It 273 Unit 8 Project

Related Essays

Basics Unit Project
Unit Project Date: 9/1/11 Name: Kelsey Cornell Topic 1: Computer Use in ... the most important processors is the engine control unit also known as ECU; it controls
It 273 Unit 1
of the final project? (What programs can you use to present your project?) i. During which unit is your final project due? 2. There are
It 273 Unit 1
Networking Fundamentals: Unit 1 Assignment Kaplan University 1. Unit 1 review questions: a. The functions provided by a network are usually referred to as
Information Technology Project Management
Is a Project? 9 Attributes of a Project 9 The Project Life Cycle and IT Development Define Project Goal 12 Plan Project 13 Execute Project Plan 13 Close Project 14

Submitted by to the category Science and Technology on 10/03/2011 07:57 AM

Jonathan Migneron


Unit 8 Project

Kaplan University

1. Review Questions

A. A(n) POWER SURGE is a momentary increase in voltage due to lightning strikes, solar flares, or electrical problems.

B. SOCIAL ENGINEERING occurs when a person attempts to glean access or authentication information by posing as someone who needs that information.

C. MIRRORING is a fault-tolerance technique in which one device or component duplicates the activities of another.

D. CLUSTERING is a fault-tolerance technique that links multiple servers together to act as a single server.

E. ENCRYPTION is the use of an algorithm to scramble data into a format that can be read only by reversing the algorithm

2. Security Breaches

Employees should not be writing passwords on post its and leaving them out in the open. In fact, employees shouldn’t be writing passwords down period. Having strong passwords is key, but some users are forgetful and assume since they are at work their password written on a post it is harmless. A customer could easily spot a password and access your network and steal important information. So users should be trained to use hints if password remembrance is an issue.

The email issue sounds like the network may have spyware installed on it. Emails may be being intercepted and causing the competitors to copy Banana trees marketing ideas. Installing and updating antivirus software should correct this problem if it is spyware.

3. Security Checklist

 Set strong administrative password

 Download and install all critical updates

 Audit physical network security

 Use a firewall

 Install antivirus and antispyware software

 Install and configure Web filtering software

 Train employees on social engineering

 Do not allow employees to use data disks or thumb drives unless permission is granted

 Turn off auto run feature on employee computers

 Employees should have strong passwords including special characters and...

View Full Essay
Full Essay Stats...
  • Words: 745
  • Pages: 3
  • Views: 888