Unit 8 Assignment 1 : Network Hardening
Used the Network Layout 1: Workgroup.
In this workstation network configuration, we will start with the User Domain.
1. Acceptable Use Policy is the first line of defense for making sure the users know what i
Unit 2 Assignment 1 Calculate the Window of Vulnerability
Weve been asked to calculate a Window of Vulnerability (WoV) for a breach that has occurred.
The data for the window of vulnerability are as follows.
The breach was identified one day ago fo
Unit 1 Assignment 2: Impact of a Data Classification Standard
This report will detail the specific definition of the data classification standard Internal Use Only
and will briefly explain the IT domains that this classification will affect.
Unit 3 Discussion 1 : Access Control Models
Weve been asked to develop a remote access control policy for the North American
offices of the Richman Investment firm. Currently the company headquarters is located
in Phoenix AZ. There are 8