Imagine you are a senior systems administrator

Assignment Help Basic Computer Science
Reference no: EM13709993

Write a ten to fifteen (10-15) page paper in which you analyze and solve the following issues:
Imagine you are a senior systems administrator who has recently been given the task to help improve security of your company's IT infrastructure after a series of network security breaches. These breaches included someone accessing the network who was not authorized to do so, and authorized users being asked for their passwords by someone who claimed to work in the IT department.
You have also been asked to implement IT troubleshooting best practices to help improve the efficiency of solving IT issues that end users frequently experience. Your first task is to ensure secure user accounts since most network security breaches have occurred through social engineering means.
1.List and discuss two (2) user authentication policies that you can implement to help improve the network's security.

You have been asked to develop an action plan that you will use to communicate the importance of IT security to all of the company's employees by creating two unique forms of communication material (e.g., detailed email, detailed memo, brochure, electronic presentation, etc.) to help disseminate the security message to company employees. Approach the communication material from the perspective of the core tasks these employees are responsible for.
2.Create a communication medium that: 1.Caters to all company employees and these employees' core tasks.
2.Approaches this from the perspective of security best practices and awareness from the user perspective.
3.Includes at least four (4) best practice methods.
4.Includes at least two (2) supplemental graphical renderings of best practice methods through the use of Excel, Visio, MS Project, or one of their equivalents such as Open Project, Dia, and OpenOffice (flowcharts, process diagrams, tables, etc.). Note: The graphically depicted solution is not included in the required page length.

3.Create a communication medium that: 1.Caters to technicians who work in the IT department and these employees' core tasks.
2.Approaches this communication from the perspective of specific technologies the IT technicians can implement to tighten IT security.
3.Includes at least four (4) different Windows 7 technologies, excluding authentication.


You need to present IT troubleshooting best practices to junior systems administrators at an IT department meeting to ensure departmental efficiency with solving issues. You want to present some of these issues from a case scenario perspective.
4.Create and describe (3) scenarios where there is an IT problem that requires troubleshooting.
5.Describe the steps you would take to handle the situation by modeling them after an effective troubleshooting methodology for each scenario you previously created in Question four (4).
6.Explain the specific IT administration activities required to solve the problems.
7.Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Part 2
Develop a three to six (3-6) slide PowerPoint presentation in which you:
8.Illustrate the authentication policies, in which you identified in Part 1 Question 1, by including at least two (2) SmartArt diagrams graphically depicting them.
9.Describe at least two (2) network security breach scenarios that can be prevented by implementing the authentication policies in which you identified in Part 1 Question 1.
10.Include PowerPoint speaker notes that will accompany each slide with five to ten (5-10) sentences and provide more detail about the slide content to be used when presenting this to a group.

Your assignment must follow these formatting requirements:
•Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions.
•Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required page length.
•Include charts or diagrams created in Excel, Visio, MS Project, or one of their equivalents such as Open Project, Dia, and OpenOffice. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

Reference no: EM13709993

Questions Cloud

What are the three basic functions of a firm : What are the three basic functions of a firm/organisation? Do all firms/organisations (private, government, not-for-profit) perform these three functions?
How long does it take each create to slide down the ramp : A cargo plane unloads crates of supplies at the site of humanitarian disaster. How long does it take each create to slide down the ramp
Develop an original and unique scenario to describe : With regards to risk-response planning, there are four (4) responses to negative risks that an organization may pursue: avoid, transfer, mitigate, and accept. Develop an original and unique scenario to describe and contrast each of these respo..
Find at what angle will the pendulum swing out : A small wheeled vehicle will be sent to the planet Mars to explore its surface. The vehicle contains accelerometers that consist of a small pendulum. at what angle will the pendulum swing out
Imagine you are a senior systems administrator : Imagine you are a senior systems administrator who has recently been given the task to help improve security of your company's IT infrastructure after a series of network security breaches. These breaches included someone accessing the network ..
Estimate what is the speed of the police officer : A motorist drives along a straight road at a constant speed of 60 m/s. At time t = 0 she passes a parked motorcycle police officer. What is the speed of the police officer when he reaches the motorist
Find the acceleration : A 0.25-kg block rests on a friction-less wedge that has an inclination of 71 degrees and acceleration to the right such that the mass remains stationary relative to the wedge. Find the acceleration
What is the speed of the police officer : A motorist drives along a straight road at a constant speed of 60 m/s. At time t = 0 she passes a parked motorcycle police officer. What is the speed of the police officer when he reaches the motorist
Describe the board of directors as shareholders : To better align the interests of the corporate board with those of shareholders, should company directors be required to own stock in the company they represent.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What are search methods

What are search methods? Do you feel search methods are relevant to topics in artificial intelligence ? If yes, please explain why and how. Specifically, describe how search methods would be used for rule-based systems, expert systems, resolu..

  Procedure to charge lower rate for ongoing support services

Create complete, written procedure for New Century Health Clinic maintenance change requests. Include suitable forms with procedure.

  Traditional project management approach

Identify the business problems the project team tried to solve and analyze how they applied the agile project management techniques to ensure the project was delivered on time, on budget with good quality.

  Encode audio data in two packets

How might you encode audio (or video) data in two packets so that if one packet is lost, then resolution is simply decreased to what would be expected with half bandwidth?

  Describes the benefits of getting a college education

Change the Font style and Font size of the numbers in the Worksheet and change the Row and Column headins to Bold Font.

  Identity tangible and intangible benefits of the new payroll

suppose you own a travel agency in a large city you have many clients but growth has slowed somewhat. some long term employees are getting discouraged, but feels that there might be a way to make technology work in favor. use your imagination and sug..

  Use map to define convert-euro converts list of us dollars

Use map to define the following functions: convert-euro, which converts a list of U.S. dollar amounts into a list of euro amounts based on an exchange rate of 1.22 euro for each dollar.

  What is the order of the public key?

the weaknesses that arise in Elgamal encryption if a public key of small order is used. We look at the following example. Assume Bob uses the group Z ? 29 with the primitive element ?= 2. His public key is ?= 28.

  What these three things(rob, rs, rsr) explain

What these three things(ROB, RS, RSR)  explain  ?

  What are the benefits of creating a modular design

What are the benefits of creating a modular design for a large computer program? Why would one extremely large program not be the best choice for a quality program design?

  Explaining relationship of strategic and tactical plans

Descriibe in scholarly detail relationship of strategic, tactical, and operational plans,

  Write command to determine users on active directory from xp

Write down the command to determine all users on Active Directory from XP. Write down the query to look up a user on Active Directoy and see the user's property.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd