Evaluate and recommend improvements for wireless environment

Assignment Help Computer Engineering
Reference no: EM132833228

Assignment: Assume you are part of a corporate level security team and your organization has just acquired a new company. The new company will have its own information technology team reporting up through the corporate team. The company being acquired is not security savvy, so a thorough assessment will be required.

The current environment you are asked to assess includes:

• The wireless network running WEP - employees often bring in their own access points because the reception is poor with the company access points.

• No security monitoring or review of security logs

• The data center has about 100 Windows servers that are patched using Microsoft Automatic Updates.

• The firewall is a Cisco PIX

• The backup strategy uses Windows built-in backup application. The backup is then sent to a main server every Friday night.

• The disaster recovery plan is to restore the server from the main backup server.

• There are no security policies or standards.

• Employees often bring in their own laptops to use for work because the company hardware running Windows 98 is outdated.

Write a 3- to 5-page analysis for the security posture of the newly purchased company and recommendations for upgrading security procedures and measures. Complete the following in your analysis:

• Summarize the risks in the current environment, the framework used, and key risk indicators.

• Evaluate and recommend improvements for the following:

• Wireless environment

• Backup and disaster recovery strategies

• Bringing your own access point and laptop policy

• Vulnerability assessment strategy

• Security and network monitoring

• Recommend hardware and software improvements.

• Recommend security policies and standards that should be written and put into place.

• Recommend an incident response plan that would escalate up through the corporate security team.

• Format your assignment according to APA guidelines.

Reference no: EM132833228

Questions Cloud

Distinguish between personal and organization ethics : Distinguish between personal and organization ethics.
MGT1301 Management Concepts Assignment : MGT1301 Management Concepts Assignment Help and Solution, Middlesex University - Assessment Writing Service - Outline Apples organisational structure
Compute the capital balances of the remaining partners : Compute the Capital balances of the remaining partners after the retirement of Bong with the following cash payment to Bong for his equity
Make a purchase before leaving : A clothing store owner finds that 35% of the customers entering the store ask an assistant for help and that 20% of the customers make a purchase before leaving
Evaluate and recommend improvements for wireless environment : Assume you are part of a corporate level security team and your organization has just acquired a new company. The new company will have its own information.
Make a generalization about the population of all students : Descriptive? statistics; the results of the class sample are extended to make a generalization about the population of all students at the school.
Calculate the volume and unused capacity variances : The fixed costs provide a capacity of 28,000 hours (2,000 per employee at practical capacity). Calculate the volume and unused capacity variances
What a feasibility analysis of sporting goods might entail : A feasibility analysis, also called a feasibility study, is performed to estimate the chances of a project's success before a commitment of money and time.
John rawls thought experiment : John Rawls's original position represents a community in which you have no idea what kind of person you will end up being. In this sense, it is like life itself

Reviews

Write a Review

Computer Engineering Questions & Answers

  Discussing how database auditing and monitoring fit

Write an essay of at least 400-500 words discussing how database auditing and monitoring fit within a SOX compliance framework.

  Calculate matchings on bipartite graph

Produce graph as output and/or produce log file with details of assigned middlebox after applying algorithm, number of nodes

  Discussion-implementing erm in higher education environment

Chapter 6 presented the approach the LEGO Group used to implement ERM, and chapter 9 presented a discussion and case study on implementing ERM in a higher.

  Write a program that consists of three classes- a b and c

Write a program that consists of three classes, A, B, and C, such that B extends A and C extends B. Each class should define an instance variable named x.

  Define the cost of ownership of the mobile application

Define the cost of ownership of the mobile application. Define the benefits of ownership of the mobile application. Predict the return on investment (ROI) of the mobile application and your suggested alternatives.

  Write an application that will let you keep a tally

Write an application that will let you keep a tally of how well three salesmen are performing selling five different products.

  What ordering of the brands do you think is best

Draw a barchart of the number of respondents per brand. What ordering of the brands do you think is best?

  How can we make sure security is implemented into the design

In today's fast-paced, agile software development environment, how can we make sure security is implemented into the design? What are some of the key strategies

  Discover the security weaknesses of a software system

STRIDE is a popular threat modeling technique commonly used to discover the security weaknesses of a software system. For this assignment (a) research.

  Assess the importance of critical path in project management

Compare the information that one receives from a Gantt chart, versus that of a PERT diagram. Assess the importance of the critical path in project management.

  What are different types of direct access storage devices

What are the different types of direct access storage devices? Which type of DASD do you prefer for storing records and why? 2 page each.

  Make use of an array for the different loans

Write down the program in Java (without a graphical user interface) using a loan amount of $200,000 with an interest rate of 5.75% and a 30 year term.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd