Project Paper - NextGard Technologies Macgyver Duarte...

Info icon This preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
NextGard Technologies Macgyver Duarte 1 NextGard Technologies Macgyver D. Duarte January 28, 2015 ISSC 342 Operating Systems – Prof Elliott Lynn American Military University
Image of page 1

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
NextGard Technologies Macgyver Duarte 2 Introduction NextGard Technologies is a huge corporation with approximately 250,000 employees spread over 5 countries. That means their network is huge, the amount of servers they have that contains all the information for people to access from around the world is a lot. When you have a network that big it is important to make sure the system maintains its integrity and stays secure. You will want to make sure there are appropriate Microsoft Windows access controls by implementing policies and using those techniques the right way to make sure that everyone can access the information that is only needed for their work. You will also want to use cryptography methods to make sure that sensitive information is encrypted and secure. There are a few different types of cryptography that NextGard can use. Malicious code is also something that poses a danger to every single computer connected to NextGards network. Some of the most common malware are viruses, worms, and Trojan horses. There are a few countermeasures the company can and will take, to include but not limit to, layered security, firewalls deployed on desktops and networks, and making sure there is a good password policy in place. You can also use a network analyzer to continuously monitor and analyze the status of your network. Continuous monitoring of your network is extremely important. Here at NextGard, I propose that the responsibility of monitoring the network will be a 24/7 job for every member of the IT department. There are quite a few things NextGard can and should do to prevent any breach in their network infrastructure. One of the first things would be creating an internet usage policy. An internet usage policy would set about things an employee can or cannot do while working on a company owned computer. Along with the internet usage policy, the company should have web
Image of page 2
NextGard Technologies Macgyver Duarte 3 filters, which can limit what content employees are allowed to access while connected to the network. There are also ways to avoid malware, and there should be procedures written for network administrators, to follow so they can make sure there is adequate security and continuous coverage. Windows Access/Cryptography Methods There are a few solutions for appropriate Microsoft Windows access controls, which include policies and programs, which make managing your network easier. So, what is access control? Access control allows an administrator to control what access users have on a network by providing tools to manage users and groups. There are also cryptography methods to protect organizational information. “Cryptography is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it.” (Rouse, 2014). Both of these topics are helpful in managing and protecting company information to
Image of page 3

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern