Saturday, May 16, 2020
Network Security Assessment Questions Essay - 2284 Words
Network Security Assessment Prepared for: University of Maryland University College Prepared by: Erik Milkie I. Vulnerability Assessments Use this section to describe any network security vulnerabilities. Use the scenario along with industry standards and best practices to identify the vulnerabilities. Describe why it is vulnerable and what the implication is if it is not mitigated. In this section, we are identifying vulnerabilities of the firm and simple ways to make it safer. I will point out some key vulnerabilities that we need to focus on and ways that we can implement the safeguarding of PII and how to keep the CIA triad in place so that at all times the information is safe. We must incorporate a centralized a user access control that will allow us to centralize information and control to a specific location like an active directory that will allow us to provide a single point of access where the management of user accounts, clients, servers, and applications cuts down on errors. I recommend installing a backup server as well so that if a system crashes all of our data to include directory examples above and allow for a speedy recovery. One way we can do this is to use a service called Carbonate. Carbonite is basically a cloud or online storage that allows the backup of files, full system settings, speedier recovery, and restoration of hardware and software to its former glory. This one company charges a yearly fee of $599 which in essence allows us toShow MoreRelatedQuestions On Security Assessment Services1386 Words à |à 6 PagesSecurity Assessment Services Checklist and Auditlist related points for an organization called ââ¬Å"Cventâ⬠, whose core business is SaaS and Mobile Application related to System Application Domain. Hence we need to make sure that the application servers are physically and virtually secure and provide round the clock availability and reliable data integrity. There should also be a checklist to ensure due privacy and confidentiality of client data. ïÆ'Ë Physical Security The organization should makeRead MoreInformation Security Is A Key Component And Main Concern Of Information Technology999 Words à |à 4 PagesInformation security is a key component and main concern of Information Technology (IT) professions, nowadays. The protection of data, networks, computers, etc. is a more and more growing field. This has been made even more important with the attacks and breaches noticed earlier 2014. The U.S Bureau of Labor Statistics (BLS) through the ââ¬Å"Occupational Outlook Handbookâ⬠predicts that the demand for information security analysts will grow by 22 percent in a decade. Thus adding more than 65,700 positionsRead MoreSystem Analysis and Recommendation Report of Natividad Medical Center859 Words à |à 3 PagesComputer Information Systems (HCIS) network and its hospital-grade systems infrastructure and technology components. The system analysis report details the findings of the system analysis in the part of system vulnerability/ri sk assessment as a critical component of the security plan. Why the system vulnerability/risk assessment was carried out as part of system analysis The security plan for Natividad Medical Centers Hospital Computer Information System (HCIS) network and its hospital-grade systemsRead MoreCorporate Responsibility Of The Sarbanes Oxley Act1353 Words à |à 6 Pageshonest, accurate, and valuable financial records, it will renew investorââ¬â¢s trust in public corporations (Stults, Gregg). To grasp how Sarbanes-Oxley affects information security, looking into two key sections can be very insightful. Section 302, ââ¬Å"Corporate responsibility for financial reportsâ⬠, and section 404, ââ¬Å"Management assessment of internal controls.â⬠Section 302 discusses the requirement of both the Chief Financial Officer and the Chief Executive Officer must personally approve and certifyRead MoreLab 2 Performing A Vulnerability Assessment Worksheet Essay648 Words à |à 3 PagesAssessment Worksheet Performing a Vulnerability Assessment CSS150-1502A-02 : Introduction to Computer Security Course Name and Number: _____________________________________________________ Johnathan McMullen Student Name: ________________________________________________________________ Stephen Osborne Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview In this lab, you used Nmap commandsRead MoreReport on the Security System at Natividad Medical Center1227 Words à |à 5 PagesSecurity plan This final part of the project contains an in-depth and comprehensive report on the security system at Natividad Medical Center. Using relevant peer-reviewed and technical reports, I devise an analysis plan that explains thoroughly, how I will analyze as well as evaluate Natividad Medical Centers Hospital Computer Information Systems (HCIS) network and its hospital-grade systems infrastructure and technology components. In this comprehensive report, the details of what is going toRead MoreInterpreting The Results And Remediation1512 Words à |à 7 PagesInterpreting the results and remediation. After the vulnerability assessment has taken place it is time to interpret the results of the scan. This is where the organization finds out what the vulnerabilities of their network are. The vulnerabilities that were found in the process of the assessment must be categorized, most vulnerability scanners will produce reports that will list and categorize the threats that were found, this is a lso called threat modeling which we will get into in the next sectionRead MoreIs4550 Week 5 Lab1611 Words à |à 7 Pagesand Audit an Existing IT Security Policy Framework Definition Learning Objectives and Outcomes Upon completing this lab, students will be able to complete the following tasks: * Identify risks, threats, and vulnerabilities in the 7 domains of a typical IT infrastructure * Review existing IT security policies as part of a policy framework definition * Align IT security policies throughout the 7 domains of a typical IT infrastructure as part of a layered security strategy * IdentifyRead MoreCertified Ethical Hacking1206 Words à |à 5 PagesLab #9 - Assessment Worksheet Investigating and Responding to Security Incidents Course Name and Number: CSS280-1501A-01 Ethical Hacking Student Name: ***** ****** Instructor Name: ***** ****** Lab Due Date: 2/9/2015 Overview In this lab, you acted as a member of the incident response team who had been assigned an incident response in the form of a help desk trouble ticket. You followed the phases of a security incident responseRead MoreA Report On Suntrust Bank1671 Words à |à 7 PagesDespite the various security measures, features and procedures implemented by SunTrust to secure their network and server from cyber-attacks as well as to help protect consumers from scammers and unauthorized access to their accounts, yet, they become a victim of the hacktivist group Izz ad-Din al-Qassam who insist on waging war on U.S Banks due to an outrage over a movie trailer posted on YouTube which the group believes casts Islam in a negative light (Kitten, 2012). The question now is how can SunTrust
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.