Preview

NT 2580 Project Part 2

Powerful Essays
Open Document
Open Document
2096 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
NT 2580 Project Part 2
Issue one. Based on the premise that Richman has 5,000 employees throughout the main office and several branch offices, you must research solutions and detail the appropriate access controls including policies, standards, and procedures that define who users are, what they can do, which resources they can access, and which operations they can perform on a system.
Issue two. Based on the premise that most of the managers have BlackBerry devices for instant communications and all employees are provided cell phones, you must research and detail the cryptography methods to protect organizational information using techniques that ensure its integrity, confidentiality, authenticity, and non-repudiation, and the recovery of encrypted information in its original form.
Issue three. Based on the premise that there is a mix of computer running Windows 2000, Windows XP, Windows Vista, Windows 7, and Mac OS X, you must research and devise a plan to thwart malicious code and activity by implementing countermeasures and prevention techniques for dealing with viruses, worms, logic bombs, Trojan horses, and other related forms of intentionally created deviant code.
Issue four. You must research and formulate a plan to implement monitoring and analysis based on the premise that all employees have Internet access to browse the Web, there is no policy on the use of removable media, and several of the branch offices have encountered issues with malware recently. You must determine system implementation and access in accordance with defined IT criteria as well as how to collect information for identification of and response to security breaches or events.
Issue five. Because Richman hosts an internet for employees to access information about the company and enroll in company benefits programs, and because Richman also hosts an extranet for its business partners, you must research and devise a method to secured networks and communications. This should include the network structure,

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt 2580 Project Part 2

    • 1249 Words
    • 5 Pages

    Bridges are networking devices that can connect 2 local area networks (LAN). A bridge can learn all of the MAC addresses on the network, and this is done during the bridges data gathering phase. Basically a bridge will receive the data and analyze the address. The bridge will then pass the data on to the correct address. The ports on a bridge are in and out, but they are smart ports with the ability to locate the address on the network.…

    • 1249 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Is3110 Week2 Assignment

    • 348 Words
    • 2 Pages

    For this assignment, imagine that you work for U.S. Industries, Inc. as a network administrator. Your…

    • 348 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It is the responsibility of Remote Users to make sure that reasonable measures have been taken to secure the Remote Host used to access Richman IT Resources. This standard applies to all Remote Users of Richman IT Resources including staff, outside contractors, vendors, and other agents. Remote Access Security Standards All Remote Users must follow the security requirements set forth in this standard for any Remote Host accessing IT Resources prior to such access, as well as any guidelines, procedures, or other requirements issued by their departmental IT units and the owners of the IT Resource which are to be remotely accessed. Remote User responsibilities are described below: Remote User Requirements: Remote Users must make sure that their Remote Hosts used to access Richman IT Resources meet all security expectations specified in the End User Guidelines Security prior to accessing any Richman IT…

    • 438 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    NT1310 Unit 3 Homework

    • 1253 Words
    • 5 Pages

    Q1) What does the shell ordinarily do while a command is executing? What should you do if you do not want to wait for a command to finish before running another command?…

    • 1253 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Brian Boisjoli Human-Computer Interaction 12/14/16 Final Project Part 1: For this final project, I have made a few changes to my program to make it…

    • 1014 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    In this Multi-Layered Security Plan, I will provide information on how to better improve the security of each domain and protect the data of Richman Investments. We shall secure all ports for incoming and outgoing traffic, only allowing the information that is needed through certain ports and to conduct business fast and efficiently. We will also be using the latest and most updated firewall protection and anti-virus software to add a better degree of security. This will be implemented throughout the entire company and we will inform all employees of this MLS plan.…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt2580 Project 1

    • 492 Words
    • 2 Pages

    In the workstation domain, we need to make sure that all workstations have antivirus and malware protection installed on them. Laptops and portable devices are very vulnerable to theft…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Assignment 1

    • 1455 Words
    • 6 Pages

    Local Access and Transport Areas – Local Access and Transport Area is a U.S. term that refers to a geographic region assigned to one or more telephone companies for providing communication services. A connection between two telephone companies within the same region is referred to as intraLATA. A connection between two local exchange carriers in different regions is called interLATA, which is the same as long-distance service.…

    • 1455 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    3. Identify and document at least three vulnerabilities and the solutions related to the client configurations.…

    • 286 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The intelligent personal assistant field within speech technology is a rapidly expanding field. There is a need for a Director of Software Development for Amazon Echo—Alexa to assist in building, leading, and managing a team of talented technology professionals. Alexa will enable the Echo product line to stay ahead of the software curve amongst many competitors.…

    • 665 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 5 Task 1

    • 438 Words
    • 2 Pages

    I have chosen one of my tasks I performed in my portfolio because I believe that it is very important. The task I do is to file folders, get folders for the next day, and look at what’s written for my future benefit. The reason why it’s important to do this is because it’s all the clients information stored in. If I misplaced it or lose it, the dentist or hygienists won’t recall what they did to the patient last time they had visited. Not only that my supervisor would get anger at me, the client would as well, and that client would possibly won’t come back to the place. It’s a station nobody wants to deal with. That’s why I’m including this task because filing is very cruel shall and critical. Taking out the files are easier to do, but I have to take out the files of each clients for each hygienist and dentist. It would be easy on them because they would be stress free and won't panic when they can’t find a folder. It’s an important job in my opinion.…

    • 438 Words
    • 2 Pages
    Good Essays
  • Better Essays

    May 9, yAs new technology emerges, the Internet evolve and computer network gets bigger and bigger, the need for network security has become one of the most important factors for all organizations and companies to consider (Popescu, 2013). Network security is important for an organization or company’s well being. Increasing network security decreases the change privacy spoofing, identity or information theft. Network security is something that companies should take seriously. An unsecured network system can comprises a company’s files and reputations all at the same time. An organization needs to use a tool that will ensure security efficiency and monitoring. North Shore Medical Research (NSMR)…

    • 1007 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Consistent standards for network access and authentication are critical to the company’s information security and are often required by regulations or third-party agreements. Any user accessing the company’s computer systems has the ability to affect the security of all users of the network. An appropriate Network Access and Authentication Policy reduces the risk of a security incident by requiring consistent application of authentication and access standards across the network.…

    • 1461 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    When developers start to acquire equipment or software, the __________ stage of the SDLC has been reached.…

    • 603 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    In the corporate world, security is very important. Large corporations generally have to protect themselves from competitors, hackers, and other outside sources that could pose a threat to both them and their customers. A breach in security can destroy a customer’s loyalty in the company, also causing the customer an enormous amount of trouble especially if it involves a theft of identity or other personal information. A security breach is the result of a failure in the design and implementation of an organization’s systems or procedure (MacKinnon, 2008).…

    • 539 Words
    • 3 Pages
    Good Essays