What areas has chien not secured

Assignment Help Other Subject
Reference no: EM131468290

Question: Chiao Chien manages IT security for a school. Given the wide range of people who use the school's computers, it is difficult for Chien to prevent virus attacks. Chien has a reasonably good budget and has installed antivirus software on every machine. He also has a firewall that has all unneeded ports blocked, and there is a school policy prohibiting the downloading of any software from the Web. Consider the following questions:

¦ How secure do you think Chien's network is from virus attacks?

¦ What areas has Chien not secured?

¦ What recommendations would you make to Chien?

Reference no: EM131468290

Questions Cloud

What additional steps would you recommend to runa : Runa Singh is the network administrator in charge of network security for a medium-sized company. The firm already has a firewall, its network is divided.
Improve promotion satisfaction : What steps can organizations take to improve promotion satisfaction, supervision satisfaction, and coworker satisfaction?
How expensive are those strategies : Describe other ways that organizations can improve affective, continuance, and normative commitment, other than the strategies suggested in this chapter.
Online courses and more : How has technology helped colleges to make their teaching skills better and to be able to do online courses and more.?
What areas has chien not secured : Chiao Chien manages IT security for a school. Given the wide range of people who use the school's computers, it is difficult for Chien to prevent virus attacks.
Favor face-to-face communication over : Why would Teresa Carleo and Steve Martucci favor face-to-face communication over email when dealing with customers? Provide details to support your response.
Identify three categories of process improvements : Categorize process analysis techniques which are utilized at the various phases of process improvement.
Resides on secure computers managed off-site by a vendor : traditional client/server software application that resides on secure computers managed off-site by a vendor
Compare and contrast the tools to nmap : Use your favorite search engine to locate at least two other port scanners. Download and install them, then try them on your own machine or a designated lab.

Reviews

Write a Review

Other Subject Questions & Answers

  Long term ethnographic study of street gangs

A long term ethnographic study of street gangs in chicago revealed that they:

  Do you agree or disagree with the proposed changes

Are you in support of the current Electoral College? Do you agree or disagree with the proposed changes? Is it right for states to circumvent the Constitution on this matter?

  What is something that you agree with

What is something that you agree with? What is something that you disagree with? Relate this material with something within class discussion/lecture/current news

  Develop an implementation plan

Method of obtaining necessary approval(s) and securing support from your organization's leadership and fellow staff.Description of current problem, issue, or deficit requiring a change. Hint: If you are proposing a change in current policy, process,..

  Role and importance of ethics in business environment

Define the role and importance of ethics in business environment - Identify the ethical behavior for different activities of the organization and Apply ethical principles for the treatment of shareholders, employees and the customers

  Policy distinction between war on terror

Often times, groups like the Revolutionary Armed Forces of Columbia (FARC) are described as Narco-Terror groups. However, the U.S. makes a clear policy distinction between the war on terror, which is really a war to counter violent islamist extrem..

  Explain branding strategies that marketers use to develop

What is a brand strategy, and how does brand equity relate to it? Explain branding strategies that marketers use to develop new brands and also give an example of each strategy as well.

  Describe the major life events of the theorist

Describe the major life events of the theorist that you feel influenced his or her personality development and Describe the cultural influences

  Discuss how you would weigh out the risks

Discuss how you would weigh out the risks and the benefits to decide if you should move forward with your evaluation plan.

  Who is most responsible for failure of foreign aid working

Who is most responsible for the failure of foreign aid working and how are they failing? What are some of the most significant problems that developing states face on their road to development?

  Distinction between appearances and reality

Explain the difference between these two statements ("I see a tree" and "There is a tree")? And how can we know that our experience is actually caused by something that is outside of our minds?

  Cultural awareness in the work environment.

Identify three steps you would take to bring about cultural awareness in the work environment. Your response should include at least one step to address cultural differences among employees and one step on how you would address cultural differences b..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd