Preview

NT 2580 Project Part 2

Powerful Essays
Open Document
Open Document
2096 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
NT 2580 Project Part 2
Issue one. Based on the premise that Richman has 5,000 employees throughout the main office and several branch offices, you must research solutions and detail the appropriate access controls including policies, standards, and procedures that define who users are, what they can do, which resources they can access, and which operations they can perform on a system.
Issue two. Based on the premise that most of the managers have BlackBerry devices for instant communications and all employees are provided cell phones, you must research and detail the cryptography methods to protect organizational information using techniques that ensure its integrity, confidentiality, authenticity, and non-repudiation, and the recovery of encrypted information in its original form.
Issue three. Based on the premise that there is a mix of computer running Windows 2000, Windows XP, Windows Vista, Windows 7, and Mac OS X, you must research and devise a plan to thwart malicious code and activity by implementing countermeasures and prevention techniques for dealing with viruses, worms, logic bombs, Trojan horses, and other related forms of intentionally created deviant code.
Issue four. You must research and formulate a plan to implement monitoring and analysis based on the premise that all employees have Internet access to browse the Web, there is no policy on the use of removable media, and several of the branch offices have encountered issues with malware recently. You must determine system implementation and access in accordance with defined IT criteria as well as how to collect information for identification of and response to security breaches or events.
Issue five. Because Richman hosts an internet for employees to access information about the company and enroll in company benefits programs, and because Richman also hosts an extranet for its business partners, you must research and devise a method to secured networks and communications. This should include the network structure,

You May Also Find These Documents Helpful

  • Powerful Essays

    Sandhu, R., & Samarati, P. (1996). Authentication, access control, and audit. ACM Computing Surveys (CSUR), 28(1), 241-243.…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Consistent standards for network access and authentication are critical to the company’s information security and are often required by regulations or third-party agreements. Any user accessing the company’s computer systems has the ability to affect the security of all users of the network. An appropriate Network Access and Authentication Policy reduces the risk of a security incident by requiring consistent application of authentication and access standards across the network.…

    • 1461 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Nt1310 Assignment 1

    • 1455 Words
    • 6 Pages

    Local Access and Transport Areas – Local Access and Transport Area is a U.S. term that refers to a geographic region assigned to one or more telephone companies for providing communication services. A connection between two telephone companies within the same region is referred to as intraLATA. A connection between two local exchange carriers in different regions is called interLATA, which is the same as long-distance service.…

    • 1455 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    Nt 2580 Project Part 2

    • 1249 Words
    • 5 Pages

    Bridges are networking devices that can connect 2 local area networks (LAN). A bridge can learn all of the MAC addresses on the network, and this is done during the bridges data gathering phase. Basically a bridge will receive the data and analyze the address. The bridge will then pass the data on to the correct address. The ports on a bridge are in and out, but they are smart ports with the ability to locate the address on the network.…

    • 1249 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Secure service: The main objective of this network is to provide secure administrative computing service to DesignIT. It is designed to be functionally and physically isolated from access by people not employed by DesignIT so as to minimize the risk of unauthorized use.…

    • 768 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt280 Week 1 Homework

    • 359 Words
    • 2 Pages

    L. Use workstation antivirus and malicious code policies, standards, procedures, and guidelines. Enable an automated antivirus protection solution that scans and updates individual workstations with proper protection.…

    • 359 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Identify risks that could lead to an information security breach, Identify vulnerabilities in system security, software operation, network design or employee procedures that could lead to a network failure.…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt2580 Project 1

    • 492 Words
    • 2 Pages

    In the workstation domain, we need to make sure that all workstations have antivirus and malware protection installed on them. Laptops and portable devices are very vulnerable to theft…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    3. Identify and document at least three vulnerabilities and the solutions related to the client configurations.…

    • 286 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 5 Task 1

    • 438 Words
    • 2 Pages

    I have chosen one of my tasks I performed in my portfolio because I believe that it is very important. The task I do is to file folders, get folders for the next day, and look at what’s written for my future benefit. The reason why it’s important to do this is because it’s all the clients information stored in. If I misplaced it or lose it, the dentist or hygienists won’t recall what they did to the patient last time they had visited. Not only that my supervisor would get anger at me, the client would as well, and that client would possibly won’t come back to the place. It’s a station nobody wants to deal with. That’s why I’m including this task because filing is very cruel shall and critical. Taking out the files are easier to do, but I have to take out the files of each clients for each hygienist and dentist. It would be easy on them because they would be stress free and won't panic when they can’t find a folder. It’s an important job in my opinion.…

    • 438 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The intelligent personal assistant field within speech technology is a rapidly expanding field. There is a need for a Director of Software Development for Amazon Echo—Alexa to assist in building, leading, and managing a team of talented technology professionals. Alexa will enable the Echo product line to stay ahead of the software curve amongst many competitors.…

    • 665 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    In this Multi-Layered Security Plan, I will provide information on how to better improve the security of each domain and protect the data of Richman Investments. We shall secure all ports for incoming and outgoing traffic, only allowing the information that is needed through certain ports and to conduct business fast and efficiently. We will also be using the latest and most updated firewall protection and anti-virus software to add a better degree of security. This will be implemented throughout the entire company and we will inform all employees of this MLS plan.…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    May 9, yAs new technology emerges, the Internet evolve and computer network gets bigger and bigger, the need for network security has become one of the most important factors for all organizations and companies to consider (Popescu, 2013). Network security is important for an organization or company’s well being. Increasing network security decreases the change privacy spoofing, identity or information theft. Network security is something that companies should take seriously. An unsecured network system can comprises a company’s files and reputations all at the same time. An organization needs to use a tool that will ensure security efficiency and monitoring. North Shore Medical Research (NSMR)…

    • 1007 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    When developers start to acquire equipment or software, the __________ stage of the SDLC has been reached.…

    • 603 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    In the corporate world, security is very important. Large corporations generally have to protect themselves from competitors, hackers, and other outside sources that could pose a threat to both them and their customers. A breach in security can destroy a customer’s loyalty in the company, also causing the customer an enormous amount of trouble especially if it involves a theft of identity or other personal information. A security breach is the result of a failure in the design and implementation of an organization’s systems or procedure (MacKinnon, 2008).…

    • 539 Words
    • 3 Pages
    Good Essays