It 273 Unit 8 Project

Related Essays

Basics Unit Project
Basics Unit Project Date: 9/1/11 Name: Kelsey Cornell Topic 1: Computer Use in Automobiles Website 1: http://www.uri.edu/personal2/pbisiak/
It 273 Unit 1
can you use to present your project?) i. During which unit is your final project due? 2. There are four activities that you are required to
It 273 Unit 1
1 Assignment Kaplan University 1. Unit 1 review questions: a. The functions provided by a network are usually referred to as network services. b. A remote
Information Technology Project Management
107 Product-Oriented Scope 109 Product-Oriented Scope Definition Tools 109 Project Scope Verification 111 Scope Change Control 113 Scope Change Control Procedures

Submitted by to the category Science and Technology on 10/03/2011 07:57 AM

Jonathan Migneron

IT-273

Unit 8 Project

Kaplan University

1. Review Questions

A. A(n) POWER SURGE is a momentary increase in voltage due to lightning strikes, solar flares, or electrical problems.

B. SOCIAL ENGINEERING occurs when a person attempts to glean access or authentication information by posing as someone who needs that information.

C. MIRRORING is a fault-tolerance technique in which one device or component duplicates the activities of another.

D. CLUSTERING is a fault-tolerance technique that links multiple servers together to act as a single server.

E. ENCRYPTION is the use of an algorithm to scramble data into a format that can be read only by reversing the algorithm

2. Security Breaches

Employees should not be writing passwords on post its and leaving them out in the open. In fact, employees shouldn’t be writing passwords down period. Having strong passwords is key, but some users are forgetful and assume since they are at work their password written on a post it is harmless. A customer could easily spot a password and access your network and steal important information. So users should be trained to use hints if password remembrance is an issue.

The email issue sounds like the network may have spyware installed on it. Emails may be being intercepted and causing the competitors to copy Banana trees marketing ideas. Installing and updating antivirus software should correct this problem if it is spyware.

3. Security Checklist

 Set strong administrative password

 Download and install all critical updates

 Audit physical network security

 Use a firewall

 Install antivirus and antispyware software

 Install and configure Web filtering software

 Train employees on social engineering

 Do not allow employees to use data disks or thumb drives unless permission is granted

 Turn off auto run feature on employee computers

 Employees should have strong passwords including special characters and...

View Full Essay
Full Essay Stats...
  • Words: 745
  • Pages: 3
  • Views: 758