Preview

Scenario Three

Good Essays
Open Document
Open Document
791 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Scenario Three
Scenario 3

Question: How do you think this situation could have been prevented? Could the IT department have conducted regular inventories of the software on each computer to identify missing patches? Could the IT department have implemented a process to ensure that no computer is moved outside the boundaries of the firewall?

There are steps that the IT department could have taken to avoid the situation that occurred. There should have been policies in place to ensure that antivirus/malware software was installed on the computer before it was allowed to connect to any network. A machine build checklist could be implemented to where after a computer is initially setup with appropriate operating software, all relevant applications needed would then be installed, including the antivirus software. The endpoint protection software could be installed in a standalone mode if the system being deployed was not going to be part of the larger domain network or if it was going to be used for short term testing. Otherwise it could be deployed from a central management server. It would at the very minimum have that protection on it. Most antivirus vendors have auto update features in their software so that in the event the virus definitions become outdated the software automatically checks in to download the latest definitions.

Proper operating system patching would have to be done as well to reduce the risk of software vulnerabilities. Patching could be done from an internal update server like Microsoft’s WSUS server so that a connected system would contact the internal server at a scheduled time and pull down the appropriate updates it needs for the software that is installed. There are also many third party tools, like GFI’s LanGuard, that can be used to scan systems for vulnerabilities and patches and install them on demand without having to wait for a scheduled time to download (GFI, 2012).

There are several ways you can try and lock down a network so

You May Also Find These Documents Helpful

  • Satisfactory Essays

    | * OS Level * Patch history Configuration hardening Desktop access, Application access * File Access * File Storage * VPN Authentication Browsing * Emails * Backups…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    The CIO has requested that we follow up with a plan that is detailing a strategy for addressing all risks identified in the previous research. This plan needs to identify controls in administration, preventative, detective and corrective. With this data, the business will be able to mitigate each risk that we identified earlier. The following paper will explain the approach to correcting the various malware.…

    • 1122 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Case Scenario 3

    • 276 Words
    • 2 Pages

    You are configuring DHCP scope options for Contoso, Ltd. The company has a limited number of IP addresses available for clients, and it wants to configure DHCP to maximize IP address availability. Choose all of the following actions that will accomplish this objective:…

    • 276 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    case3

    • 775 Words
    • 4 Pages

    1. Build a K-Means Clustering Model to predict the right set of keywords to bid…

    • 775 Words
    • 4 Pages
    Good Essays
  • Good Essays

    When remote users do not have recent patches or updates, the system administrator should set up group policies such as, forcing updates to install right away. Rather than having the users restart the systems themselves, squandering the companies and users time, but at the same time safe guarding what goes in and out of the network.…

    • 588 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Ping sweeps and port scans are two techniques that a malicious computer user such as a hacker can utilize to compromise an Enterprise networks security and gain access to their proprietary data. For example, private email messages can be forwarded to a rogue destination email address: Done by installing a virus program into a user’s email client through a discovered active computers open TCP/IP IMAP port (port number 143) that is not being currently used by that user (Clarke, 2008). The virus then could take advantage of security vulnerabilities in that users email client program and forward emails from that users inbox over to another destination email address without them knowing about it. Therefore, in light of such exploits as just described it is vitally important to address and mitigate the security problem to an Enterprise network from ping sweeps and port scans that can be incurred from outside sources by the use of strong Firewall protections.…

    • 631 Words
    • 3 Pages
    Good Essays
  • Better Essays

    As a multinational organization, Briargrove has an extensive computer system network. However, due to too many locations globally, Briargrove only thought of data back-ups and lab test network without implementing administrator accesses or an information Technology (IT) policy and procedure. Because they failed to implement Information Systems (IT) administrative controls, many of the management personnel downloaded unknown software and has caused a complete system failure, affecting negatively the entire organization’s network. Following their…

    • 1283 Words
    • 6 Pages
    Better Essays
  • Good Essays

    caregroup

    • 721 Words
    • 4 Pages

    firewalls should be installed along with antivirus software at the user end that is updated and…

    • 721 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Yalom, I., & Leszcz, M., (2005). The Theory and Practice of Group Psychotherapy, 5ed. Basic Books Inc., ISBN: 0465092845, ISBN-13: 9780465092840,…

    • 1886 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    * All computers that are connected to the network must have the standard supported anti-virus software installed and scheduled to run at regular intervals. In addition, the anti-virus software and the virus definition files must be kept up-to-date.…

    • 1030 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Scenario 1

    • 952 Words
    • 4 Pages

    In childhood education setting it seems that there are always some children who are crying during play time because they got bullied by peers; all children are developing their social skills. In scenario 1 Olivia doesn’t understand the rule that taking something without permission is not appropriate behavior. Mai also doesn’t know the better reaction that she expresses her sadness by telling to Olivia instead of crying. Because the children are developing their social skills, Scenario 1 is a good opportunity to tell the rules, to introduce the importance of the verbal communication and self-regulation, and to encourage them to play together.…

    • 952 Words
    • 4 Pages
    Good Essays
  • Better Essays

    A further defense strategy is to identify how well a firewall is functioning. Posey (2003) suggested that port scanning should be performed. A port scan is a technique by…

    • 1242 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    iss project0

    • 376 Words
    • 1 Page

    2. Other than installing virus and worm control software, what can SLS do to prepare for the next…

    • 376 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Antivirus is constantly required as well as updated definitions databases Most viruses target the windows OS because it is the most widespread OS on the planet.…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    HIPAA Research Paper

    • 564 Words
    • 3 Pages

    All the systems and networks used in hospitals should be protected against hackers by consistently scanning the network for systems and networks for threats and using appropriate and updated anti-virus and anti-malware applications.…

    • 564 Words
    • 3 Pages
    Satisfactory Essays