : Texas AM University-Your task to create a University Credit Union Bank capable of having accounts for all its users.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  How can you protect yourself from this type of attack

Would you recommend to a client to pay the ransom or not? How can you protect yourself from this type of attack?

  Estimated value of the common stock

If the required return is 9% , what is the estimated value of the common stock? (Round to the nearest cent).

  What are the different types of run levels available for use

What are the different types of run levels available for use? Which one do you believe is more important than the other levels

  Write an application that prints the following diamond shape

(Diamond Printing Program) Write an application that prints the following diamond shape. You may use output statements that print a single asterisk (*), a single space or a single newline character. Maximize your use of repetition (with nested for..

  Expert supporting quotes surrounded by quotation marks

Include at least 3 expert supporting quotes surrounded by quotation marks and cited in-line

  Advanced technologies for high availability

International company would like to design and implement it's own network, using advanced technologies for high availability, efficiency.

  Pursue information technology major in college

Essay about yourself and explain why you want to pursue Information Technology major in college.

  The importance of security awareness training

What risks do such assumptions pose? Moreover, what other risks might we speculate there are in the organization?

  Causes the program to fill the entire screen

Causes the program to fill the entire screenCauses the program to fill the entire screen

  Overcome the scope creep situation

Discuss different techniques you can adopt to overcome the "scope creep" situation. Your answer should align with the IEEE 830-1998 standards.

  What is the company cost of capital

A company is 46% financed by risk-free debt. The interest rate is 11%, the expected market risk premium is 9%, and the beta of the company's common stock is .56

  Developing a more agile product development approach

Speculate on why corporate culture plays a critical role in developing a more agile product development approach. Provide one (1) real-world example of the role that corporate culture plays in agile product development to support your response.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd