Lake Point Consulting Services (LPCS) provides security consulting and assurance
ID: 3907506 • Letter: L
Question
Lake Point Consulting Services (LPCS) provides security consulting and assurance services to over 500 clients across a wide range of enterprises in more than 20 states. A new initiative at LPCS is for each of its seven regional offices to provide internships to students who are in their final year of the security degree program at the local college.
Blue Ridge Real Estate is a statewide residential and commercial real estate company. Because the company was the victim of several recent attacks, Blue Ridge wants to completely change its network infrastructure. Currently the company has a small IT staff, so they have contracted with LPSC to make recommendations and install the new equipment. First, however, they have asked LPSC to give a presentation to their executive staff about network security.
1. Create a PowerPoint presentation for the executive staff about network security. Include what it is, why it is important, and how it can be achieved using network devices, technologies, and design elements. Because the staff does not have an IT background, the presentation cannot be too technical in nature. Your presentation should pcontain at least 10 slides.ppp
2. Blue Ridge has been working with LPSC and is debating if they should use UTM network security appliances or separate devices (firewall, Internet contepnt filters, NIDS, etc.). Because they appreciated your first presentation, they want your opinion on this subject. Create a memo that outlines the advantages and disadvantages of each approach, and give your recommendation.
Explanation / Answer
1) Network security plays a major role in protecting the data of companies.
2) Network security is the combination of both the hardware and software.
3) It provides security from intruders,malicious code and other attacks.
4) Provide security using network antivirus,firewall etc.
5) Create a domain and place all systems in domain network to overcome data loss.
6) Use of strong passwords to protect the data in the network.
7) We can use the network devices like switches & routers for the safe passing of network data.
8) Assign IPV6 and use dynamic allocation of address using(DHCP).
2) Coming to the LPSC networks these are using only virtual private networks which can be used for only few systems and coming to UTM network it is a tool which can be used for protecting against all kind of security threats.In UTM we are having intrusion prevention system which can be used for protecting the system from specific hacker attacks.
So finally i would like to recommend the UTM network as a security appliances.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.