Network security analyst for a small accounting firm

Assignment Help Basic Computer Science
Reference no: EM131046530

Assignment

You have been recently hired as a network security analyst for a small accounting firm. The firm is realizing that they need help to secure their network and customer's data. With your background and skills, they are looking to you to provide guidance. In addition to helping them secure their network, they require that you obtain your CompTIA Security+ certification within 60 days of being hired.

In addition to the owner, who serves as the overall business manager, there are about 20 people on staff:

  • 10 accountants
  • 3 administrative support specialists
  • 1 vice president
  • 1 financial manager
  • 2 interns

There is also one IT support technician on staff, who has basic computer hardware and networking knowledge. He has requested that the firm create a website, hosted internally, so that new customers can get information about the firm. This will be important to remember as you complete your final project.

The firm has a simple network. There are currently 20 computers and two multipurpose printers. All computers and printers are connected wirelessly to a NETGEAR MR814 device. This router is connected to a Motorola SB3100 cable modem. Staff e mail accounts are set up through the company's Internet provider. Employees use a combination of Microsoft Outlook and standard web browsers to access their e-mail. The owner is known to use his personal iPad during work hours to check and respond to e mail messages.

Prior to your hiring, they hired a network cabling contractor to run Cat 6 cables from the central wiring closet to all offices and cubicles. They want to move away from using wireless as the primary network connection, but want to keep wireless access for customers coming to the building. The technician who did the wiring mentioned to your supervisor that he should look into setting up a Windows Server domain to manage user access, instead of the current peer-to-peer network. He also recommended that the firm invest in a managed switch and a firewall, and look into having some backups. The internal IT support technician agreed with these recommendations but needs your help to implement them.

You've been asked to assess the current vulnerabilities and provide a recommendation to the firm's owner on how to better secure the network infrastructure. Now that you are aware of the firm's history, your assessment and recommendation should provide specifics about the network security settings that must be implemented and the equipment that must be procured, installed, and configured. The firm's owner has a basic understanding of computing, so it is important that you explain the technical issues in layman's terms.

In this learning demonstration, you will use the TestOut Security Pro to help you understand how to identify and assess network infrastructure and pass the CompTIA Security+ certification. In order to identify your strengths and weaknesses, you will first complete the practice exams that will prepare you for the certification. The practice exam is designed to assess your preparedness for the CompTIA Security+ certification exam.

The learning materials within LabSim will help you understand the different types of vulnerabilities within a network and how to address them. As you step through each set of activities, you will submit a Vulnerabilities Assessment and Recommendation Document in three separate parts.  Use the results of the certification practice exam you took at the beginning of the class to help guide you on which areas within LabSim you should pay closer attention to. You must complete all online labs in LabSim; these are the activities with the computer mouse icon. Some of the other areas in LabSim are optional. You can complete any or all of those if you feel you need to learn more about the topics at hand.

To get started, follow the steps below

Reference no: EM131046530

Questions Cloud

What are the differences in acute and chronic pain : What risk factors does John have for risk of opioid withdrawal during this hospitalization? Is there a stigma connected to being disabled and/or methadone?
What has your group accomplished : Describe how your group has worked this past week. What has your group accomplished? What challenges has your group faced? How has your group overcome the challenges?
Collector approves some of requests : Step 1: a remote data collector publishes sensing tasks to all mobile users (e.g., through smartphones carried by users) in the system. A task contains a task identifier and a task description. Step 2: the mobile users who are interested in a tas..
What are the benefits and challenges of using cds systems : Consider how a clinical decision support system provides evidence-based content to its users. What are the benefits and challenges of using CDS systems? How can this assist nurses in providing evidence-based care to their patients?
Network security analyst for a small accounting firm : You have been recently hired as a network security analyst for a small accounting firm. The firm is realizing that they need help to secure their network and customer's data. With your background and skills, they are looking to you to provide guid..
Analyze and describe the elements of the triple constraint : Analyze and describe the elements of the triple constraint in project management. Summarize how the triple constraint impacted management of an IT project from your experience.
List three methods of contraception : Discuss three actions that a woman can take to maintain her reproductive health. List three methods of contraception and describe the advantages and disadvantages of each.
Processes to select meaningful data : There are three types of DSS decisions: structured, semi-structured and unstructured. These types of decisions are dependent upon the information management, data qualifications and model manipulation needs of the company. Use the assumptions dire..
Define and provide two examples of web technology : What is the ability to protect IP referred to as? What are charts / graphics generally referred to as? Online business is generally referred to as... What is Web Technology? Define and provide two examples of web technology and where is has been imp..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Explain the results of the improvements you recommended

Post:Name the product and the associated password management protocol you selected. Analyse the good and bad practices of this protocol.

  Change your command prompt and append to the file

create a script file named "scales"5-5 (e.g. miller5-5) that performs the function described in Project 5-5

  Formatting worksheets project

In this project, you will work on an attendance log for a 16-week college course. For one section of the course, you will set up the sheet to print as an attendance sign-in sheet

  Review on sdlc

Review the steps of the SDLC. Explain why quality service delivery depends on the execution of the service delivery life cycle. Discuss the aspects of the SDLC that are critical to quality service management. Explain your answer.

  Write a multithreaded program

Make sure it is able to compile a program prog.c with pthread, do "gcc -lpthread -o prog prog.c" Need the: a) The code b) Screenshot of the terminal showing your program running with at least 8 (different) numbers as run-time input.

  Generate any words using the algorithm of theorem 42

For the following grammar, decide whether the language they generate is fine or infinite using the algorithm in theorem

  Technology have changed the way managers perform tasks

The four management tasks (planning, organizing, directing, evaluating) existed long before computers. Discuss how the use of computers and technology have changed the way managers perform these tasks.

  Find the equilibrium price and quantity

If the current price of the product is $100, what is the quantity supplied and the quantity demanded? How would you describe this situation, and what would you expect to happen in this market?

  Could a packet with all 0s or all 1s be a legal ipv4 packet

Could a packet with all 0s or all 1s be a legal IPv4 packet? Will the Internet checksum catch that error? Why or why not?

  Create a short email message on the importance of a college

Email the message to your instructor using the email address provided by them and carbon copy an alternate email address (you can use your own address).

  Create a flash movie that animates two figures

Create a flash movie that plays a sound clip of some music continuously while the movie plays

  Is the following statement true or false for penn state

Is the following statement true or false for Penn State

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd