Preview

Executive Summary On Risk Analysis: Premier Collegiate School

Satisfactory Essays
Open Document
Open Document
377 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Executive Summary On Risk Analysis: Premier Collegiate School
Unit 1- Assignment Executive Summary on Risk Analysis In the given scenario of being the system support tech at the Premier Collegiate School, performing a risk analysis of the school infrastructure is highly important when wanting to secure the network. The school has two servers, one for administration and the other for students which seems kind of odd. And has a wireless access for the students with their own laptops. There is also one computer lab that is dedicated for the students to perform their computer science studies. The first portion that comes to mind is the access control security on the servers, sure they have 2 servers dedicated for separate values, but I would rather have the AD all on one computer with the permissions

You May Also Find These Documents Helpful

  • Satisfactory Essays

    The university network was a victim of a DDoS attack. Whereby a cyber criminal first acquired administrator access. We suspect that the attacker gained access to the network from an internal computer, most likely from a student PC in one of the labs. The attacker likely used keylogger software to discover administrator credentials.…

    • 508 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    High: There are major disruptions if the business lost more than a week, which affects parts of the…

    • 1105 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    IS3110 U5L1

    • 912 Words
    • 4 Pages

    One of the most important first steps to risk management and implementing a security strategy is to identify all resources and hosts within the IT infrastructure. Once you identify the workstations and servers, you now must then find the threats and vulnerabilities found on these workstations and servers. Servers that support mission critical applications require security operations and management procedures to ensure C-I-A throughout. Servers that house customer privacy data or intellectual property require additional security controls to ensure the C-I-A of that data. This lab requires the students to identify threats and vulnerabilities found within the Workstation, LAN, and Systems/Applications Domains.…

    • 912 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    RLOT2 Task 2 B rev 1

    • 569 Words
    • 2 Pages

    Defense in Depth provides the university several layers of protection. Starting at the endpoints, host intrusion protection (HIPS), should be installed on each Device. Properly installed, HIPS will not permit the installation of unauthorized programs. This was the root cause of the (D)DoS recently experienced. At the routers access control lists (ACLs) must be put in place to allow only traffic with a legitimate protocol and destination. Between the routers and the endpoint a firewall solution must be put in place. The firewall must be configured to allow only allowed protocols and port numbers to communicate with specific destinations. Between the firewall and endpoint a (D)DoS a detection tool (such as Arbor’s Prevail) must be put in place. This measure not only allows for quick detection of (D)DoS it also permits the automatic mitigation of the…

    • 569 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Network: The network should be designed with security in mind. Its structure must support the company’s policies, relevant laws and regulations, without impairing the organization’s ability to conduct business. The network should be logically and physically separated into distinct and manageable security zones. Traffic between the security zones must be inspected and filtered, to ensure that only authorized network use is permitted, and all access is recorded for future auditing. Multiple devices and methods should be used to ensure security across all parts of the network. In preparing this recommendation, network security design principles have been drawn from the Cisco SAFE Reference Guide [33] and the Council on CyberSecurity’s Critical Security Controls for Effective Cyber Defense Version 5.1 [34].…

    • 598 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Compute the risk score for each of these individuals using both theMissouri and Washington Risk Assessment models.…

    • 415 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Before going away to college, decide on whether you want to take your car. If you go to school in a big city, parking might be an issue. There are expenses that are involved with maintaining a car, and due to your studies, it might not even be affordable to have one.…

    • 441 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 3 Risk Assesment

    • 265 Words
    • 2 Pages

    |3rd |This would not cause as much harm to the children but it would put them off of eating the food and |…

    • 265 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Business Case

    • 2402 Words
    • 10 Pages

    Intelligent Imaging Solutions (IIS) is a public corporation that is headquartered in Dallas, TX, that competes in the global market for consumer navigation systems (GPS) and in the military defense industry. Their organization consists of two divisions. The first division produces products for consumers and the second division produces products for the military. For consumer products Intelligent…

    • 2402 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    I had my hearing; they told me I had a 15,000 dollar bond. The judge asked me if I wanted to be appointed a lawyer or wanted to hire one. I told the judge I have no money, my mom barely gets buy and I would like to have a free one. He told me in my current situation that if I get bonded out that I could still get a free lawyer to help me with my case. Hope my mom can get me out today.…

    • 1071 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    7.1 explain the risk and possible consequences for children and young people of being online and using a mobile phone.…

    • 425 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    appropriate to manage these risks. IT managers then present this information to the senior management.…

    • 789 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    How does the leadership and governance of a health care organization influence the development and implementation of risk-management and quality-management policies?…

    • 289 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Risk Assessment Paper

    • 907 Words
    • 3 Pages

    Leukemia is the malignant disorder of white blood cells in which the cells become abnormal and divide without control or order. Hematopoietic stem cells, also known as hemacytoblasts, are found in bone marrow and are the precursor to erythrocytes (red blood cells), leukocytes (white blood cells) and thrombocytes (platelets). Leukemia is caused by the mutation of the bone marrow pluripotent or most primitive hematopoietic stem cells (Caldwell, 2007). The mutations during hematopoiesis causes uncontrolled proliferation of stem cells resulting in overcrowding of bone marrow and decreased production and function of normal hematopoietic cells (Huether, 2012). The leukemic stem cells will then enter the blood stream affecting other organs such as the liver, spleen, lymphnodes, and under certain circumstances the central nervous system. The mutant clone may demonstrate unique morphologic, cytogenic, and immunophenotypic features that can be used to classify the particular type of leukemia (Caldwell, 2007). Leukemia can be fatal if left untreated because of the inhibited ability to produce and provide normal red blood cells, white blood cells, and plates to maintain homeostatic mechanisms.…

    • 907 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Investment techniques used in corporate finance when making decisions on projects usually focuses on cash flows of the firm (Ross, Westerfield, and Jaffe, 2004). Because of drastic changes in the business environment over the last decade, managers are requesting better, more accurate information, and improved techniques to meet company needs for making major decisions with data consisting of clear goals, a planned design, high ethics, revealed limitations, adequate analysis, and justified conclusions (Cooper and Schindler, 2003). In this paper, the methods of net present value and internal rate of return are examined based on real-world capital budgeting decisions. This paper also gives insight on valuation techniques used to determine internal and external investment decision strategies and the risk associated with the investment decisions.…

    • 1446 Words
    • 6 Pages
    Better Essays