Nt1310 Unit 1

Improved Essays
1. Policies: Policies like Acceptable Use, Internet Access, and Email and Communications Policies can take the risk out of the user’s hands of doing what is right. Sites that could hold malicious codes and viruses can simply be blocked from access so that it isn’t even in their “hands” to make the decision.
2. Provision Servers: Using software like IPAM, making sure that your servers all have static addresses assigned to them. This also helps to detect strange traffic running across the servers
3. Secure Workstations: Creating user log in set ups so that only the corresponding person can access the network from a work station help to prevent lower security level personnel from gaining access.
4. Secure the Network: Access level assignments
…show more content…
Frequently Schedule Vulnerability Scans: With the constant stream of attacks and bots looking and probing for new ways to gain access to the network, the NSA should perform regularly scheduled vulnerability scans, and often. Run a vulnerability scan such as: SecureCheq, Nexpose, or Retina CS Community
6. Off Site Backups: A new and very popular practice is to not only keep dedicated servers off site or in multiple locations to prevent the loss of one site taking down the system, but also, clouding.
7. Secure Remote Access: Specify which users can connect to your intranet through Remote Access, Set up a remote access server, Create a customized remote access connection or service profile. Use tokens, smart cards, certificates, or SMS solutions.
8. Secure the Wireless Network: Aside from using an SSID that can’t be easily associated with the company, also be sure to use the strongest encryption type you can, IE: WPA2. Also, set up a guest network so you can prevent visitors to even connect to your internal network.
9. Secure Email: Install Antivirus, Antispam, and Antiphishing scanning software on the network for both incoming and outgoing mail. Also, set up your devices to automatically reject directory harvest

Related Documents

  • Improved Essays

    The lock should require multi-factor authentication, such as a card swipe and an access PIN, or a biometric id check and a PIN. Preferably, the PIN entry keypad would randomize the position of the digits for each PIN entry attempt. The system should be connected to the network, be centrally configured and record all access attempts in a log. c) Video Surveillance System: In order to keep records of who is physically accessing critical areas and devices, video monitoring cameras should be installed with good views of those areas. At a minimum, cameras should have a view of the inside of the wiring closet / server room, the entry point to the wiring closet / server room, and the main entrance to the company…

    • 617 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Nt1310 Unit 8.2

    • 772 Words
    • 4 Pages

    Since access has been granted previously, the network access codes will now need to be changed, to warrant away previous access to the network. An employee should be responsible for monitoring all network access to ensure that there isn’t unauthorized access or activity. Reports should be assessed by management to make any necessary…

    • 772 Words
    • 4 Pages
    Superior Essays
  • Decent Essays

    Nt1310 Unit 2

    • 234 Words
    • 1 Pages

    1. Who will participate in the evaluation? The person that will participate in this evaluation is my cousin. 2.…

    • 234 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Here are some basic requirement to have a company network that can be fast and reliable I would like to have some time to talk to your IT manager to know where we are, and know the needs. Your IT manager might have most of this suggestion deployed already, in that case this can be used as a check list I will try to help as much as possible and I will be open to do any configuration of any device when you need me to ( I can do that from here) 1. The size of the company needs to be taken in consideration as well as the potential grown ( for space requirements)…

    • 485 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Nt1310 Unit 3

    • 115 Words
    • 1 Pages

    Network security specialists detect, prevent and resolve security threats to computer networks. Security is an important aspect in businesses operating various Networking systems. Securing your company’s network consists of identifying all devices and connections on the network; setting boundaries between your company’s systems, enforcing controls to ensure that unauthorized access can be prevented, and contained. Network should be separated from the public Internet by strong user authentication mechanisms and policy enforcement systems such as firewalls. Another important factor is that Wireless Local Area Network should be separate from your company main network so that traffic from the public network cannot navigate through the internal…

    • 115 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Summary: Capstone Project

    • 522 Words
    • 3 Pages

    Capstone Project Summary This project will be to develop an overall written as well as a lab tested environment concept plan for a live implementation for a government contract. There is a need to lessen the number of running hardware services, implement high level security access for both physical access as well as any needed remote connections, to lessen the overall possible attack surfaces for the environment from potential attackers, make this a unilateral implementation anywhere, as well as follow and apply any and all Security Technical Implementation Guides (STIGs). We will be convert an older antiquated hardware server environment that is coming to end of life and will be in need up replacement or upgrade.…

    • 522 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Johnson Financial (JF) is a mid-sized insurance company located in the northeast United States. The company supports a remote computing environment for users located outside of the corporate offices. The remote users, outside of the corporate network, support various aspects of the business operations. Up to twenty percent of the company users may remote compute at any point in time. The current method of remote computing is based on a company provided laptop and a vpn connection to the corporate data center.…

    • 501 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    HGC Case Study

    • 1025 Words
    • 4 Pages

    The security systems will be focused on management security, operational security and technical security controls. Management Security: These are management controls that will focus on the management of the IT security system and the management of risk for interconnected systems in HBWC environment, and includes techniques and concerns usually addressed by IT management. Operational Security: The operational controls address security methods focusing on mechanisms primarily implemented and executed by people (as opposed to systems). These controls are put in place to improve the security of a particular system (or group of systems). Often, they require technical or specialized expertise and rely upon management activities as well as technical controls.…

    • 1025 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Another type of security event or baseline anomalie could be the increased network traffic which could indicate an unauthorized server, software, or potential malware. Shareware installed on a client device is a perfect example where network traffic could increase when downloading electric content onto a corporate network that could potentially be infected with malware. Shareware also opens up the device to sharing its data to the outside world potentially leaking propriatry and confidential data. Monitoring network bandwidth, closing firewall ports, and removing local administrator rights are a few ways to remediate shareware activity. Given a list of policy violations and security breaches, select three breaches, and consider the best options for controlling…

    • 1084 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Byod Case Study Summary

    • 588 Words
    • 3 Pages

    Also, besides the security concerns, another most significant factor is the IT support concerns. Many IT professional cannot manage all their employees’ devices. Also, they cannot control everything the employees doing while they are on the company’s network. It is crucial to weight both the positive and negative before deciding to adopt the BYOD. One critical point is the security policy.…

    • 588 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    P3: Explain the potential risks to an organization of committing to an e-commerce system Risks 1. Hacking In computer interacting, hacking is any technical effort to operate the normal performance of network links and connected systems. A hacker is any person engaged in hacking. Today, however, hacking and hackers are most commonly associated with malicious programming attacks on the Internet and other networks.…

    • 1208 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    Common Vulnerabilities

    • 164 Words
    • 1 Pages

    Common vulnerabilities include weak default installation settings, wide open access controls, and devices lacking the latest security patches. Top network level threats include need to make sure that there one entry to the server room. The entrance of the access door should not be directly visible to the location of the office where the majority of the officials work. Before the main access door there should be another small door or space to reduce the risk of piggy backing. The electrical wiring should be placed inside fire-resistance panels and if there are any office desk or cabinets, then use only those equipment’s made of fire-resistance materials.…

    • 164 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Safe From Identity Theft

    • 311 Words
    • 2 Pages

    Identity theft is the act of using someone else’s identity and information in your favor, typically for financial gain. The victims of identity theft are often left struggling to recover for a very long time. It’s shockingly easy for someone to take your information and use it to their advantage. With rapid advances being made in the world of technology, it only becomes more difficult to catch identity thieves. Nobody can be completely safe from identity theft, but there are many measures you can take to protect your identity on your own without the help of a protection company.…

    • 311 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    With physical controls you need to understand that this is a computer that is accessed right there on site and since this is a pharmacy it is going to be one of the three computers that are available at any of the three windows for anyone to use. There needs to be a username to log in with a password that has its own requirements attached to it. Also, with a computer onsite and physical access if no one is using the computer it needs to automatically lock itself within 10-15 minutes unless it is already in use. With logical access you need to understand that this is what some companies would say is a “privilege”. To be able to work for example from home or on vacation and not have to be at work physically to do the job that you are required to do.…

    • 1323 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Oracle Case Study

    • 726 Words
    • 3 Pages

    This can be accomplished by using firewalls, intrusion prevention/detection systems, strong encryption, and good security…

    • 726 Words
    • 3 Pages
    Improved Essays