View the step-by-step solution to:

You have been recently hired as a network security analyst for a small accounting firm. With your background and skills, they are looking to you to...

Please help me with my part 1 and part 2 of the project. I have attached the documents here. 

You have been recently hired as a network security analyst for a small accounting Frm. The Frm is realizing that they need help to secure their network and customer’s data. With your background and skills, they are looking to you to provide guidance. In addition to helping them secure their network, they require that you obtain your CompTIA Security+ certiFcation within 60 days of being hired. In addition to the owner, who serves as the overall business manager, there are about 20 people on sta±: ➢ 10 accountants ➢ 3 administrative support specialists ➢ 1 vice president ➢ 1 Fnancial manager ➢ 2 interns There is also one IT support technician on sta±, who has basic computer hardware and networking knowledge. He has requested that the Frm create a website, hosted internally, so that new customers can get information about the Frm. This will be important to remember as you complete your Fnal project. The Frm has a simple network. There are currently 20 computers and two multipurpose printers. All computers and printers are connected wirelessly to a NETGEAR MR814 device. This router is connected to a Motorola SB3100 cable modem. Sta± e mail accounts are set up through the company’s Internet provider. Employees use a combination of Microsoft Outlook and standard web browsers to access their e-mail. The owner is known to use his personal iPad during work hours to check and respond to e mail messages. Prior to your hiring, they hired a network cabling contractor to run Cat 6 cables from the central wiring closet to all o²ces and cubicles. They want to move away from using wireless as the primary network connection, but want to keep wireless access for customers coming to the building. The technician who did the wiring mentioned to your supervisor that he should look into setting up a Windows Server domain to manage user access, instead of the current peer-to-peer network. He also recommended that the Frm invest in a managed switch and a Frewall, and look into having some backups. The internal IT support technician agreed with these recommendations but needs your help to implement them. You’ve been asked to assess the current vulnerabilities and provide a recommendation to the Frm’s owner on how to better
Background image of page 1
secure the network infrastructure. Now that you are aware of the Frm’s history, your assessment and recommendation should provide speciFcs about the network security settings that must be implemented and the equipment that must be procured, installed, and conFgured. The Frm’s owner has a basic understanding of computing, so it is important that you explain the technical issues in layman's terms.
Background image of page 2
I. Vulnerability Assessments Use this section to describe any network security vulnerabilities. Use the scenario along with industry standards and best practices to identify the vulnerabilities. Describe why it is vulnerable and what the implication is if it is not mitigated. The example below is of the physical security of a warehouse. (In your submission, you will have several vulnerabilities identified and mitigated.) At the Alpha Warehouse, we discovered one key vulnerability to the physical security. This was the use of a Master Lock combination lock to secure the back entrance. While the use of a combination lock can limit the number of people who can enter to those given the combination, vulnerability in the design of these locks was recently exposed. By using “a process that requires less than two minutes and a minimal amount of skill to carry out [ 1 ],” would-be thieves can access the warehouse through a single entrance. While the thief will need to also have access to an online calculator that helps stream the process, the prevalence of smart phones makes this a small hurdle to jump, allowing any interested parties quick access to the Alpha Warehouse. Develop a vulnerability assessment based on the scenario provided This includes: Analyzing business needs in regards to network security Identifying current vulnerabilities Providing scholarly references to the vulnerabilities Articulating the vulnerabilities 1
Background image of page 1
Follow proper procedures and protocols in completing IT-related tasks. This includes: Performing vulnerability assessment based on the scenario Demonstrating the ability to make network administration or Cybersecurity decisions based on best practices and/or standard procedures/protocols II. Network/System Security Recommendations This section will provide network/system security recommendations on how to address the vulnerabilities identifed in Section I. Provide specifc courses oF action along with any pertinent inFormation about the recommendations. In this section, you will cover recommendations only to network inFrastructure or network devices. Don’t cover soFtware recommendations here. Example In order to resolve the vulnerability created by using a Master Lock combination lock, it is recommended that it be replaced by a more secure deadbolt door lock— specifcally, a ±alcon D241. This lock is rated as the top standard lock by Consumer Reports. They rate its resistance to kicking, prying, wrenching and hammering as excellent, and the resistance to picking and sawing as very good. The only thing that was considered poor was its resistance to drilling, but no standard lock was anything other than poor. Only the high security locks had higher ratings For drilling, and only one oF those, the Medeco Macum 11WC60L, was rated higher than the ±alcon [
Background image of page 2
Show entire document
Sign up to view the entire interaction

Top Answer

The solution is... View the full answer

Network.docx

Running head: NETWORK SECURITY SYSTEM VULNERABILITIES NETWORK SYSTEM SECURITY VULNERABILITIES
(Student Name)
(Course Name)
March 24, 2016 1 NETWORK SECURITY SYSTEM VULNERABILITIES 2 1....

Sign up to view the full answer

Why Join Course Hero?

Course Hero has all the homework and study help you need to succeed! We’ve got course-specific notes, study guides, and practice tests along with expert tutors.

-

Educational Resources
  • -

    Study Documents

    Find the best study resources around, tagged to your specific courses. Share your own to gain free Course Hero access.

    Browse Documents
  • -

    Question & Answers

    Get one-on-one homework help from our expert tutors—available online 24/7. Ask your own questions or browse existing Q&A threads. Satisfaction guaranteed!

    Ask a Question
Ask a homework question - tutors are online