After conducting a thorough security test on the Alexander Rocco network, you ha
ID: 3890594 • Letter: A
Question
After conducting a thorough security test on the Alexander Rocco network, you have identified several intrusion attempts from sources over the Internet.
The hackers haven’t gained access to the internal network yet, but you’re concerned that it’s only a matter of time before the attempts become successful.
Task 1: What can be done to attract intruders and keep them connected to the network long enough to trace them.
Task 2: The report should discuss the pros and cons of using this strategy and mention any legal issues the company might face.
Task 3: Include your recommendations for configuring or revamping the network to defend against four types of threats.
Task 4: The report must mention standard tools, security devices and software packages to be used.
Explanation / Answer
Task 1: What can be done to attract intruders and keep them connected to the network long enough to trace them.
- In order to maintain better security in an company we need a better secure area or a network.
- Security thing is very important in a software company or organisation in order to make intruder very secure.
- To maintain the secure are very secure we need to maintain the role of Network Management are:
- They always Manage and maintain the network and network performance by monitoring them daily.
- They always Identifying, installing and maintaining upgrades to the network when there is requirement.
- They always make sure that every malfunctions will be Troubleshooted and repaired.
- They always make sure that the user access are working fine with the network
- They make sure that they keep the backup and disaster recovery plan for a network shutdown or emergency.
- They Plan the network infrastructure for new user and new applications and services
- They Train the network team to provide support to end users
- They always Purchase and maintain the networking equipment and infrastructure whenever possible.
- They also Integrate the mobile devices and laptops into the organizations networks according to the users requirements.
Task 2: The report should discuss the pros and cons of using this strategy and mention any legal issues the company might face.
- The security software must be licensed because any unauthorised software might be risk in an organisation.
- To maintain the security secure we must maintain the licensed security software.
- The legal issues like disgruntled employees means Letting an employee go without any final termination forms and the door wide open for legal actions.
- The legal alleged discrimination in between emplyees like their sex, age or otherwise they can cause your company serious problems.
- The immigration audits that can cause a company if it is found to be using illegal labor.
- And also issues like Copyright and Patent Issues, Dissatisfied Customers and Other Legal Issues.
Task 3: Include your recommendations for configuring or revamping the network to defend against four types of threats.
- There are many security threats in the orgainsations like internal, external and power unit and servers
- The security threats in Infrastructure might also be big issue.
- The security threat in devices like Managing the company and personal devices to classify and encrypt data to ensure compliance
- Identifing the compromised or questionable end points
- quarantine, wipe and remediate compromised devices
- Better Response Use analysis tools to monitor traffic and search for anomalies
- Give good communication by learnings from behavioral analysis to build a map of entity interactions.
- Give Practice just in time and just enough access control.
Task 4: The report must mention standard tools, security devices and software packages to be used.
- There are many softwares like softunic and avast, nortoon security software which can be used for securing the data.
- The SoftClinic software have more features which will help us to track and save the business data.
The Features of SoftClinic Software are listed below:
- SoftClinic software have the Detailed demographical and clinical data analysis.
- SoftClinic software have the Built in backup and restore facilities.
- SoftClinic software can give us Family wise patient records management
- SoftClinic software has Various Predefined Certificate.
- SoftClinic software have Two Ways Synchronization
- SoftClinic software have the SMS Facility also.
- SoftClinic software will help us to Generate Prescriptions in less than 60 seconds.
- SoftClinic software is very easy to use patient visit details (OPD/IPD) modules.
- SoftClinic software can give the Prescription in regional language.
- SoftClinic software have Billing and account manager for our accounting needs.
- SoftClinic software have the Multi-user and LAN compatible.
- SoftClinic software can Compatible with any Windows 9x or higher version.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.