Answered You can hire a professional tutor to get the answer.
Hi, I need help with essay on Network Risk Assestment. Paper must be at least 1250 words. Please, no plagiarized work!The network layout of I.T soft requires an expandable and efficient network that w
Hi, I need help with essay on Network Risk Assestment. Paper must be at least 1250 words. Please, no plagiarized work!
The network layout of I.T soft requires an expandable and efficient network that will fulfill the requirements of the company. Advanced security features are also required in order to protect the VoIP traffic and preserve network availability.
As I.T soft an automated business support network. The network is utilizing latest technology in terms of both hardware and software, however cost considerations cannot be ignored as the company is an SME. The software technology includes the new innovative network that supports the following:
As seen in Fig 1.1, there is no protection on the Internet connection that is terminating on the router. The connectivity from the router to the two data switches i.e. switch connecting to the data center and the second switch connecting the access points also have no protection. However, MacAfee EPO is installed on the server and on the workstations as well. The centralized anti- virus works on defined policies and scans workstations, USB drives and downloads from the Internet. In this scenario, if any threat enters the network from the Internet and penetrates in the server hosting Mcafee EPO server, it will certainly corrupt the operating system and consequently, infect the EPO server as well. Identified risks from the Internet are virus and malicious codes.
For physically securing the information systems, there are no physical controls currently. As shown in Fig 1.2, there are no physical controls on the data center and everyone can enter without verification and authentication.
The sales database and customer database are connected to the switch. Every request from the users is redirected to the router, where the router checks the Access Control List (ACL). In this scenario, the accounts staff has permissions to access these servers. However, all the other users on the network are restricted to access these servers.
I.T soft has configured an email server to provide email