Potential security weaknesses of the chosen company

Assignment Help Computer Network Security
Reference no: EM13926944

This report identifies the potential security weaknesses of the chosen company and explains potential solutions of the security weaknesses. According to the information provided, there are potential vulnerabilities in hardware and policy of the company. According to the network infrastructure of the company, there is no firewall has been setup between the Internet and the commercial division of the company. The solution to this hardware weakness would be to buy and install a firewall where needed. Also the security policy requires that all firewalls and router rule sets are evaluated every two years. The solution to this policy weakness would be to update the new rule sets and evaluate them semi-annually. In this report these weaknesses and their solutions will be explained in detail.

Reference no: EM13926944

Questions Cloud

Greater yellowstone ecosystem : Jim Fowler once said, "Our challenge for the future is that we realize we are very much a part of the earth's ecosystem, and we must learn to respect and live according to the basic biological laws of nature.
Impact of illicit drug use on our society : After you've spent some time reviewing the data in the ONDCP, it's Data Supplement, ADAM and DAWN reports, discuss one or more of the findings that you found most interesting and explain.
Total value represented by one e-mini : Recently, the E-mini contract closed at 2065. What was the total value represented by one E-mini S&P contract as of the day of that close?
History of the environmental movement : What would you include in a brief summary on the history of the environmental movement?
Potential security weaknesses of the chosen company : This report identifies the potential security weaknesses of the chosen company and explains potential solutions of the security weaknesses.
Determining the navigation system for website : When creating a navigation system for your website, what do you think are the top three things that you should be careful of and/or need to include in your work? Include examples and explanations for your choices.
What was the effect of this legislation : What was the effect of this legislation? How did it impact the war on drugs efforts? What evidence can you find to suggest the Patriot Act is helping our war on drugs efforts, or conversely, having no impact at all?
Developing a security evaluation process : You are responsible for developing a security evaluation process that can be used to assess various operating systems both during and after development.
Find an article about a crime : In this assignment, you will apply the theories you have studied to a particular crime. Conduct an Internet search and find an article about a crime in which you are interested ( I choose Mass Shooting Murder) Crime stories are in the news every d..

Reviews

Write a Review

Computer Network Security Questions & Answers

  Discuss thoroughly vpns and how they are implemented

Discuss thoroughly VPNs and how they are implemented and Discuss both symmetric and asymmetric cryptographic algorithms. Also, explain cryptographic tools. Which should FDU consider

  Monitoring of a secure network design in an organization

Analyze strategies for maintenance and monitoring of a secure network design in an organization. Create recommendations for maintenance and monitoring tools to support maintenance of a secure network within an organization

  Review an article which focuses on the basics of

write 400-600 words that respond to the following questions with your thoughts ideas and comments. this will be the

  Describe network crimes related to dns entry alteration

Describe network crimes that are related to DNS entry alteration or bogus DNS servers. In a network investigation, some network administrators may be cooperative while others may not.

  Describe the features of telecommunications networks

Describe the features of telecommunications networks

  How do concepts like secure socket layer

How do concepts like secure socket layer

  Report of network security

Report of network security solutions around 3 to 4 pages . Example and reasons for evertything thats needed for the sercurity.

  Create another working signature and message

Using the RSA public key (e, n) = (1612093, 97059503) and the plain message/signature pair [m, s] = [12345678, 41009275] create another working signature and message pair without factoring the RSA modulus.

  Enlist the correct number of dns servers that would be need

Enlist the correct number of DNS servers that would be needed?

  Provide the ip address of the host used by the perpetrator

Provide the IP address of the host used by the perpetrator. Based on this information, what can you tell about the profile of this individual? Explain why.

  Data standards and data security

Data Standards and Data Security

  What data can you leak when using public hotspots

What data can you leak when using public hotspots and how can you protect yourself when using them

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd