Preview

is 4670 Week 1 Assignment 2

Satisfactory Essays
Open Document
Open Document
292 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
is 4670 Week 1 Assignment 2
Kenneth Anderson
IS 4670
Week 1 Assignment 2

After reviewing the new network design, we have seen several threats and came up with countermeasures to prevent these attacks. The first threat is the connection between the internet and the company’s router and connection between the wireless router and switch. Hackers, viruses, and malware can easily get in through this connection and infect the network. The countermeasure for this is a firewall or intrusion detection system. This equipment will help detect any unwanted guests the get onto the network. You can control what traffic comes in and out of your network. Next would be the wireless router being unsecured. If this router is left open and SSID board casting, any within its range can access the company’s network. A countermeasure for this is password encryption and stealth id. Hiding the id of the router will allow it to be hidden from anyone scanning for wireless routers to use. Encryption password puts a lock on the router to where only people with the key can access the router. The last threat would be the workstations and laptops. Users make the most mistakes on these machines. They download and go to places they shouldn’t which causes the risk of viruses and hackers. Countermeasures are Anti Viruses, patches, and teaching. Anti-viruses will help protect against viruses and malware that can allow hackers to enter the system and still information. It’s important to keep the definitions up to date so the AV can protect against the latest viruses. Updating OS with patches can also prevent security threats. Teaching users the dos and don’ts of security issues can help them be aware of the threats and what they should do to help prevent risks from occurring.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Com/155 Week 2 Assignment

    • 641 Words
    • 3 Pages

    What is the Writing process?The writing process is what you will need to go by when writing for essays and future classes.I have included a few tips throughout this template to help you get started. • You will need to identify the components of a basic sentence.• You will need to be able to identify the four most serious writing errors.• Define subject-verb agreement.• Identify common errors in subject-verb agreement.• Recognize regular and irregular verbs• Use regular and irregular verbs correctly in basic sentences.…

    • 641 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Fi 515 Week6 Exam

    • 942 Words
    • 4 Pages

    These are the automatically computed results of your exam. Grades for essay questions, and comments from your instructor, are in the "Details" section below.…

    • 942 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    BSA 310 Week 1 Assignment

    • 768 Words
    • 5 Pages

    All finance and accounting systems applications support (as are all other Huffman Systems) to include hardware, modifications, version updates, etc.…

    • 768 Words
    • 5 Pages
    Good Essays
  • Good Essays

    You Decide- Sec572 Week 2

    • 577 Words
    • 3 Pages

    To develop network security strategies that will ensure that the organization's network is protected from both internal and external security risks. A summary of the steps I can take to mitigate the risk in the following areas: Denial-of-Service attacks (DoS), Distributed Denial-of-Service attacks (DDoS), Masquerading and IP Spoofing, Smurf attacks, Land.c attacks, Man-in-the-Middle attacks.…

    • 577 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Steele School is a large childcare center that enrolls children from ages 6 weeks to 12 years, depending on the season. There are nine teachers and a few assistant teachers; the assistant teachers are chosen based on parent feedback. Steele School wishes to understand the reason parents choose one assistant teacher over the other, specifically if the decision is based on the parent’s satisfaction with the assistant teacher. A survey is handed out to parents where basic questions are asked about the daycare and the main question is asked: What is your rating of _____ assistant teacher from 0 to 10 where 10 is the best? The results are analyzed and put into two groups – Group1 is the ratings of assistant teachers that are chosen, while Group 2 is the ratings of assistant teachers that are not chosen.…

    • 318 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    week 8 WLAN checkpoint

    • 287 Words
    • 2 Pages

    For a business setting up a WLAN security is very important and should be top priority. If you do not secure your WLAN you are opening your business up to hackers that can ruin your business. Before you set up the WLAN a site survey should be done. This will determine what level of exposure your company is at and help decide how much security is needed.…

    • 287 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    FDR 531 Week 1 Assignment

    • 659 Words
    • 3 Pages

    During the nearly 19 years of dedicated service at Procter & Gamble, presently Kellogg’s, it has been my endeavor to pro-actively learn, consistently grow, and successfully “contribute to the process of finding solutions and achieving goals as a team” in a positive environment. And, I continue to willingly stretch beyond set requirements while remaining a benefit and anticipating the recognition and rewards for my efforts. Evaluations, emails, and verbal accolades from my peers, management and upper management as well as promotions have reinforced my actions. I expand my efforts by seeking greater responsibilities and leadership roles which has been supported by my management. With regard to effective communication, experience has proven that…

    • 659 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Refusal rate of contact can be overcome with frequent calls which can enhance the probability of sample to reach the conclusion about population in accurate way. Personal biases of personal interview survey are also reduced as there are no visible interaction between the caller and respondent where the body language, actions at the time of interview or other factors of place can raise bias. Still distracting noise in the background can affect the quality of survey where message is not passed properly to the recipients.…

    • 1255 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Com/155 Week 2 Assignment

    • 299 Words
    • 2 Pages

    The most important reason to follow a structured writing process is to make the writing clear and understanding for the audience. Structure is opportune in several ways that are both time saving as well as just plain out easy to work with. Structure lays the paper out for the writer in a clear and uncomplicated to work with manner. Having the paper already laid out is a colossal time saver. The time saved is very useful, because it gives the writer the opportunity to take that time and spend it on the contents of the paper rather than the lay out. Structure allows the reader to definitely comprehend the writing. Using structure compels organization in the papers, which has numerous effects. Having structure prevents writers from distressing how to include their ideas into their writing and allows them to arrange their ideas in a predetermined area of the piece of writing. The structure produces an exceptional amount of time that would have been wasted, and the extra time can be spent on refining the writing.…

    • 299 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Com/156 Week 6 Assignment

    • 1142 Words
    • 5 Pages

    Rogak, L. (2011). The Dogs of War: The Courage, Love, and Loyalty of Military Working Dogs. New York, NY: Thomas Dunne Books.…

    • 1142 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Network Hardening

    • 287 Words
    • 2 Pages

    It is very important to go through the process of hardening. Hardening is where you change the hardware and software configurations to make computers and devices as secure as possible. I picked the network layout 1-the workgroup . First with the workstations and laptops you need to shut down the unneeded services or programs or even uninstall them. I would also have some good anti-virus software on the workstations. You also need a hardened image for all of your workstations. To do this you need to install a new copy of the operating system and then harden it. After you have one good hardened workstation you can use it as a model for all other workstations and also laptops. For the router you definitely need to protect it from unauthorized access. The router needs to be password protected and you should periodically change that password. For the cable modem you should keep all unwanted ports closed. I would also schedule a regular scan of all the systems. Now for some of these next things I am talking about they will apply to all devices . Disable remote administration. Administration of your router / access point should be "local only", namely, there is no reason to let people from another country access to your network hardware. If you need to make changes, you should be local to the device. Update the firmware. Believe it or not, consumer network hardware needs to be patched also. Check the support site of the vendor of the device when you get it and check for an update. Sign up for e-mail alerts for updates, if available, or check back on a regular basis for…

    • 287 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    You should always write while considering the purpose, tone, and audience. The purpose is the reason the writer composes the paragraph. The tone is the attitude the writer conveys about the paragraph’s subject. The audience is the individual or group with whom the writer intends to address. A very important aspect of academic writing should be the quality of writing. The writing quality is especially important when you are seeking to be published. It is very important to put a lot of effort ensuring that the writing style of an academic essay is up to par. The content for academic writing should be well identified by the topic. The reader is expecting that the content matter will be related to the topic. Like when placing subtopics within an academic writing piece, the content should match the subtopic. There should be an obvious flow to the academic article. In most cases, someone reading your academic piece for specific information should be able to go to a subtopic and obtain all the information that is needed. The structure of the academic article is also a part of the writing quality. It will be very hard for people to understand what you are writing if the sentence structure is lacking. Proper structure within an article allows you, as the writer, to effectively communicate ideas about a particular topic. Proper structure enables the reader to access information efficiently. The goal of academic writing is to inform an audience about a particular topic in a very professional manner. Effective academic journal writing does involve clearly stating your purpose and presenting your information in a manner that is simplistic enough for others to read and understand while still having the tone of an academic piece. It is very important you are able to present your ideas clearly when writing an academic piece. Academic writing should be concise, without being completely stripped of the necessary facts that are needed to support your topic. If you do all these…

    • 347 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    I. Thou shalt place high priority on security, for hackers lurketh, thieves stealeth and employees bungleth A Wi-Fi-enabled computer can connect to multiple networks at the same time. Your employees can give a hacker a pathway into your internal network simply by powering up a laptop. Imagine the mess an eco-terrorist could make if he didn’t like the look of your smokestack. Even your well-intentioned employees can bring a network down, simply by blundering around in areas they shouldn’t. Don’t take chances with network security. Most wireless systems employ industry-standard WEP (Wired Equivalent Privacy). A hacker can get around it within a few hours. Look into more powerful standards like Extensible Authentication Protocol and Tunneled Extensible Authentication Protocol. Never assume that your industrial Ethernet products have built-in security features. At the very least, you should use inspection-type firewalls (such as packet filters) to control any access that is based on IP source address, destination address, and port number. Don’t just talk about changing your passwords a regular basis. Do it. And don’t make them easy to guess. Consumer plug and play devices can flood your network with traffic in a "broadcast storm" as they try to selfconfigure or advertise their presence to every other node on the network. Faulty devices can vomit zillions of “runts”, or abnormally short Ethernet frames. Using switches instead of hubs will take care of those problems. Duplicate IP addresses can deactivate devices that otherwise appear to be perfectly functional. II. Thou shalt document thine installation, so that even Homer Simpson mayest discern the system whither thou goest; for to write the IP address on your hand or your forehead shall not be deemed sufficient Document your installation. When devices need to be replaced it needs to happen quickly. Things you need to know and document for every device: - Replacement…

    • 1289 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Wireless Security Policy

    • 462 Words
    • 2 Pages

    The Cisco 2800 or 3800 Series Integrated Services Router will give the medium size business faster upgrades with a streamline management and a greater reliability. It’s also have a backbone for infrastructure and deploy is cost effectively along with a secure WLANs management. This will give the medium size origination the greatest wireless system secure for the enterprise. Centralized security policies, capabilities on the Intrusion Prevention System (IP), quality of service (QoS), and WLANs is a Layer3 fast secure will be provide by the Cisco Integrated Services Router module. For wireless security alternative there will use a mobile VPNs server’s help control the vulnerable of denial-of-service attacks and scalability issues. The secure WLAN access is use for all users’ desktop and laptop computers, screen sharing, and secure application protocols.…

    • 462 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    As the businesses are emerging, they require advanced technologies. Wireless technologies are facilitating the businesses in many different ways. Wireless devices and wireless transmission media are technologies used in today’s business. Latest wireless devices such as I-phones, I-pads, laptops, PDA’s and tablets provides businesses with various flexibilities. Companies are finding it convenient and productive to use wireless devices for several reasons. First and foremost, wireless technology is sweeping the world, and becoming a plus in the business atmosphere. Many business owners apply these tools to their companies because of the convenience of using them. Wireless technology is telecommunications used to carry a signal without wires, done by electromagnetic waves. Wi-Fi is a popular computer network service that uses the internet to transmit data wirelessly; usually done on a laptop or tablet. Many business owners are switching to the tablets or laptops because you can take these small mobile computers anywhere and these do the same things as a big computer.…

    • 607 Words
    • 3 Pages
    Good Essays