Describe scenarios where there is an it troubleshooting?

Assignment Help Computer Network Security
Reference no: EM13923430

Part 1

Write a ten to fifteen (10-15) page paper in which you analyze and solve the following issues:

Imagine you are a senior systems administrator who has recently been given the task to help improve security of your company's IT infrastructure after a series of network security breaches.

These breaches included someone accessing the network who was not authorized to do so, and authorized users being asked for their passwords by someone who claimed to work in the IT department.

You have also been asked to implement IT troubleshooting best practices to help improve the efficiency of solving IT issues that end users frequently experience.

Your first task is to ensure secure user accounts since most network security breaches have occurred through social engineering means.

1. List and discuss two

(2) user authentication policies that you can implement to help improve the network's security.

You have been asked to develop an action plan that you will use to communicate the importance of IT security to all of the company's employees by creating two unique forms of communication material (e.g., detailed email, detailed memo, brochure, electronic presentation, etc.) to help disseminate the security message to company employees.

Approach the communication material from the perspective of the core tasks these employees are responsible for.

2. Create a communication medium that: 1.Caters to all company employees and these employees' core tasks.

3. Approaches this from the perspective of security best practices and awareness from the user perspective.

4. Includes at least four (4) best practice methods.

5. Includes at least two (2) supplemental graphical renderings of best practice methods through the use of Excel, Visio, MS

Project, or one of their equivalents such as Open Project, Dia, and OpenOffice (flowcharts, process diagrams, tables, etc.).

Note: The graphically depicted solution is not included in the required page length.

3.Create a communication medium that:

1. Caters to technicians who work in the IT department and these employees' core tasks.

2. Approaches this communication from the perspective of specific technologies the IT technicians can implement to tighten IT security.

3. Includes at least four (4) different Windows 7 technologies, excluding authentication.

You need to present IT troubleshooting best practices to junior systems administrators at an IT department meeting to ensure departmental efficiency with solving issues.

You want to present some of these issues from a case scenario perspective.

4. Create and describe (3) scenarios where there is an IT problem that requires troubleshooting.

5. Describe the steps you would take to handle the situation by modeling them after an effective troubleshooting methodology

for each scenario you previously created in Question four (4).

6. Explain the specific IT administration activities required to solve the problems.

7. Use at least three (3) quality resources in this assignment.

Note: Wikipedia and similar Websites do not qualify as quality resources.

Part 2

Develop a three to six (3-6) slide PowerPoint presentation in which you:

8. Illustrate the authentication policies, in which you identified in Part 1 Question 1, by including at least two (2) SmartArt diagrams graphically depicting them.

9.Describe at least two (2) network security breach scenarios that can be prevented by implementing the authentication policies in which you identified in Part 1 Question 1.

10.Include PowerPoint speaker notes that will accompany each slide with five to ten (5-10) sentences and provide more detail about the slide content to be used when presenting this to a group.

 

Reference no: EM13923430

Questions Cloud

Control the functions of motion detection camera device : My RISC machine automates a motion detection camera by automaticall triggering the record function of the camera when motion is detected.
Capital investment evaluation methods : Select one of the capital investment evaluation methods described in Chapter 10 of your text. Fully explain the capital evaluation method's strengths and weaknesses. Take a position and defend the use of your selected method. Be sure to use at ..
Explain why the market has developed in the given manner : Explain why the market has developed in this manner. What do you think are the most important characteristics for the success of a new futures contract concept?
Manager performance report for the recent monthly period : Home Station is a national home improvement chain with more than 100 stores throughout the country. The manager of each store receives a salary plus a bonus equal to a percent of the store's net income for the reporting period. The following net i..
Describe scenarios where there is an it troubleshooting? : Approaches this communication from the perspective of specific technologies the IT technicians can implement to tighten IT security.
Developments could impact businesses : cloud computing and how do you think its developments could impact businesses
Describe the nature of the basis risk involved in your hedge : If the only available gasoline futures contracts call for the delivery of 42,000 gallons and mature in either two or four months, describe the nature of the basis risk involved in your hedge.
Projects and files for an entire application : Question 1. A(n) _____ is a container that stores the projects and files for an entire application.
Nonvalue-added costs in a doctor office : When comparing various divisions within a company, describe what problems can arise from evaluating divisions that have different accounting methods, as described in Chapter 11 of your text. Cite three examples of accounting methods that could ca..

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd