Recognizing potential vulnerabilities

Assignment Help Basic Computer Science
Reference no: EM132403160

Securing Windows networks requires recognizing potential vulnerabilities and selecting the best control to address that vulnerability. You as a network administrator working for Ken 7 Windows Limited have been given the task of reviewing the current network security policy and recommending the best network security control to satisfy the policy. You can select from a short list of network security controls.

For each policy statement, select the best control to ensure Ken 7 Windows Limited fulfills the stated requirements, and write at least 2 pages about the tools you selected.

Select from these security controls:

Place a firewall between the Internet and your Web server.

Place a firewall between your Web server and your internal network.

Enforce password complexity.

Implement Kerberos authentication for all internal servers.

Require encryption for all traffic flowing into and out from the Ken 7 Windows environment.

Separate wired and wireless network entry points into separate logical networks.

Require all personnel attend a lunch and learn session on updated network security policies.

Security policy statements:

More and more users are using the Ken 7 Windows network to access social media sites during business hours, causing the network to slow down. Users should not use Ken 7 network resources for social media access.

Most Ken 7 personnel own mobile phones that can connect to the Internet. Ken 7 network administrators are concerned that personal device access may pose a security threat to Ken 7 network resources. Personal devices must not be allowed to connect to the Ken 7 Windows network.

Anonymous users of Ken 7 Web application should only be able to access servers located in the demilitarized zone (DMZ). No anonymous

Web application users should be able to access any protected resources in the Ken 7 infrastructure.

Users who print confidential reports must not be allowed to send reports to unsecured printers.

Passwords should not be words found in the dictionary.

Reference no: EM132403160

Questions Cloud

Discuss criminal law and civil law : This week we discuss criminal law and civil law, commonly referred to as tort law. What is the difference between criminal law and tort law?
Avoid the duplication of data within the database system : This module covers the concepts of data redundancy and the need for an organization to avoid the duplication of data within the database system.
Develop an algorithm to fins a subset of sorted elements : Develop an algorithm to fins a subset of sorted elements within a bigger set. Our customer does not care about how the algorithm is implemented as far as it is
Compare different cloud computing services : Compare and contrast two different cloud computing services (Amazon Web Service and Microsoft Azure). Explain the differences and the similarities and select.
Recognizing potential vulnerabilities : Securing Windows networks requires recognizing potential vulnerabilities and selecting the best control to address that vulnerability.
Best way to learn excel for financial analysis : What is the best way to learn excel for financial analysis? Please give a detailed answer need advice before graduating. I have very basic knowledge
Compute the dollar receipt of the euro receivable : The management of us company decides to use the money market hedge to deal with this euro account receivable,. explain the process of a money market hedge
Summarize one area of organizational conflict management : Prepare and submit a 2-hour long training session in the form of PowerPoint slides and training exercises and/or handouts. You already summarized the literature
What is the cost today of purchasing the car : What is the cost today of purchasing the car? What break-even resale price in two years would you make indifferent between buying and leasing?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Implement an interpolation search

Above the current value of lower. Implement an interpolation search and compare its performance with the log2 n performance of the binary search. Use a uniform random number generator to produce the array a. Note that this array will need to be sor..

  Explain how this principle impacts data security

Read five articles and discuss the principle of least privilege in at least 500 words. Explain how this principle impacts data security.

  How much is the stock worth if you want

It has maintained a dividend growth rate of 7% in the past and expects to maintain that indefinitely.

  Determining the after-tax marr

The? firm's tax rate is 35 ?%, and its? after-tax MARR is 15 ?%. Should the machine be? purchased?

  Development of the current issue

Describe Starbucks and the Issue How has the current corporate culture facilitated the development of the current issue?

  Addition to sorting and filtering cells by content

In addition to sorting and filtering cells by content, you can sort and/or filter by _____.

  List the criteria of revenue recognition

. Evaluate the accounting standard in terms of the principle of revenue recognition and matching. List the criteria of revenue recognition, and suggest when it would be appropriate to recognize the revenue from a ticket sale.

  Explain the requirements for an economy to increase

Explain the requirements for an economy to increase its production capabilities (economic growth). is the United States doing a good job of promoting economic

  Brand of oatmeal for breakfast for one month

The decrease in cholesterol level after eating a certain brand of oatmeal for breakfast for one month in people with cholesterol levels over 200

  Create a cost model for higher-level operations in c++

Exercise 7-7 involved writing a program to measure the cost of various operations in C++. Use the ideas of this section to create another version of the program.

  Describe the scenario and write code fragment or a complete

1.  Think of a real world scenario that could use loops.  Describe the scenario and write code fragment or a complete program to implement the scenario 2.  Think of a real world scenario that could use conditional statements.  Describe the scenario ..

  Demonstrate a series of edges

Why is it necessary to check that the gradient magnitude is large at zero crossings of the Laplacian of an image? Demonstrate a series of edges for which.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd