Evaluate and recommend improvements for wireless environment

Assignment Help Computer Engineering
Reference no: EM132833228

Assignment: Assume you are part of a corporate level security team and your organization has just acquired a new company. The new company will have its own information technology team reporting up through the corporate team. The company being acquired is not security savvy, so a thorough assessment will be required.

The current environment you are asked to assess includes:

• The wireless network running WEP - employees often bring in their own access points because the reception is poor with the company access points.

• No security monitoring or review of security logs

• The data center has about 100 Windows servers that are patched using Microsoft Automatic Updates.

• The firewall is a Cisco PIX

• The backup strategy uses Windows built-in backup application. The backup is then sent to a main server every Friday night.

• The disaster recovery plan is to restore the server from the main backup server.

• There are no security policies or standards.

• Employees often bring in their own laptops to use for work because the company hardware running Windows 98 is outdated.

Write a 3- to 5-page analysis for the security posture of the newly purchased company and recommendations for upgrading security procedures and measures. Complete the following in your analysis:

• Summarize the risks in the current environment, the framework used, and key risk indicators.

• Evaluate and recommend improvements for the following:

• Wireless environment

• Backup and disaster recovery strategies

• Bringing your own access point and laptop policy

• Vulnerability assessment strategy

• Security and network monitoring

• Recommend hardware and software improvements.

• Recommend security policies and standards that should be written and put into place.

• Recommend an incident response plan that would escalate up through the corporate security team.

• Format your assignment according to APA guidelines.

Reference no: EM132833228

Questions Cloud

Distinguish between personal and organization ethics : Distinguish between personal and organization ethics.
MGT1301 Management Concepts Assignment : MGT1301 Management Concepts Assignment Help and Solution, Middlesex University - Assessment Writing Service - Outline Apples organisational structure
Compute the capital balances of the remaining partners : Compute the Capital balances of the remaining partners after the retirement of Bong with the following cash payment to Bong for his equity
Make a purchase before leaving : A clothing store owner finds that 35% of the customers entering the store ask an assistant for help and that 20% of the customers make a purchase before leaving
Evaluate and recommend improvements for wireless environment : Assume you are part of a corporate level security team and your organization has just acquired a new company. The new company will have its own information.
Make a generalization about the population of all students : Descriptive? statistics; the results of the class sample are extended to make a generalization about the population of all students at the school.
Calculate the volume and unused capacity variances : The fixed costs provide a capacity of 28,000 hours (2,000 per employee at practical capacity). Calculate the volume and unused capacity variances
What a feasibility analysis of sporting goods might entail : A feasibility analysis, also called a feasibility study, is performed to estimate the chances of a project's success before a commitment of money and time.
John rawls thought experiment : John Rawls's original position represents a community in which you have no idea what kind of person you will end up being. In this sense, it is like life itself

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd