Preview

440iLabWeek7Complete

Satisfactory Essays
Open Document
Open Document
152 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
440iLabWeek7Complete
D02600712
NETW420
DeVry University Online

Week #7 iLab:
Lab 5: Accounting Management Lab

Required questions from the Report section of the lab (75%)

Insert Graph showing the time averages that are requested in the lab outline.

*1

*2

*3

Insert Graph showing the time averages that are requested in the lab outline.

*4

*5

*6

Insert Graph showing the time averages that are requested in the lab outline.

*7

*8

*9

*10

*11

*12

Lab Summary Report (25%)

*13 Add in one to two page summary as indicated in the lab report here.

In this Lab I built a network that consists of various departments within an organization that utilize the internet to access the company servers. Upper management suspects that various departments within the organization are abusing the network resources by downloading music movie trailers in strict violation of company policy. I have monitored the network and the abuse of the network resources. I have taken corrective measures to track the abuse back to the appropriate department involved.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Is3110 Week2 Assignment

    • 348 Words
    • 2 Pages

    For this assignment, imagine that you work for U.S. Industries, Inc. as a network administrator. Your…

    • 348 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    : ACC 571 - Strayer. Tags: acc 571, acc 571 strayer, acc 571 strayer tutorials, acc571, assignment 1, Assignment 1: Corporate Fraud Schemes, assignment 2, Assignment 2: Cybercrimes and Computer Security Systems, Assignment 3, Assignment 3: Fraud Schemes and Fraud Investigations, Assignment 4, Assignment 4: Asset Misappropriation and Corporate Governance, Forensic Accounting.…

    • 293 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    PT1420week5exdkinney

    • 404 Words
    • 2 Pages

    References: Gaddis, T. (2010). Starting out with programming logic & design. Boston, MA: Addison- Wesley/Pearson Education, Inc.…

    • 404 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    HaleIS3350Week08

    • 149 Words
    • 1 Page

    1. Complete Lab 8: Cyber stalking or Cyber bullying and laws to protect individuals: Review steps 1 – 5 on pages 61. Select a cyberstalking or cyberbullying case. Review case and answer questions 1 – 5 (pg. 63– 64)…

    • 149 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    VUT2 Task 1 Memo CheckList

    • 1884 Words
    • 7 Pages

    information security intrusion to the entire organization, and not just that particular computer, for the…

    • 1884 Words
    • 7 Pages
    Better Essays
  • Good Essays

    HIS115Week1Assignment

    • 743 Words
    • 4 Pages

    Complete the grid by describing the characteristics listed in the left-side column for the five groups named.…

    • 743 Words
    • 4 Pages
    Good Essays
  • Good Essays

    FINS1613

    • 1295 Words
    • 8 Pages

    2. You must not retain any part of this examination document. All examination materials including this document must be submitted at the completion of the examination, otherwise your exam will not be marked.…

    • 1295 Words
    • 8 Pages
    Good Essays
  • Satisfactory Essays

    Activity 8-9: Evaluate an acceptable use policy. Learn whether the organization where you work or attend school has an acceptable computer use policy for employees or students. Make a list of activities that are permitted and those that are not permitted. Identify on your list those activities that are illegal and those that are not permitted according to organizational policy. Compare your organization’s computer use policy with the University of Oregon’s policy referenced in the chapter. Describe the similarities and differences.…

    • 477 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Unit 2 Lan

    • 272 Words
    • 2 Pages

    Define a LAN-to-WAN, Internet, and Web surfing AUP that restricts usage of the company’s Internet connection and permits the company to monitor usage of the corporate Internet connection. Carefully evaluate the implications of each policy and how implementations might impact the IT infrastructure, both positively and negatively. Weigh the benefits and the disadvantages of each method. Consider whether or not a proposed solution causes an interruption to the legitimate users and how it might bring security at the expense of preventing a perfectly legitimate…

    • 272 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Psy101week1Document

    • 496 Words
    • 4 Pages

    Maureen is a psychology major who is conducting a study on memory. The participants in her experiment study a long list of words and then recall the list by verbalizing the words to Maureen. Maureen knows which words are correct, and whenever a participant states an incorrect word, Maureen inadvertently shifts her eyes and makes a note on her notepad. As a result, the participants change their recall behavior and tend to recall fewer words thereafter. This scenario illustrates a(n) ________.…

    • 496 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Advanced Topologies, Inc. needs to look at its Human Resources department and how they train their new employees. Right now the threat will mostly come from Matthias because he has been working without the knowledge needed to look for security threats. Without the right training for your employees, you run the risk of being your own threat. To remove the risk that Matthias may bring to ATI, he should have been properly trained before starting. All administrators should have the information security training before working on ATI’s network. Alfonso should be aware of what security concern will affect ATI, but as the superior, he did not seem overly concerned about the security of the network. Ensuring that personnel have the right skills to administer your network is a plus for a superior. Alfonso should not have not allowed Matthias to work on the network, without first informing him of all of his responsibilities. Once the inside threat has been removed we can now move on to looking at other users. Network monitoring is just important as knowing how your network runs. With the right training, you will know what threats to be aware of.…

    • 621 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Week 5 Quiz

    • 531 Words
    • 3 Pages

    Spamming coworkers Accessing prohibited websites Purposely circumventing security policies Sending files with sensitive data outside the organization.…

    • 531 Words
    • 3 Pages
    Good Essays
  • Good Essays

    thesis

    • 2423 Words
    • 9 Pages

    Have all employees sign an acceptable use policy outlining what is and isn’t allowed on the network and the repercussions of violating this agreement…

    • 2423 Words
    • 9 Pages
    Good Essays
  • Good Essays

    Network baselining is the process of interpreting and understanding of data called baseline analysis. It allows you to discover the true performance and operation of the network. To determine whether a network could deliver a particular policy you need to measure the network’s current performance. By obtaining a baseline of system or network behavior I would need NBAD or Network Behavior Anomaly Detection. NBAD is an integral part of Network Behavior Analysis which offers security and it continuously monitoring the network for any unusual events or trends. A malicious abuse is the number one cause of today’s internet traffic. Anomalies such as worms, port scans, denial of service attacks, etc., these we could found at any time in the network traffic. These anomalies are waste network resources which can cause performance ruin of network devices and end hosts. It may lead to security issues concerning all internet users. Suppose an attacker intrudes on one of the servers. The first place to check is the Log Files for administrative issues and security activity. Log Files contains complete records of all security events, e.g. log one events, resource access, attempted violations of policy and changes in system configuration or policies. And also, Critical System events that can follow admin to quickly discover the root that causes the issue. We can also identify bad system or network activities by observing anomalies from baseline behavior or identifying certain suspicious actions. Monitoring the individual network subscribers by having NBAD or Network Behavior Anomaly Detection, this can tracks also the critical network characteristics in real time and it generates an alarm if a strange event or trend is detected that could indicate the presence of a threat. Need to consider that even legitimate…

    • 607 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Che 112

    • 351 Words
    • 2 Pages

    Copies of lab pages attached; labeled with name and date, complete information, readable, data recorded matches results given in report…

    • 351 Words
    • 2 Pages
    Good Essays

Related Topics