Nt1310 Unit 8.2

Superior Essays
Kaplan University
IT286
Unit 8.2
Jennifer Polisano

Answer 8.2: As the IT Security Professional for Web Site 101, I will be recommending adjustments for recent security issues, including data loss due to employee negligence, physical break ins, identifying employee security standards, identifying network access specifics, and the recent hacking of the home page of Web Site 101. Web Site 101 currently has 300 employees working on three levels of the office building. In the previous years, this organization has grossed 2 million dollars revenue per year. For the organization to continue to thrive, these security problems will need to be addressed immediately. Many of these concerns may be remedied by simply revisiting the company policies and procedures. Data loss is a serious problem. Typically large companies have an automatic data backup in place. Proper automatic backups can be set up daily, weekly, or monthly. For this size company, I would recommend daily backups. Each employee should be held responsible for ensuring that their daily backup has taken place without any errors. If errors should arise, an IT Professional such as myself should be notified
…show more content…
Fact is, access it the network grants access to more than just the internet. Not everyone should be able to access the network. Infinite amount of trouble can come from unauthorized persons accessing the organization’s network. If it is a guest network that is needed, that should be added to the organization. That’s only part of the solution. Since access has been granted previously, the network access codes will now need to be changed, to warrant away previous access to the network. An employee should be responsible for monitoring all network access to ensure that there isn’t unauthorized access or activity. Reports should be assessed by management to make any necessary

Related Documents

  • Improved Essays

    Nt1330 Unit 3 Paper

    • 985 Words
    • 4 Pages

    It is very important to have a current and accurate data backup plan for emergency situations. Losing all of your data or maybe even just some of it could have dire consequences for the company. These consequences could be in the form of compliance infractions and come with steep fines all the way to laws suits for loosing customer data or classified information. Having the ability to restore this data if it is ever destroyed or compromised could save our company from losing all credibility and going bankrupt. Having a good data backup plan ensures that we will be able to restore our company in a disaster to an acceptable state of operation without losing much if any information necessary to keep our customers happy and business running…

    • 985 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    The business requirements of the access control must be established and documented. Access control rules and rights for each user or group of users should be clearly stated in a policy statement about access All employees, contractors and third party users of information systems and services should be required to record and report any allegations or findings of security weaknesses in the system or the services. This aims to ensure that information security events and weaknesses detection of information security can be dealt with in a timely and…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Upon determining what should be in the intranet, what risk is the organization willing to tolerate should be tackled. An assessment of the privacy controls and security controls can be determined by using NIST Special Publication 800-53A: Assessing Security and Privacy Controls in Federal Information Systems and Organizations, Building Effective Assessment Plans as a guide along with NIST Special Publication 800-30, Rev-1, Guide for Conducting Risk Assessments (NIST SP 30-1, 800-53A). To truly understand this publication is prohibitive to fully explain; however, this step is critical and will impact your intranet dramatically. To simplify: you cannot always have the risk metric you desired because by doing so would make your system so slow and unusable you could not accomplish much.…

    • 428 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Nt1310 Unit 3

    • 115 Words
    • 1 Pages

    Network security specialists detect, prevent and resolve security threats to computer networks. Security is an important aspect in businesses operating various Networking systems. Securing your company’s network consists of identifying all devices and connections on the network; setting boundaries between your company’s systems, enforcing controls to ensure that unauthorized access can be prevented, and contained. Network should be separated from the public Internet by strong user authentication mechanisms and policy enforcement systems such as firewalls. Another important factor is that Wireless Local Area Network should be separate from your company main network so that traffic from the public network cannot navigate through the internal…

    • 115 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 7

    • 1149 Words
    • 5 Pages

    1. Focus on the overall “security assessment” risk rating that appears at the top of your report. Considering what security measures you (or the computer owner) have undertaken for your computer, does the assessment surprise you? Why or why not? What measures should you plan to undertake if the green checkmark did not appear?…

    • 1149 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 1

    • 768 Words
    • 4 Pages

    Specify which users can connect to your intranet through Remote Access, Set up a remote access server, Create a customized remote access connection or service profile. Use tokens, smart cards, certificates, or SMS solutions. 8. Secure the Wireless Network: Aside from using an SSID that can’t be easily associated with the company, also be sure to use the strongest encryption type you can, IE: WPA2. Also, set up a guest network so you can prevent visitors to even connect to your internal network. 9.…

    • 768 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Wyoming Medical Center, Los Angeles County, and Raymond James all share similar struggles with how to secure the network, computers and mobile devices. Control and security are a concern from both inside and outside of the facilities and organizations. Each organization deployed a multi-level/tier approach was needed to protect the data. The Novell ZenWorks agents are used to manage the operating systems and software that is installed on the desktops/workstations; it allows the information technology group to customize the software for installation and patch management.…

    • 302 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    Quorum Case

    • 1151 Words
    • 5 Pages

    Recently the IT team initiated a review of the capacity of data being backed up to overcome some of the issues but was unable to reduce the total size sufficiently to maintain a regular and consistent system backup. The existing backup solution…

    • 1151 Words
    • 5 Pages
    Great Essays
  • Decent Essays

    As Maxistar Medical Supplies Company develops and extends operations it turns out to be progressively critical to keep IT operations secure while likewise empowering the business to rapidly and adequately address client issues. Amid a late appraisal Maxistar recognized a few changes that should have been be executed to their IT operations to secure their business to adjust to administrative and lawful consistency for the Payment Card Industry (PCI), HIPAA, and NIST 800-53 principles. As a major aspect of this evaluation, a few known dangers were recognized and 5 regions particularly were focused as the start of Maxistar's Security and Compliance program. This record will plot those dangers and the rules for our arrangement to carry Maxistar…

    • 164 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    Another type of security event or baseline anomalie could be the increased network traffic which could indicate an unauthorized server, software, or potential malware. Shareware installed on a client device is a perfect example where network traffic could increase when downloading electric content onto a corporate network that could potentially be infected with malware. Shareware also opens up the device to sharing its data to the outside world potentially leaking propriatry and confidential data. Monitoring network bandwidth, closing firewall ports, and removing local administrator rights are a few ways to remediate shareware activity. Given a list of policy violations and security breaches, select three breaches, and consider the best options for controlling…

    • 1084 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Winter’s Tale Publishing; a Hack job The case centers around the liabilities in which poor management can expose a company as well as the side effects that a cyber-intruder can have on a business' operations. Secondary issues explored include, auditing the company’s framework to evaluate their internal control structure, designing a secure IT network for start-up businesses, and address their legal and marketing worries if the organization were to be hacked.…

    • 1952 Words
    • 8 Pages
    Improved Essays
  • Great Essays

    In this section of the project, we will discuss how to mitigate, avoid, accept, or transfer the previously discussed risks. In the Risk Assessment Plan, we listed all the various risks that could interfere with operations at DLIS. The table below (Table 1.2) explains in further detail the type of mitigation we have chosen, as well as the particular strategy we will use to handle each risk.  Table 1.2 – Risk Mitigation Strategies Risk Factor Mitigation Type Mitigation Strategy Building fire Mitigation Install proper fire containment systems in all site buildings; fire extinguishers near staff Server failure Mitigation Network administrators monitor hardware at regular intervals for deviation from baseline; spare parts are kept in secure storage…

    • 681 Words
    • 3 Pages
    Great Essays
  • Improved Essays

    1. The message I would have received as a hospital administrator from this video would have been: The importance of keeping my organization's information secure from anyone else not permitted to have my knowledge, and more specifically the knowledge of my patient's care as well as their demographic information. It is my responsibility as a hospital administrator to keep my data secure, and whether that means hiring a IT security company or maintaining a high security software is my responsibility in order to stay within HIPPA guidelines. 2.…

    • 477 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    The Y2K Crisis

    • 1120 Words
    • 5 Pages

    Having an effective security system for your organization is one of the most critical issues that the government and businesses face in this new era of technology. Technology has become the pivotal point of everything; it is a part of daily lives. There was a time where your cellphone was just a phone, now it’s a portable computer that is able to monitor your movement and health status (Jones & Aiken, 2014). In a world where millions of computers are connected to the Internet and one time, there are bound to be security issues at times. When attacks happen on the government and big businesses the outcome can disrupt the world around us.…

    • 1120 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    7/A. P2: Explain the principles of information security when protecting the IT systems of organizations 7/A. P3: Explain why organization must adhere to legal requirements when considering IT system Security. 7/AB. D1: Evaluate the effectiveness of the technique used to protect organisations from security threats whilst taking account of the principles of information security and legal requirements. Principles of information security…

    • 1392 Words
    • 6 Pages
    Improved Essays