Network Security Proposal Part 1 Cmit 320 Assignment

1226 words - 5 pages

I. Analysis and Planning
A. Vulnerability Assessment
Requirements
The security and availability of the school network plays a huge role in the success of those who attend it. In order to provide a secure network environment for the betterment of the students and faculty a vulnerability assessment needs to take place. This vulnerability assessment is used to find where the weaknesses are in a network in order to assist in the protection of the network.
Proposed Solution
I have researched different vulnerability scanners to find out which will meet our needs for the vulnerability assessment. Weaknesses that he scanner will be looking for will be unused online ports, any applications that need to be used, critical patches necessary, any default passwords, and any misconfigured items. There are options for both free vulnerability scanners and ones which need to be paid for. I propose the use of Microsoft Baseline Security Analyzer or MBSA in order to find the issues with the current network configuration.
Justification
I chose MBSA because it gives an in depth security analysis. MBSA, because it has to be activated on each computer revealing their vulnerabilities, is most useful in a setting such as this where there are not thousands of computers. This way we get an in depth understanding of the vulnerabilities. Another advantage is that due to being created by Microsoft there are many resources that can be used to find out how best to utilize the scanner.
B. Security Policy
Requirements
Security policies for networks define the policies required to secure the network. A security policy can be split into four parts regulations, procedures, baselines, and guidelines. A security policy needs to take into account network devices, data loss prevention, software on the network, and most importantly employee background checks and user education on security policies.
Proposed Solution
Network security policies should start with user education on security policy and employee background checks. Before employment employees should be screened to make sure there is not a history of bad behavior and in the onboarding process they should be educated on the policies of what they can and cannot do on the network. Make sure that these very same users only have access to what they need to access, use the concept of least privilege to only give people the minimum privileges to do their job. Students should not have access to the teachers grading application and teachers do not need to be able to log into the network equipment. Unused ports should also be turned off as they present a security risk that can be avoided. And unnecessary programs should not be allowed to be added onto the computers.
Justification
The reason for these policies is that unused portions of the network and unneeded programs open up holes in the defense of the network that are unnecessary as those items are not needed for people to complete their duties. This is the same reason for...

Other Essays On Network Security proposal part 1 - CMIT 320 - Assignment

Identifying threat and vulnerability - St.cloud state university - Assignment1

1700 words - 7 pages Assignment #1- Assessment Worksheet 15 Points Assignment #1 Identifying Threats and Vulnerabilities in an IT Infrastructure Introduction The task of identifying risks in an IT environment can become overwhelming. Once your mind starts asking “what if...?” about one IT area, you quickly begin to grasp how many vulnerabilities exist across the IT spectrum. It may seem impossible to systematically search for risks across the whole IT

comparative essay on ext4 and nfts file system - university of westminster - essay

407 words - 2 pages 6ELEN013W Operating Systems and Drivers Coursework 1 – File Systems Weighting: 25% Submission via TurnItIn under Blackboard. The work must be entirely your own. Any material from other authors must be correctly referenced in accordance with University regulations. Referencing entire paragraphs or paraphrasing them (i.e. rewriting them in your own words) is not acceptable. Use of references should support your argument, not be your argument.  Any

Sdadsada

3969 words - 16 pages is the proposal of an adaptive multicast protocol that runs on a hybrid network as proposed in this paper. References [1] Krishnamurthy S. V y Mohapatra P. 2005. "Ad hoc Networks. Technologies and Protocols". Ed. Springer, 270 p. [2] Bejerano, Y.; , "Efficient integration of multihop wireless and wired networks with QoS constraints," Networking, IEEE/ACM Transactions on , vol.12, no.6, pp. 1064- 1078, Dec. 2004. [3] Kim Hyun-Chul; Park Myong

ITSS 4370 - Assignment 3 - Process Framework - UTD/ITSS 4370 - Assignment

881 words - 4 pages ITSS 4370 Assignment 3: Process Framework PCI DSS As a consumer of any company, the most basic and expected capability in completing a transaction is that the seller be able to keep the consumer’s credit card and cardholder information secure and confidential. The Payment Card Industry Data Security Standard (PCI DSS) was developed and created in 2004 by the major credit card issuers Visa, MasterCard, Discover and American Express just for this

Business Development - Business Plan Of ISP Company

5286 words - 22 pages Xxx s.r.o. and prepare proposal how to formulate new Business Plan. Xxx is my key customer for Data business.1.3. Data collection methods and information sourcesThis assignment has been elaborated using the relevant information sources and methods, including above all:Sources:Discussion with departments of XxxInternetMethods and procedures:Collecting relevant data and factsInterviews, email and telephone communication and deduction for

BUS 221 Assignment BUS 221 Assignment - ISU - Essay

919 words - 4 pages Abby Markowski April 24, 2019 Chapter 10 Assignment 1. Read the article Cybersecurity for Small Business. Compare the security tips provided in the article to the safeguards described in Chapter 10. What new tips did you learn from the article? The security tips provided in the article to the safeguards described in Chapter 10 are similar at the fact that companies should employ best practices on payment cards. Using these smart cards would

Advantages and Disadvantages of Networking - South University - Assignment

2848 words - 12 pages Albert Simmons WEEK 1 DISCUSSION Advantages and Disadvantages of Networks In this assignment, you will distinguish between the advantages and disadvantages of using computing networks. You will also get familiarized with the terms associated with networks. Provide a detailed description of situations in which the use of networks benefited you as well as situations where the use of networks was a disadvantage. Share at least one situation for

group assignment for semester 2, 2018 - university of adelaide - assignment

730 words - 3 pages Assignment Advance Funds Management (M) Semester 2, 2018 Assignment Brief: Your 3-member Mutual Funds Analysis team has recently been hired to (i) Create an Australian Equity Active fund, (ii) Analyse a US bond fund, (iii) Create an Australian/US multi-asset (Equities and Bonds only)class fund. Requirements: 1. Create and Active Australian Equity fund Each team will create an active Australian equity fund. This portfolio will have a tracking

issue proposal inssssssssssssssssssssssssssssssssssssssss - aaaaaa - essay

529 words - 3 pages English 103: Essay 1—Issue Proposal For this assignment, you will be asked to present the issue you have chosen to focus on for the entire semester. Because the remaining papers in the class will focus on this issue, you should make your choice carefully, and select a topic that you are passionate about. You are free to choose any issue as long as it can be connected to one of the issues/categories in “The Reader” section of our textbook. See

Project Management

5084 words - 21 pages 1. IntroductionThe assignment is related to team project of our group focused on strategic management applied in the company Xxx- publisher of newspapers. The company is analyzed in detail on all levels-corporate, SBU (strategic business units) and functional. This analysis is performed on 26 specific tasks. Our group consists of 28 students. This very demanding and complex work was therefore to be organized on the project bases. This work is

Accounting 3&4 Chapter 10 Exercise Solutions - WLC - Solution

3490 words - 14 pages Reporting Period: it is not part of the expense figure, but actually an asset – a future economic benefit. d General Journal General Ledger Subsidiary Ledger Date Details Debit $ Credit $ Debit $ Credit $ June 30 Rent Expense 2 700 Prepaid Rent Expense 2 700 e General Ledger Prepaid Rent Expense (A) Date Cross-reference Amount $ Date Cross-reference Amount $ Aug. 31 Bank 1 500 June 30 Rent Expense 2 700 Feb. 28 Bank 1 800 Balance 600 3 300 3 300

Similar Papers

Network And Security Homework 1 George Mason University Assignment

657 words - 3 pages MIS 320 – 004 HW Assignment #1 1. As related to networking, what are protocols? In short, network protocols are the rules for communications between them. The long definition is Network protocols are formal standards and policies comprised of rules, procedures and formats that define communication between two or more devices over a network. 2. What are the two parts of a MAC address? The two parts of the mac address are, Organizational

Business Proposal For Marketing Class Marketing 320 Assignment

2427 words - 10 pages that I can create a personalized product development plan that suits the requirements of your company. Sincerely, Claire Yang 1 Business Proposal for Listerine The Baby Mouth Wash Address: 28 Westahmpton Way Richmond, Virginia, 23173 Cell.: (804) 928-8017 Email.: Caire.yang@richmond.edu 2 Table of Contents I. Executive Summary ............................................................................................... 3 Introductory Statement

Assignment 1 Question And Answer For Part 1 Semo Question And Answer

2294 words - 10 pages Southeast Missouri State University, MK555 Assignment 1 60 POINTS (UG)/ 47.5 POINTS (G) 1. How does technology change traditional marketing? Describe the important Internet properties that affect marketing. b) What are the key elements of Web 2.0? c) What are the key elements of Web 3.0? As a consumer who is in control, what would you like to see for the future Web 3.0? Over the period technology has changed the way marketing is done as reaching

International Organisations Essay International Organisations Uts Essay

4008 words - 17 pages ) 11 Global Convergence 407; Kamrul Hossain ‘The Challenge and Prospect of Security Council Reform’ (2010) 7 Regent Journal of International Law 299.] [5: Anna Spain ‘The U.N. Security Council’s Duty to Decide’ (2013) 4 Harvard National Security Journal 320.] Part 1 – The Need for Reform The Need to Reflect the Evolving Geopolitical Realities of the Political Climate The underrepresented geopolitical structure in the UNSC has persisted with the