Recognizing potential vulnerabilities

Assignment Help Basic Computer Science
Reference no: EM132403160

Securing Windows networks requires recognizing potential vulnerabilities and selecting the best control to address that vulnerability. You as a network administrator working for Ken 7 Windows Limited have been given the task of reviewing the current network security policy and recommending the best network security control to satisfy the policy. You can select from a short list of network security controls.

For each policy statement, select the best control to ensure Ken 7 Windows Limited fulfills the stated requirements, and write at least 2 pages about the tools you selected.

Select from these security controls:

Place a firewall between the Internet and your Web server.

Place a firewall between your Web server and your internal network.

Enforce password complexity.

Implement Kerberos authentication for all internal servers.

Require encryption for all traffic flowing into and out from the Ken 7 Windows environment.

Separate wired and wireless network entry points into separate logical networks.

Require all personnel attend a lunch and learn session on updated network security policies.

Security policy statements:

More and more users are using the Ken 7 Windows network to access social media sites during business hours, causing the network to slow down. Users should not use Ken 7 network resources for social media access.

Most Ken 7 personnel own mobile phones that can connect to the Internet. Ken 7 network administrators are concerned that personal device access may pose a security threat to Ken 7 network resources. Personal devices must not be allowed to connect to the Ken 7 Windows network.

Anonymous users of Ken 7 Web application should only be able to access servers located in the demilitarized zone (DMZ). No anonymous

Web application users should be able to access any protected resources in the Ken 7 infrastructure.

Users who print confidential reports must not be allowed to send reports to unsecured printers.

Passwords should not be words found in the dictionary.

Reference no: EM132403160

Questions Cloud

Discuss criminal law and civil law : This week we discuss criminal law and civil law, commonly referred to as tort law. What is the difference between criminal law and tort law?
Avoid the duplication of data within the database system : This module covers the concepts of data redundancy and the need for an organization to avoid the duplication of data within the database system.
Develop an algorithm to fins a subset of sorted elements : Develop an algorithm to fins a subset of sorted elements within a bigger set. Our customer does not care about how the algorithm is implemented as far as it is
Compare different cloud computing services : Compare and contrast two different cloud computing services (Amazon Web Service and Microsoft Azure). Explain the differences and the similarities and select.
Recognizing potential vulnerabilities : Securing Windows networks requires recognizing potential vulnerabilities and selecting the best control to address that vulnerability.
Best way to learn excel for financial analysis : What is the best way to learn excel for financial analysis? Please give a detailed answer need advice before graduating. I have very basic knowledge
Compute the dollar receipt of the euro receivable : The management of us company decides to use the money market hedge to deal with this euro account receivable,. explain the process of a money market hedge
Summarize one area of organizational conflict management : Prepare and submit a 2-hour long training session in the form of PowerPoint slides and training exercises and/or handouts. You already summarized the literature
What is the cost today of purchasing the car : What is the cost today of purchasing the car? What break-even resale price in two years would you make indifferent between buying and leasing?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd