Presenter notes section of the presentation

Assignment Help Basic Computer Science
Reference no: EM13922120

As the network administrator for a medium-sized health clinic, you wear many hats in your role. The health clinic recently dismissed a nurse that had been with the clinic for over 10 years. Letting this nurse go is quickly becoming more complicated, since the nurse had access to many files, the computer system, and even building keys. Your supervisor fears that this nurse may retaliate against the clinic.

The staff members at the clinic use the Internet extensively to check patients' insurance and to authorize insurance claims. Shortly after dismissing this nurse, staff members throughout the clinic start to complain that the Internet has become so slow that it is unusable. The clinic uses a network appliance that functions as router, firewall, and wireless network access point. You have noticed that several rules on the firewall that would deny protocols, ports, or IP addresses have been disabled. You suspect that someone may have cracked the password to the firewall to accomplish this. Given that the firewall is remotely accessible, you suspect that the password was cracked without the perpetrator entering the building. The network intrusion detection system (NIDS) currently in place monitors network traffic by means of a sensor. Unfortunately, the NIDS had been slowing down network traffic prior to this most recent incident, so it had been disabled. The initial thought was that someone had re-enabled the NIDS, but that was not the case; it was disabled at the time of the incident.

After further investigation, you discover that the nurse's spouse is a very skilled computer programmer, and you also suspect that the nurse's spouse may have assisted the nurse in sabotaging the clinic's computers. You report your suspicions to your supervisor, who agrees with your conclusions.

You have been asked to evaluate the DoS and intrusion detection system (IDS) security analysis conducted after the recent DoS attack at the clinic. As part of that evaluation, you are to prepare a briefing for the staff at the clinic to help them understand the results of the security analysis, become more aware of the nature of DoS attacks and other network security attacks, and learn how they can help prevent attacks.

For this task you will be expected to follow the incident handling guidelines for DoS attacks as specified in Special Publication 800-61 from the National Institute of Standards and Technology (NIST) titled "Computer Security Incident Handling Guide." The section on incidents/attacks begins on Section 3 "Handling an Incident" (page 21). You can download this publication from the link listed in the web links section.

Task:

A. Create a multimedia presentation (e.g., PowerPoint, Keynote) (suggested length of 12-15 slides) in which you do the following:

Note: The slides in your presentation should include only the main points you wish to make, with more extensive information included in the presenter notes section of the presentation.

1. Discuss the DoS security analysis.

a. Explain how to evaluate a DoS/IDS security analysis in terms that nontechnical personnel would understand. Include the following.

  • Detection and analysis
  • Containment, eradication, and recovery
  • Post-incident recovery

2. Illustrate how all employees can help maintain network security when on the Internet and when using e-mail.

B. Create a memo (suggested length of 1-2 pages) to your supervisor justifying why the clinic should either update the current IDS or acquire and implement a new IDS.

1. Recommend a list of controls to address the security faults mentioned in this scenario.

C. If you use sources, include all in-text citations and references in APA format.

Reference no: EM13922120

Questions Cloud

Calculate operating cash flows of project- firms tax bracket : Laurel’s Lawn Care, Ltd., has a new mower line that can generate revenues of $180,000 per year. Direct production costs are $60,000, and the fixed costs of maintaining the lawn mower factory are $25,000 a year. Calculate the operating cash flows of t..
What is maximum price per share that dunbar should offer : Dunbar LTC, a national nursing home chain is considering purchasing a smaller chain, Eastern Nursing Homes. Dunbar's analysts project that the merger will result in free cash flows to equity holders with a present value of $72.52 million and they ..
Evaluate opportunity costs in the decision making : Missing a hypothetical question on opportunity costs is inconsequential. Managers can destroy significant value if they make mistakes in evaluating opportunity costs in their decision making.
Jesper parnevik plans to contribute : Jesper Parnevik borrowed $96,370 on March 1, 2012. This amount plus accrued interest at 10% compounded semiannually is to be repaid March 1, 2022. To retire this debt, Jesper Parnevik plans to contribute to a debt retirement fund five equal amounts s..
Presenter notes section of the presentation : Note: The slides in your presentation should include only the main points you wish to make, with more extensive information included in the presenter notes section of the presentation.
Explain crummey powers and how they are used : Explain Crummey Powers and how they are used. What is the benefit of such an arrangement? Give some examples.
Calculate a table of interest rates for 5 years : Future value of single sum problem. You put $2,000 in an investment account today which will earn 8% over the next 14 years, what is the future value?
Lease payments and utilities on the production : During its first year of operations, Silverman Company paid $14,000 for direct materials and $19,000 for production workers' wages. Lease payments and utilities on the production facilities amounted to $17,000 while general, selling, and administrati..
Assignment on database management systems : This lab assignment is to practice data modeling of a given user view of an online retail store.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd