Implementation of the security recommendations

Assignment Help Computer Network Security
Reference no: EM131988590 , Length:

In this assignment, you will continue with the report for ABC, Inc. that you started in Week 1 Project. Remember to review the scenario document for the company profile and overall security objectives.

Modify and correct the plan you created for Week 1 Project to accommodate suggestions and recommendations from your instructor and your own changes based on the readings and activities for this week.

Use Track Changes or color code your changes and additions so that the changes are easy to identify. In this week, the focus will be on planning the security of the OSs and implementing access control. You will also be creating verification activities to make sure the recommended security solution is in place.

Using the South University Online Library or the Internet, research the following: Planning and implementing a security solution for an organization Verifying security solutions Using the project report from Week 1 Project, complete the following tasks by adding 2- to 3-pages to your existing report: Recommend a mechanism that will implement user authentication before an employee can log on to the network. Recommend a method to secure the computers in the accounts department.

This should prevent users outside of the accounting group from accessing these machines. Recommend a method for enabling only the users in a department to access the department folder on the file server. Recommend an OS for the servers and for the workstations (these may be different OSs and subgroups may need different machines as well).

Describe how each of the OSs chosen will be updated and patched. Justify your choice based on the security of the OS along with cost considerations. Describe the implementation process and timeline for your recommendations. Try to give as reasonable a timeline as possible.

Create a section of your report for verifying the implementation of the security recommendations. This should include testing activities to make sure the security system is working properly. An example of this would be using an intentionally incorrect password to make sure the system does not allow the login.

Attachment:- Scenario.zip

Verified Expert

This paper presents a reinforced security report for ABC Inc that had been identified earlier. The major focus on this task was particularly planning the security of the OSs and implementing access control. Accordingly, key measures which have been identified include a consideration of physical security, virus protections, Authentication, and inclusion of back-up. If these measures are considered, then there is no doubt that the security of AB Inc will be enhanced.

Reference no: EM131988590

Questions Cloud

What is her monthly payment : If Jamie starts her first payment at the end of 13th month and makes 60 payments to pay the loan, what is her monthly payment?
Competitive strength assessment reveal about amazon : What does a competitive strength assessment reveal about Amazon 's e-commerce business, as compared to the leader's in the retail industry?
Prepare a type-written essay of five paragraphs : Prepare a type-written essay of five paragraphs to the following statement: In some countries ruled by dictators, poetry and other forms of creative expression.
Which of the following statements is true about exclusions : Students who misrepresent to their auto insurers where their cars are garaged take the chance of having no coverage at the time of a loss because.
Implementation of the security recommendations : Describe how each of the OSs chosen will be updated and patched. Justify your choice based on the security of the OS along with cost considerations
Explain why the statement is poorly written : Provide an example of a poorly constructed problem statement. Explain why the statement is poorly written.
What was the operating income for the month : Jarvix Company, which has only one product, What was the operating income for the month under absorption costing
Make sure to review the readings from lesson one : Make sure to review the readings from Lesson One. You are expected to understand this information.
Describe the compensation-benefits receive : Describe the compensation & benefits you receive at your organization and discuss which are the most important or valuable to you.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Analyze the security of the system compriosing the size of

alice has a picture-based password system where she has each user pick a set of their 20 favorite pictures say of cats

  Where is your configuration for the routing protocol

What routing protocol did you chose and why? Where is your configuration for the routing protocol? Where is your summarization configuration?

  Deliver an it risk assessment case study

Deliver an IT Risk Assessment Case Study in support of a significant technology decision that is to be taken by a fictional company called Aztek that operates in the Australian Financial Services sector.

  Describe a novel way you can use microscopy

Describe a novel way you can use microscopy to solve a real-world or fictional problem.  Describe the problem and current solutions, if any.

  Protecting intellectual property rights in software

Explain the reason of each of these approaches and explain how each of them can be used to protect property rights in software. Please include any experiences you have had with these methods.

  What remediation plans do you suggest

The fictitious company profiled is Flayton Electronics, a regional electronics chain with 32 stores across six states. What remediation plans do you suggest?

  How should organizations respond to security threats your

how should organizations respond to security threats? your response should be at least 200 words in length. you are

  Limits of information privacy

Question 1: Does the governments have the right to go our information privacy? Question 2: What is the limits of information privacy?

  Assignment on internet hacking

The topic is internet Hacking it should be at least 6 to 8 body pargraph, I just waana let you now that im not native english speaker so plese have easy vocabulary

  Describe data link control

Describe data link control

  Define principles of risk management that apply to industry

Define the principles of risk management that apply to the retail industry. Define steps for a retail loss-prevention program. Explain the security systems you incorporated in your loss prevention analysis.

  Content filtering and protection

How can these tabs be configured to provide: (a) content filtering and (b) protection from unwanted items like cookies?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd