Unit 1 Assignment 1: Business Analysis

Improved Essays
User connectivity will be controlled and authenticated through active directory. User devices will require and object to be created in active directory which will be used to authenticate the device using 802.1x. When a user device is connected to the network it will initially communicate on a VLAN will only be allowed to communicate with active directory. Then once the device has been authenticated it will place the device on the appropriate VLAN that it will operate on. Any device that has not been set up in Active Directory will be placed into a null VLAN which will not grant access to the network. To access to the computing device users will use their common access card to log on to the system. This will require them to provide a seven digit pin along with the digital certificate on the common access card. In addition to the login digital certificate there will also be an email certificate used for encrypting email traffic using a PKI system. Emails will also be required to be digitally signed ensure users are who they say they are. Users requiring access to the classified network will be issued an additional access …show more content…
From physical security to device security applications our network will be protected against both internal and external threats. The above mentioned architecture will step data through a variety of security configurations which will methodically mitigate the top four possible security threats. Additional support from the ISP may also be required when confronting DOS attacks as may attempt to overload security appliances. This will be mitigated by our multiple ISP connection but we must include information about DOS attacks in our service agreement with the ISP. Our network will prove to be more secure than other WWTC branches and will most likely become the security standard across the

Related Documents

  • Decent Essays

    In addition to the secure provided by the integrated services Router a Cisco ASA 5540 Adaptive Security Appliance will be installed behind…

    • 216 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    The identity infrastructure is contained within Active Directory, which provides security, authentication, and authorization of identities (Training Solutions, 2014). The DHCP and DNS service are also provided to ensure reliable name resolution, and dynamic IP address assignment to the network devices that require dynamic IP address assignment. Finally, there are storage devices that contain a hybrid solution of storage area networks (SAN), and network attached storage (NAS).…

    • 922 Words
    • 4 Pages
    Superior Essays
  • Decent Essays

    Due to the fact that all of your communication systems will be unified under this secure network, you will be able to enjoy maintenance and operations savings on a monthly basis. BroadConnect’s phone systems provide portable connectivity through a private…

    • 480 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    Bsc300 Unit 1 Assignment 2

    • 2191 Words
    • 9 Pages

    ASSIGNMENT 2 AUTHOR: ALI AKBAR MIT111558 SUBMITTED TO: MS NAVNEET KAUR Contents Mobile Apps 2 Introduction 2 Vulnerabilities 2 Android main risk: 3 Security vulnerabilities: 4 Bad data storage: 4 Malware: 4 Unauthorized access: 5 Lack of encryption: 5 Data leaks from syncing: 6 Preventive methods for vulnerability: 6 Experience trust product. 6 Work with software reputation service. 7 Layer security.…

    • 2191 Words
    • 9 Pages
    Great Essays
  • Decent Essays

    Nt1310 Unit 3

    • 115 Words
    • 1 Pages

    Network security specialists detect, prevent and resolve security threats to computer networks. Security is an important aspect in businesses operating various Networking systems. Securing your company’s network consists of identifying all devices and connections on the network; setting boundaries between your company’s systems, enforcing controls to ensure that unauthorized access can be prevented, and contained. Network should be separated from the public Internet by strong user authentication mechanisms and policy enforcement systems such as firewalls. Another important factor is that Wireless Local Area Network should be separate from your company main network so that traffic from the public network cannot navigate through the internal…

    • 115 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    Abstract: With a specific end goal to outline and fabricate the secured network system, numerous elements must be thought seriously about, for example, the topology and position of hosts inside of the system, the determination of equipment and programming innovations, what's more, the cautious arrangement of every part. My paper will be an examination of the issues percentage in outlining a safe Local Area Network (LAN) and a best's portion practices proposed by security specialists. I will examine securing a LAN from network's perspective. [1] Introduction: With most complex innovations, there's not one size-fits-all arrangement regarding the matter of network administration. The needs and assets of every one of a kind association will relate…

    • 877 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    Sarah Darley ECON 204 Gebhardt Assignment 1 Part 1: The Gross State Product (GSP) in California in 2012 was $2,125,717 million, which then increased to $2,202,678 million in 2013. The change in GSP for the state of California was increased by $76,961 million between these two years. Compared to Colorado, the GSP of California is extremely high.…

    • 1176 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Wyoming Medical Center, Los Angeles County, and Raymond James all share similar struggles with how to secure the network, computers and mobile devices. Control and security are a concern from both inside and outside of the facilities and organizations. Each organization deployed a multi-level/tier approach was needed to protect the data. The Novell ZenWorks agents are used to manage the operating systems and software that is installed on the desktops/workstations; it allows the information technology group to customize the software for installation and patch management.…

    • 302 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    The internal source of verbal information in ASDA gets from face to face interviews, Meetings, sale, HR, Customer service and from finance. The external sources of verbal information in ASDA are gets from customer, government and from suppliers. Written Information The second one is written information.…

    • 755 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The Bais HaVaad was founded in 2008 by HaRav Dovid Grossman shlita. The organization is overseen by its rabbinic leadership, headed by an Av Bais Din and Segan Av Bais Din. Since its inception almost 10 years ago, the Bais HaVaad has been recognized as one of the nation’s pre-eminent rabbinic courts. It serves the Jewish community of North America as a forum for arbitrating disputes through the din torah process, obtaining Jewish divorces, and confirming Jewish personal status issues.…

    • 185 Words
    • 1 Pages
    Improved Essays
  • Decent Essays

    I never thought about asking the patient if they were new or established! This would be good information so you can let them know if they are new, that they will need to fill out new patient paperwork. If they are established you will be able to look them, and their records up easily, and tell them what they will be needing.…

    • 62 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Chapter six focuses on the need to have a culture of discipline. A Good to Great Company, has self-disciplined employees that work within a structured framework yet has the freedom and responsibility to make decisions within the framework. These individuals are extremely self-disciplined and do not need managing, they are willing to go above and beyond to meet their requirements. This discipline is from within the individual not a directive from the leader.…

    • 845 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Pomeroy Case

    • 201 Words
    • 1 Pages

    Pomeroy was hired by a Fortune 20 supermarket client. With annual revenue of over one billion dollars, the retailer operates nearly 2,800 retail, food, drug, jewelry, and chain stores. (Pomeroy, n.d.). The company asked the execution to occur in parallel with another system-wide deployment to resolve other critical issues. The clients’ Network Data Security included their stores operating on single, open network where store-wide devices capable of transmitting, receiving and storing confidential customer data of one department.…

    • 201 Words
    • 1 Pages
    Improved Essays
  • Decent Essays

    Good afternoon, I hope all is well and going good for you. I apologize for my light document submission at the deadline wire. I was planning on working on this assignment further tonight after I arrived home from work and submitting it prior to the class schedule deadline of 5:00 pm on July 1st. However, I after reviewing your Moodle post from earlier today about an hour ago and I feel I should submit something prior to the 5:00 pm deadline you stated for today June 30th.…

    • 146 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Strategic Analysis Presentation H&M To what extent can H&M’s important resources and capabilities be sustained? -Describe resources and capabilities. VRIO framework The resources and capabilities of an organisation contribute to its long-term survival and potentially to competitive advantage.…

    • 1038 Words
    • 5 Pages
    Decent Essays