Develop a security policy for a business

Assignment Help Computer Networking
Reference no: EM131513896

Question: 1. Using the information on open ports you found with NetInfo in Hands-On Project 9-5, research these ports to determine their function and whether leaving them open is safe. A Google search is a good place to begin your research. Write a summary of what you found and list which open ports pose a security risk.

2. Search for security policy templates on the Internet. A good place to start is the SANS Institute (www.sans.org). Using one or more of the templates you find, develop a security policy for your school or a business, and present it to the class. This project can also be assigned to groups of students.

Reference no: EM131513896

Questions Cloud

Identify methods for evaluating operational processes : Identify methods for assessing operational needs in a healthcare setting.Identify methods for evaluating operational processes.
Write the testing instructions : Testing Password and Account Lockout Settings Time Required: 1 hour or longer, unless some times are modified to decrease the amount of waiting time Objective.
What did you do to allow pings from outside your network : Using Windows Firewall with Advanced Security to Limit Access to Your Computer Time Required: 15 to 30 minutes Objective: Limit access to your computer's Remote
Developing two job description for your current organization : Conducting a needs assessment and developing two job descriptions for your current organization or a preapproved organization that you have access to interact.
Develop a security policy for a business : Using the information on open ports you found with NetInfo in Hands-On Project 9-5, research these ports to determine their function and whether leaving them.
What technologies should be used to secure the given areas : A small research company in Pittsburgh is working to develop a new method of mass storage to replace current storage technology.
The use of technology in the selection process : List three (3) benefits for that assessment and describe why you believe each benefit would be appropriate for selecting the right employee.
Discuss the security policy templates : An architectural firm of eight employees, each with a networked desktop computer, wants you to develop a security policy for the company.
How the recruitment of positions will be marketed : How the recruitment of positions will be marketed/communicated.How the effectiveness of recruitment will be measured.

Reviews

Write a Review

Computer Networking Questions & Answers

  Define the term hacking

Define the term hacking.

  Wirte a function to check for lowercase letters

Wirte a function to check for lowercase letters. Using Array Letters int N.

  Properly forward traffic between two hosts connected

Your first task is to properly forward traffic between two hosts connected to a single switch. Using Mininet you should create a binary tree topology of depth 1, which will create two hosts (h1 and h2) and a single switch (s1).

  Implementation plan to explain topology of network

Implementation Plan describing how this network will be implemented. In paper, explain the topology (both logical and physical) of network, network operating system, creation of user accounts, and security concerns.

  Provide a physical design for hhs

Create a project scope document that details appropriate business requirements, IT goals, and project parameters for the given scenario - Integrate routing and remote services into a Windows network design.

  How to better secure the network infrastructure

You've been asked to assess the current vulnerabilities and provide a recommendation to the firm's owner on how to better secure the network infrastructure.

  Identify and describe the processes involved in the

identify and describe the processes involved in the management of the services disk quotas and security of both windows

  What is still need to be completed main referencesr

7502ICT - Advanced Networking: Project. In order to keep track of the progress of the project, you will have to submit an interim progress report describing (a) brief overview of the project (b) what work has been completed so far and (c) what is s..

  What conditions would you choose to subnet a network

What is the OSI model and why is it important in understanding networking? Under what conditions would you choose to subnet a network

  Explain how security and privacy laws affect the design

Explain the role of IT in monitoring compliance with the organization's risk management policies and plans when outsourcing the identified IT function.

  Hypothetical company trying to certify at top secret level

Hypothetical company (make up one for this problem) for your system (for example: operating system) that you are trying to certify at the TOP SECRET level?

  Demonstrate clear understanding of threats and risks

Demonstrate clear understanding of threats and risks and argue the pros and cons of commoncountermeasures - Apply skills to analyse complex problems in network security under supervisionAssignment Description

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd