Wednesday, May 15, 2019
Network Risk Assestment Research Paper Example | Topics and Well Written Essays - 1250 words
Network Risk Assestment - Research Paper ExampleThe vane layout of I.T soft requires an expandable and efficient network that will fulfill the requirements of the comp each. Advanced security features atomic number 18 also required in golf club to protect the VoIP traffic and preserve network availability.As I.T soft an automated business support network. The network is utilizing latest technology in terms of both hardware and software, however cost considerations cannot be unattended as the company is an SME. The software technology includes the new innovative network that supports the followingAs seen in Fig 1.1, there is no protection on the Internet connection that is terminating on the router. The connectivity from the router to the two selective teaching switches i.e. switch connecting to the data center and the second switch connecting the access points also have no protection. However, MacAfee EPO is inst tout ensembleed on the horde and on the workstations as well. The centralized anti- virus works on defined policies and scans workstations, USB drives and downloads from the Internet. In this scenario, if any threat enters the network from the Internet and penetrates in the server hosting Mcafee EPO server, it will certainly corrupt the operating trunk and consequently, infect the EPO server as well. Identified risks from the Internet are virus and malicious codes.For physically securing the information systems, there are no physical controls currently. As shown in Fig 1.2, there are no physical controls on the data center and everyone can enter without verification and authentication.The sales database and customer database are connected to the switch. Every request from the users is redirected to the router, where the router checks the Access Control List (ACL). In this scenario, the accounts staff has permissions to access these servers. However, all the other users on the network are restricted to access these servers.I.T soft has configured an email server to provide email
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.