NT1230 Unit 3 Problem Set 1 Unit 3 Problems October 6, 2014 Pg. 182 #1-10 1. A software routine, which also acts as a filter that blocks certain type of incoming and outgoing traffic, while enabling other types is called a Firewall. 2. The Network and Sharing Center tool provides a central access point for all of the network controls and connections on a computer running Windows 7.
NT1230 Unit 3, Problem set 1 1. A software routine, which also acts as a filter that blocks certain type of incoming and outgoing traffic, while enabling other types is called a firewall. 2. The network and sharing center tool provides a central access point for all of the network controls and connections on a computer running Windows 7. 3.
What is the primary goal of backing up data ? Ans. The primary goal of backing up data is to avoid data loss and can regain the data whenever needed. 4. If you want to perform a backup but do not want to clear markers or affect other backup types, you should perform a(n) Copy backup.
Unit 3 Assignment 1: Analyzing the Critical Security Control Points The following is a listing of security control points that any company should look at as necessary areas for precaution and care. Information covered by each area will be what each area consists of, how it strengthens the company security and what could happen if these areas are not properly maintained. 1. Inventory of Authorized and Unauthorized Devices and Software – a listing of processes and tools used to track/control/prevent/correct network access by devices and software. Attackers are always looking for devices and software that are newly added to a system and not updated correctly with the security measures in place already.
You want to encrypt your main file server’s disk that stores confidential information for several users. Which Windows encryption feature
Some of the requirements would include strict control enforced via one-time password authentication or public keys with strong pass-phrases. Also, anyone trying to gain access must not be connected to any other network at the same time, aside from personal home networks under the user's complete control. Further, employees with access must not use email accounts other than the company's standards, so that personal use won't be confused with business. Users must have approved virus control and spyware protection in place on all devices accessing the company network. Remote access will be limited in certain areas, while at least Applications will be approved for access (Shared application data is an important part of Richman’s network).
The first recommended piece of equipment is a strong firewall, in this case the Dell SonicWall NSA 4600 (SonicWall). The firewall will manage multiple tasks for both offices including being the DHCP server, the DNS server, preventing outside intrusion, managing the wireless access points (WAPs), controlling the connection to the New York office and authenticating remote users. Each of these tasks can be handled by the recommended firewall (Dell). The firewall specified in Table 1 of Section 1.5 is also includes five technician licenses for Dell Virtual Assistant, a program used for remote assistance of users. The device also includes 3 years anti-virus and anti-SPAM protection for all devices connected to the network (Dell).
[ (UOP, 2011) ] The network plays an important factor for OR/ICU/ Ward Floor System. In the operating room, there is again a network of Apple MAC PRO, while at each work and nurses station they use Apple iMac with Superdrive and Wireless communication card. In each room of ICU, there are wireless access points that are Cisco 1250
SPAP encrypts the password and then sends it and the username across the network (Shinder, 2014). CHAP and MS-CHAP is another remote access authorization protocol. CHAP uses a hash algorithm to hash the password so the hashed password could not be reverse engineered to retrieve the original password, but it is vulnerable to impersonation by remote servers. MS-CHAP is not because of the two-way authentication verifies both the client and the server identity. MS-CHAP added an individual cryptographic key increasing its security for the transmitting and receiving of information (Shinder,
The chief information officer (CIO) explains that the diagram is being updated and awaiting final approval. The IS auditor should FIRST: A. expand the scope of the IS audit to include the devices that are not on the network diagram. B. evaluate the impact of the undocumented devices on the audit scope. C. note a control deficiency because the network diagram has not been updated. D. plan follow-up audits of the undocumented devices.