Cuts the cost and increases the profit increased

This preview shows page 8 - 11 out of 17 pages.

-Cuts the cost and Increases the profit.-IncreasedBandwidthand guaranteed uptime-High set up costs -High Maintenance
INCIDENT RESPONSE 9A preshared key is a security method used to transfer a shared secret key between two parties in order to authenticate users on a local area network (Alpern, 2010). It works when the WLAN produces a password, then a key is generated using this password by the router and the credentials of the connecting nod. This is FIPS 140-2 compliant. The FIPS 140-2 standard is an information technology security approval program for cryptographic modules produced by private sector vendors (NIST, 2004). The way to determine is something is FIPS 140-2 certified is if the hardware or software is validated by one of NIST labs. It is important to be compliant because it is considered the benchmark for security (Rinehart, 2018). Being compliant is essentially approving a product that can be used to secure sensitive information. Below are tablesshowing wireless protocols and a comparative analysis of four protocols.Wireless ProtocolsBluetooth3G & 4GLTEZigBeeTABLE: 2 ProsConsSuitabilityHTTPSBetter securityAllows for creationof sandbox environmentsCan encountersome mixed modesCould requirechanges to your mobileplatforms.The risk do notout way the positives ofthe HTTPS protocolwhich makes it verysuitableTelnetVersatileUnlimited access totarget resourcesUnencrypted dataexchangeEasier access forhackersThis is a goodprotocol but is notsuitable for this companybecause of the risksassociated with it.DNSFast internetconnectionMakes internetbrowsing simpleUsually does not carry any information about the clients who initiated it.Provides security enhancements Suitable for thecompany, but there arebetter protocols SSHAllows forencryption of dataAllows tunneling ofother protocolsOccasionally losesconnectionVery Suitable
INCIDENT RESPONSE 10TABLE: 2.1Step 4 Remote Configuration ManagementRemote configuration management allows system configuration changes to be performed through the network without needing access to the console of the system being configured (UMUC, 2019). A remote configuration management’s purpose is to allow for a safe way for a system to be accessed remotely to change or manage some configurations by management. Remote configuration management is usually done by installing remote control software or a service to allow the two connecting devices to communicate (UMUC, 2019). The uses for configuration management are configuration, diagnosing problems/troubleshooting, asset discovery, patch management, and monitoring. These practices all aid in maintaining the securityposture of the company’s network.It is very simple to remove an undocumented device from the company’s network. The steps in removing an undocumented device from the network is (Cisco, 2020):1.Select the network containing the device(s).

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture