Preview

Unit 7 Assignment 2

Satisfactory Essays
Open Document
Open Document
208 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 7 Assignment 2
Plan Phase
All tasks should be a part of this phase. It is important to plan and have proper access controls, anti-virus, up to date patches and software, and backups of the network

Do Phase
An important part of this phase is creating a password policy that would enforce complex passwords. This helps protect your network from unauthorized access. Adding a physical security measure will also help with the security of your network. Locking the physical door to the data center will help protect someone from physically accessing the network. Another important step would be to perform daily backups of the servers. In the event of a system failure or disaster, you can restore most of the data to its most recent state.

Check Phase
It is a good idea to use the MBSA during this phase to identify the baseline of your system by checking the current versions of your software. Using Packet Tracer can help make sure your data is secure. It is always wise to constantly check for new updates to software and anti-virus protection. Monitoring logs can help you test the system or look for vulnerabilities being exploited.

Act Phase
Following guidelines and procedures will help maintain the security and stability of your system.

You May Also Find These Documents Helpful

  • Good Essays

    Explain the issues and policies organisations must consider when planning computer systems maintenance (P1, M1)…

    • 676 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    For the completion of this program, there are many aspects that need to be discussed and completed. Strategic planning, systems implementation, Network Security, training, Network maintenance, operational inputs and staffing will have to implemented.…

    • 1160 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 7 Assignment 1

    • 609 Words
    • 3 Pages

    Switched circuit- A circuit created by the phone company in reaction to signaling (the user tapping telephone keys or a modem sending in the same digits), with the telco tearing down the circuit when the user is finished.…

    • 609 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Upgrade- Establish endpoint security updates (Antivirus, Malware protection). Upgrade all desktop and laptop Operating Systems. Once all systems are running on the same system, it will be easier to set up security protocols across the board. Make sure Patch updates are being made regularly, set up a specified time frame to check for and install new patches and updates.…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Is3110 Week2 Assignment

    • 348 Words
    • 2 Pages

    network monitoring and maintenance, the need for an additional system administrator, and the risks of not…

    • 348 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NETW410 Week 2 Lab Report

    • 349 Words
    • 3 Pages

    The technical goals are to build a new IT section onto the admin building to make sure all the servers are centralized. Connect all buildings to the new IT section. Make sure to provide wireless access for all the students in classrooms. Provide high speed wired internet to all faculty offices. Make sure there is a centralized back up of all data. Replace the old phone system with VIOP.…

    • 349 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Operations & Maintenance Phase - Encompasses all activities required to keep the system working as intended (monitoring, patch management, application fault remediation and audits).…

    • 813 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    expansion. The following are the key aspects of the IT infrastructure that must be put in place to…

    • 4187 Words
    • 22 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 10 Assignment 1

    • 344 Words
    • 2 Pages

    * Data should constantly be tested to make sure there is no corruption or lost. The redundant servers should greatly help with this. When the data is taken off site there should be a working sever there to test the backup upon arrival. All checks should be logged.…

    • 344 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    is4680 lab #2

    • 630 Words
    • 2 Pages

    Windows Hardening Defense, starts with the basics, Log in with least amount of privileges. Always use Firewall and AV. Monitor channels for security advisories and alerts. Know your system(s). Patch early and patch often, Unpatched Systems are the lowest of low hanging fruit. Have a patch policy documented and stick with it. Review patches as they are released and determine criticality based on the exploit, threat footprint for your system(s), and whether or not there is a POC or fully weapon exploit in the wild. When possible, test patches before rolling out in production on servers. Most clients should have automatic updates enabled for the OS and any application listening on a socket or used with untrusted data (java, adobe, browsers, etc...) Servers should be updated during maintenance windows if possible and depending on criticality (of threat and server).…

    • 630 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Unit 8 Assignment 1

    • 349 Words
    • 1 Page

    IP route: One entry in an IP routing table that lists some potential destination (usually a network ID or subnet ID) as forwarding instructions, including the interface out which the router should forward the IP packet.…

    • 349 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    In the workstation domain, we need to make sure that each of the workstations, whether desktop or laptop, has to have antivirus and malware protection installed on them. Express strict access control polices and standards. And mandate annual security awareness training for all employees…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 3 Assignment 1

    • 310 Words
    • 1 Page

    5. How long do you think it will take before the IPv4 addresses are completely exhausted? It could possibly become exhausted within the next two years or so.…

    • 310 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Unit 3 Assignment 3

    • 288 Words
    • 1 Page

    Data classification policy is important for securing data from risks, which includes unauthorized users, modification, disclosure, access, use, and removal. This is to ensure protection on data assets from unauthorized users. Data must be maintained in a secure, accurate and reliable manner and be available for authorized use. In order to implement security measures, the data must be classified into categories like; confidential, restricted, and public. Confidential and restricted will be required some sort of access mechanism to authenticate anyone who wants to access any classified documents. In order to construct a Classification policy, one must know what type of data are available, where they are located, what type of access levels are implemented and what protection level is implemented and does it adhere to compliance regulations.…

    • 288 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Unit 7 Lab

    • 293 Words
    • 2 Pages

    10. In order to craft back-up and recovery procedures, you need to review the IT systems, hardware, software and communications infrastructure needed to support business operations, functions and define how to maximize availability. This alignment of IT systems and components must be based on business operations , functions, and prioritizations. This prioritization is usually the result of a risk assessment and how those risks, threats, and vulnerabilities impact business operations and functions. What is the proper sequence of development and implementation for these following plans?…

    • 293 Words
    • 2 Pages
    Satisfactory Essays