SlideShare a Scribd company logo
Assignment: Network Security Controls
Assignment Requirements
Securing Windows networks requires recognizing potential
vulnerabilities and selecting the best control to address that
vulnerability. You as a network administrator working for Ken 7
Windows Limited have been given the task of reviewing the
current network security policy and recommending the best
network security control to satisfy the policy. You can select
from a short list of network security controls. For each policy
statement, select the best control to ensure Ken 7 Windows
Limited fulfills the stated requirements and provide a rationale.
Required Resources
Case Scenario for Rationale: Importance of Windows Access
Control and Authentication (see
below)
Worksheet: Network Security Requirements Policy (see below)
Submission Requirements
Format: Microsoft Word
Font: Arial, Size 12, Double-Space
Citation Style: APA
Length: 1
–
2 pages
Self-Assessment Checklist
I have selected appropriate network security controls for each
domain of the Ken 7 IT
environment.
I have provided rationale for my choices by explaining how
each control makes the environment
more secure.
I have followed the submission requirements.
Case Scenario for Rationale: Importance of Windows Access
Control and Authentication
Ken 7 Windows Limited is a manufacturer of Windows for
residential and commercial builders. Ken 7
Windows Limited carries a variety of Windows and related
products. It supplies builders with all of the
tools and supplies to install finished Windows in any type of
building.
Ken 7 Windows Limited has just purchased a new enterprise
resource planning (ERP) software package to help control costs
and increase both quality and customer responsiveness. The
ERP software collects and stores information including:
•
Raw material costs
•
Labor costs
•
Materials and labor requirements for products
•
Purchasing requirements
Ken 7 Windows Limited has identified six basic roles for users
in the new ERP software:
•
Administrators
—
maintain ERP data and system operation.
•
Planners
—
run planning software and generate requirements reports.
•
Shop Floor users
—
enter operational data (receiving, shipping, and product
progress during
manufacturing).
•
Managers
—
manage department personnel.
•
Purchasing users
—
generate purchasing documents based on planning requirements.
•
Accounting users
—
maintain cost and accounting data.
Access controls limit what users or roles can do with different
types of data. For example, consider the
following types of data:
•
Cost information
—
raw materials and labor costs, including the cost of finished
goods.
•
Manufacturing details
—
cost, amount of labor, and time required to produce finished
goods.
•
Purchasing requirements
—
rules for determining when raw materials, components, or
supplies
should be purchased.
Through access control:
•
Cost information can be viewed only by Accounting users.
•
Manufacturing details can be viewed only by Shop Floor users.
•
Purchasing requirement can be viewed only by Purchasing
users.
During the analysis phase of the ERP implementation, Ken 7
Windows Limited raised concerns about
users being able to access restricted data.
•
Accounting users are able to login to shop floor computers.
•
Purchasing users are able to access human resource (HR)
applications and data.
The ERP implementation team suggested the following access
control measures to protect restricted
data.
•
Create an organizational unit (OU) in Active Directory for shop
floor computers.
•
Deploy Group Policy Objects (GPOs) to restrict shop floor users
to the shop floor OU.
•
Define data access controls in the ERP software to deny access
for all non-HR users to restricted
data.
Implementation of several access control measures helped Ken 7
Windows Limited to restrict the data
access. Hence access control and authentication is important, as
it helped Ken 7 Windows Limited in
reducing costs and increasing profits.
COM520 Written Assignment 5
Worksheet: Network Security Requirements Policy
Securing Windows networks requires recognizing potential
vulnerabilities and selecting the best control to
address that vulnerability. You as a network administrator
working for Ken 7 Windows Limited have been given the task
of reviewing the current network security policy and
recommending the best network security control to satisfy the
policy. You can select from a short list of network security
controls.
For each policy statement, select the best control to ensure Ken
7 Windows Limited fulfills the stated
requirements and also provide a rationale at the end of the table.
Select from these security controls:
a. Place a firewall between the Internet and your Web server.
b. Place a firewall between your Web server and your internal
network.
c. Enforce password complexity.
d. Implement Kerberos authentication for all internal servers.
e. Require encryption for all traffic flowing into and out from
the Ken 7 Windows environment.
f. Separate wired and wireless network entry points into
separate logical networks.
g. Require all personnel attend a lunch and learn session on
updated network security policies.
Security policy statements:
1. More and more users are using the Ken 7 Windows network
to access social media sites
during business hours, causing the network to slow down. Users
should not use Ken 7
network resources for social media access.
2. Most Ken 7 personnel own mobile phones and PDAs that can
connect to the Internet. Ken
7 network administrators are concerned that personal device
access may pose a security
threat to Ken 7 network resources. Personal devices must not be
allowed to connect to
the Ken 7 Windows network.
3. Anonymous users of Ken 7 Web application should only be
able to access servers located
in the demilitarized zone (DMZ). No anonymous Web
application users should be able to
access any protected resources in the Ken 7 infrastructure.
4. Users who print confidential reports must not be allowed to
send reports to unsecured
printers.
5. Passwords should not be words found in the dictionary.

More Related Content

Similar to Assignment Network Security ControlsAssignment Requirements.docx

Stock Maintenance System-Problem Statement, SRS, ERD, DFD, Structured Chart
Stock Maintenance System-Problem Statement, SRS, ERD, DFD, Structured ChartStock Maintenance System-Problem Statement, SRS, ERD, DFD, Structured Chart
Stock Maintenance System-Problem Statement, SRS, ERD, DFD, Structured Chart
grandhiprasuna
 
Background Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxBackground Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docx
ikirkton
 
COM520 Written Assignment 7 Assignment Windows Incident.docx
COM520 Written Assignment 7 Assignment Windows Incident.docxCOM520 Written Assignment 7 Assignment Windows Incident.docx
COM520 Written Assignment 7 Assignment Windows Incident.docx
monicafrancis71118
 
COM520 Written Assignment 7 Assignment Windows Incident.docx
COM520 Written Assignment 7 Assignment Windows Incident.docxCOM520 Written Assignment 7 Assignment Windows Incident.docx
COM520 Written Assignment 7 Assignment Windows Incident.docx
mccormicknadine86
 
Jon shende fbcs citp q&a
Jon shende fbcs citp q&aJon shende fbcs citp q&a
Requirements for an internet connectivity solution 1
Requirements for an internet connectivity solution 1Requirements for an internet connectivity solution 1
Requirements for an internet connectivity solution 1
Dinesh Kumar
 
Analysis concepts and principles
Analysis concepts and principlesAnalysis concepts and principles
Analysis concepts and principles
saurabhshertukde
 
Advantages And Disadvantages Of Nc
Advantages And Disadvantages Of NcAdvantages And Disadvantages Of Nc
Advantages And Disadvantages Of Nc
Kristen Wilson
 
Maintenance of Hospital Information System
Maintenance of Hospital Information SystemMaintenance of Hospital Information System
Maintenance of Hospital Information System
Dr Jasbeer Singh
 
Database Security Assessment Transcript You are a contracting office.docx
Database Security Assessment Transcript You are a contracting office.docxDatabase Security Assessment Transcript You are a contracting office.docx
Database Security Assessment Transcript You are a contracting office.docx
whittemorelucilla
 
INTRODUCTION to software engineering requirements specifications
INTRODUCTION to software engineering requirements specificationsINTRODUCTION to software engineering requirements specifications
INTRODUCTION to software engineering requirements specifications
kylan2
 
Railway Reservation System - Software Engineering
Railway Reservation System - Software EngineeringRailway Reservation System - Software Engineering
Railway Reservation System - Software Engineering
Lalit Pal
 
IT environment analytics service
IT environment analytics serviceIT environment analytics service
IT environment analytics service
Peter Razenberg
 
Meeting Today’s IT Support Challenges with CompTIA A+
Meeting Today’s IT Support Challenges with CompTIA A+Meeting Today’s IT Support Challenges with CompTIA A+
Meeting Today’s IT Support Challenges with CompTIA A+
CompTIA
 
Cis 349 Extraordinary Success/newtonhelp.com
Cis 349 Extraordinary Success/newtonhelp.com  Cis 349 Extraordinary Success/newtonhelp.com
Cis 349 Extraordinary Success/newtonhelp.com
amaranthbeg147
 
Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2
Raghu Vamsy Sirasala
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...
Leif Davidsen
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...
Robert Parker
 
selection of hardware & software in SAD
selection of hardware & software in SAD selection of hardware & software in SAD
selection of hardware & software in SAD
Ankita Agrawal
 
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
ITExamAnswers.net
 

Similar to Assignment Network Security ControlsAssignment Requirements.docx (20)

Stock Maintenance System-Problem Statement, SRS, ERD, DFD, Structured Chart
Stock Maintenance System-Problem Statement, SRS, ERD, DFD, Structured ChartStock Maintenance System-Problem Statement, SRS, ERD, DFD, Structured Chart
Stock Maintenance System-Problem Statement, SRS, ERD, DFD, Structured Chart
 
Background Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxBackground Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docx
 
COM520 Written Assignment 7 Assignment Windows Incident.docx
COM520 Written Assignment 7 Assignment Windows Incident.docxCOM520 Written Assignment 7 Assignment Windows Incident.docx
COM520 Written Assignment 7 Assignment Windows Incident.docx
 
COM520 Written Assignment 7 Assignment Windows Incident.docx
COM520 Written Assignment 7 Assignment Windows Incident.docxCOM520 Written Assignment 7 Assignment Windows Incident.docx
COM520 Written Assignment 7 Assignment Windows Incident.docx
 
Jon shende fbcs citp q&a
Jon shende fbcs citp q&aJon shende fbcs citp q&a
Jon shende fbcs citp q&a
 
Requirements for an internet connectivity solution 1
Requirements for an internet connectivity solution 1Requirements for an internet connectivity solution 1
Requirements for an internet connectivity solution 1
 
Analysis concepts and principles
Analysis concepts and principlesAnalysis concepts and principles
Analysis concepts and principles
 
Advantages And Disadvantages Of Nc
Advantages And Disadvantages Of NcAdvantages And Disadvantages Of Nc
Advantages And Disadvantages Of Nc
 
Maintenance of Hospital Information System
Maintenance of Hospital Information SystemMaintenance of Hospital Information System
Maintenance of Hospital Information System
 
Database Security Assessment Transcript You are a contracting office.docx
Database Security Assessment Transcript You are a contracting office.docxDatabase Security Assessment Transcript You are a contracting office.docx
Database Security Assessment Transcript You are a contracting office.docx
 
INTRODUCTION to software engineering requirements specifications
INTRODUCTION to software engineering requirements specificationsINTRODUCTION to software engineering requirements specifications
INTRODUCTION to software engineering requirements specifications
 
Railway Reservation System - Software Engineering
Railway Reservation System - Software EngineeringRailway Reservation System - Software Engineering
Railway Reservation System - Software Engineering
 
IT environment analytics service
IT environment analytics serviceIT environment analytics service
IT environment analytics service
 
Meeting Today’s IT Support Challenges with CompTIA A+
Meeting Today’s IT Support Challenges with CompTIA A+Meeting Today’s IT Support Challenges with CompTIA A+
Meeting Today’s IT Support Challenges with CompTIA A+
 
Cis 349 Extraordinary Success/newtonhelp.com
Cis 349 Extraordinary Success/newtonhelp.com  Cis 349 Extraordinary Success/newtonhelp.com
Cis 349 Extraordinary Success/newtonhelp.com
 
Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...
 
selection of hardware & software in SAD
selection of hardware & software in SAD selection of hardware & software in SAD
selection of hardware & software in SAD
 
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
 

More from lascellesjaimie

Bluestone Company had three intangible assets at the end of 2014 (en.docx
Bluestone Company had three intangible assets at the end of 2014 (en.docxBluestone Company had three intangible assets at the end of 2014 (en.docx
Bluestone Company had three intangible assets at the end of 2014 (en.docx
lascellesjaimie
 
BIOLOGY 103 Spring 2015FINAL EXAMINATIONPlease copy and paste th.docx
BIOLOGY 103 Spring 2015FINAL EXAMINATIONPlease copy and paste th.docxBIOLOGY 103 Spring 2015FINAL EXAMINATIONPlease copy and paste th.docx
BIOLOGY 103 Spring 2015FINAL EXAMINATIONPlease copy and paste th.docx
lascellesjaimie
 
Bluestone Copany had three intangible assets at the end of the curre.docx
Bluestone Copany had three intangible assets at the end of the curre.docxBluestone Copany had three intangible assets at the end of the curre.docx
Bluestone Copany had three intangible assets at the end of the curre.docx
lascellesjaimie
 
Biology 110 Online Evolution labStudent Directions1.Go .docx
Biology 110 Online Evolution labStudent Directions1.Go .docxBiology 110 Online Evolution labStudent Directions1.Go .docx
Biology 110 Online Evolution labStudent Directions1.Go .docx
lascellesjaimie
 
Biological Psychology WorksheetAnswer the following questions wi.docx
Biological Psychology WorksheetAnswer the following questions wi.docxBiological Psychology WorksheetAnswer the following questions wi.docx
Biological Psychology WorksheetAnswer the following questions wi.docx
lascellesjaimie
 
Biodiversity hotspots are one conservation strategy used to direct f.docx
Biodiversity hotspots are one conservation strategy used to direct f.docxBiodiversity hotspots are one conservation strategy used to direct f.docx
Biodiversity hotspots are one conservation strategy used to direct f.docx
lascellesjaimie
 
BIO9 Human Biology Term ProjectGoals1. Being able to understand.docx
BIO9 Human Biology Term ProjectGoals1. Being able to understand.docxBIO9 Human Biology Term ProjectGoals1. Being able to understand.docx
BIO9 Human Biology Term ProjectGoals1. Being able to understand.docx
lascellesjaimie
 
Bill of RightsWhen the Constitution was completed in the summer of.docx
Bill of RightsWhen the Constitution was completed in the summer of.docxBill of RightsWhen the Constitution was completed in the summer of.docx
Bill of RightsWhen the Constitution was completed in the summer of.docx
lascellesjaimie
 
Biotechnology ApplicationsBiotechnology refers to the technical ap.docx
Biotechnology ApplicationsBiotechnology refers to the technical ap.docxBiotechnology ApplicationsBiotechnology refers to the technical ap.docx
Biotechnology ApplicationsBiotechnology refers to the technical ap.docx
lascellesjaimie
 
Bios of 20 Important WomenStudents will be required to complete bi.docx
Bios of 20 Important WomenStudents will be required to complete bi.docxBios of 20 Important WomenStudents will be required to complete bi.docx
Bios of 20 Important WomenStudents will be required to complete bi.docx
lascellesjaimie
 
Biomedical Essay 5 sources minimum.  MLA Format.  Classical Argumen.docx
Biomedical Essay 5 sources minimum.  MLA Format.  Classical Argumen.docxBiomedical Essay 5 sources minimum.  MLA Format.  Classical Argumen.docx
Biomedical Essay 5 sources minimum.  MLA Format.  Classical Argumen.docx
lascellesjaimie
 
Biology 110 Online Evolution lab Student Directions 1.    Go to htt.docx
Biology 110 Online Evolution lab Student Directions 1.    Go to htt.docxBiology 110 Online Evolution lab Student Directions 1.    Go to htt.docx
Biology 110 Online Evolution lab Student Directions 1.    Go to htt.docx
lascellesjaimie
 
Biblical Worldview Essay InstructionsRationale for the Biblical .docx
Biblical Worldview Essay InstructionsRationale for the Biblical .docxBiblical Worldview Essay InstructionsRationale for the Biblical .docx
Biblical Worldview Essay InstructionsRationale for the Biblical .docx
lascellesjaimie
 
Biblical passaes 2 Samuel 13 1-22 looking for similarity between tw.docx
Biblical passaes 2 Samuel 13 1-22 looking for similarity between tw.docxBiblical passaes 2 Samuel 13 1-22 looking for similarity between tw.docx
Biblical passaes 2 Samuel 13 1-22 looking for similarity between tw.docx
lascellesjaimie
 
Benefits of Nongoverning Volunteer Orientation and TrainingBoard G.docx
Benefits of Nongoverning Volunteer Orientation and TrainingBoard G.docxBenefits of Nongoverning Volunteer Orientation and TrainingBoard G.docx
Benefits of Nongoverning Volunteer Orientation and TrainingBoard G.docx
lascellesjaimie
 
Bernard Madoff, a once highly regarded member of the Wall Street c.docx
Bernard Madoff, a once highly regarded member of the Wall Street c.docxBernard Madoff, a once highly regarded member of the Wall Street c.docx
Bernard Madoff, a once highly regarded member of the Wall Street c.docx
lascellesjaimie
 
Benefits of a Diverse WorkforceCommunication is of utmost import.docx
Benefits of a Diverse WorkforceCommunication is of utmost import.docxBenefits of a Diverse WorkforceCommunication is of utmost import.docx
Benefits of a Diverse WorkforceCommunication is of utmost import.docx
lascellesjaimie
 
Benchmark - Evidence-Based Practice Project—Paper on Diabetes .docx
Benchmark - Evidence-Based Practice Project—Paper on Diabetes .docxBenchmark - Evidence-Based Practice Project—Paper on Diabetes .docx
Benchmark - Evidence-Based Practice Project—Paper on Diabetes .docx
lascellesjaimie
 
Below I attached the instructions and requirements for this paper..docx
Below I attached the instructions and requirements for this paper..docxBelow I attached the instructions and requirements for this paper..docx
Below I attached the instructions and requirements for this paper..docx
lascellesjaimie
 
Below is 4 questions that I need answered. I usually just get other .docx
Below is 4 questions that I need answered. I usually just get other .docxBelow is 4 questions that I need answered. I usually just get other .docx
Below is 4 questions that I need answered. I usually just get other .docx
lascellesjaimie
 

More from lascellesjaimie (20)

Bluestone Company had three intangible assets at the end of 2014 (en.docx
Bluestone Company had three intangible assets at the end of 2014 (en.docxBluestone Company had three intangible assets at the end of 2014 (en.docx
Bluestone Company had three intangible assets at the end of 2014 (en.docx
 
BIOLOGY 103 Spring 2015FINAL EXAMINATIONPlease copy and paste th.docx
BIOLOGY 103 Spring 2015FINAL EXAMINATIONPlease copy and paste th.docxBIOLOGY 103 Spring 2015FINAL EXAMINATIONPlease copy and paste th.docx
BIOLOGY 103 Spring 2015FINAL EXAMINATIONPlease copy and paste th.docx
 
Bluestone Copany had three intangible assets at the end of the curre.docx
Bluestone Copany had three intangible assets at the end of the curre.docxBluestone Copany had three intangible assets at the end of the curre.docx
Bluestone Copany had three intangible assets at the end of the curre.docx
 
Biology 110 Online Evolution labStudent Directions1.Go .docx
Biology 110 Online Evolution labStudent Directions1.Go .docxBiology 110 Online Evolution labStudent Directions1.Go .docx
Biology 110 Online Evolution labStudent Directions1.Go .docx
 
Biological Psychology WorksheetAnswer the following questions wi.docx
Biological Psychology WorksheetAnswer the following questions wi.docxBiological Psychology WorksheetAnswer the following questions wi.docx
Biological Psychology WorksheetAnswer the following questions wi.docx
 
Biodiversity hotspots are one conservation strategy used to direct f.docx
Biodiversity hotspots are one conservation strategy used to direct f.docxBiodiversity hotspots are one conservation strategy used to direct f.docx
Biodiversity hotspots are one conservation strategy used to direct f.docx
 
BIO9 Human Biology Term ProjectGoals1. Being able to understand.docx
BIO9 Human Biology Term ProjectGoals1. Being able to understand.docxBIO9 Human Biology Term ProjectGoals1. Being able to understand.docx
BIO9 Human Biology Term ProjectGoals1. Being able to understand.docx
 
Bill of RightsWhen the Constitution was completed in the summer of.docx
Bill of RightsWhen the Constitution was completed in the summer of.docxBill of RightsWhen the Constitution was completed in the summer of.docx
Bill of RightsWhen the Constitution was completed in the summer of.docx
 
Biotechnology ApplicationsBiotechnology refers to the technical ap.docx
Biotechnology ApplicationsBiotechnology refers to the technical ap.docxBiotechnology ApplicationsBiotechnology refers to the technical ap.docx
Biotechnology ApplicationsBiotechnology refers to the technical ap.docx
 
Bios of 20 Important WomenStudents will be required to complete bi.docx
Bios of 20 Important WomenStudents will be required to complete bi.docxBios of 20 Important WomenStudents will be required to complete bi.docx
Bios of 20 Important WomenStudents will be required to complete bi.docx
 
Biomedical Essay 5 sources minimum.  MLA Format.  Classical Argumen.docx
Biomedical Essay 5 sources minimum.  MLA Format.  Classical Argumen.docxBiomedical Essay 5 sources minimum.  MLA Format.  Classical Argumen.docx
Biomedical Essay 5 sources minimum.  MLA Format.  Classical Argumen.docx
 
Biology 110 Online Evolution lab Student Directions 1.    Go to htt.docx
Biology 110 Online Evolution lab Student Directions 1.    Go to htt.docxBiology 110 Online Evolution lab Student Directions 1.    Go to htt.docx
Biology 110 Online Evolution lab Student Directions 1.    Go to htt.docx
 
Biblical Worldview Essay InstructionsRationale for the Biblical .docx
Biblical Worldview Essay InstructionsRationale for the Biblical .docxBiblical Worldview Essay InstructionsRationale for the Biblical .docx
Biblical Worldview Essay InstructionsRationale for the Biblical .docx
 
Biblical passaes 2 Samuel 13 1-22 looking for similarity between tw.docx
Biblical passaes 2 Samuel 13 1-22 looking for similarity between tw.docxBiblical passaes 2 Samuel 13 1-22 looking for similarity between tw.docx
Biblical passaes 2 Samuel 13 1-22 looking for similarity between tw.docx
 
Benefits of Nongoverning Volunteer Orientation and TrainingBoard G.docx
Benefits of Nongoverning Volunteer Orientation and TrainingBoard G.docxBenefits of Nongoverning Volunteer Orientation and TrainingBoard G.docx
Benefits of Nongoverning Volunteer Orientation and TrainingBoard G.docx
 
Bernard Madoff, a once highly regarded member of the Wall Street c.docx
Bernard Madoff, a once highly regarded member of the Wall Street c.docxBernard Madoff, a once highly regarded member of the Wall Street c.docx
Bernard Madoff, a once highly regarded member of the Wall Street c.docx
 
Benefits of a Diverse WorkforceCommunication is of utmost import.docx
Benefits of a Diverse WorkforceCommunication is of utmost import.docxBenefits of a Diverse WorkforceCommunication is of utmost import.docx
Benefits of a Diverse WorkforceCommunication is of utmost import.docx
 
Benchmark - Evidence-Based Practice Project—Paper on Diabetes .docx
Benchmark - Evidence-Based Practice Project—Paper on Diabetes .docxBenchmark - Evidence-Based Practice Project—Paper on Diabetes .docx
Benchmark - Evidence-Based Practice Project—Paper on Diabetes .docx
 
Below I attached the instructions and requirements for this paper..docx
Below I attached the instructions and requirements for this paper..docxBelow I attached the instructions and requirements for this paper..docx
Below I attached the instructions and requirements for this paper..docx
 
Below is 4 questions that I need answered. I usually just get other .docx
Below is 4 questions that I need answered. I usually just get other .docxBelow is 4 questions that I need answered. I usually just get other .docx
Below is 4 questions that I need answered. I usually just get other .docx
 

Recently uploaded

BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
Nguyen Thanh Tu Collection
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
HajraNaeem15
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
EduSkills OECD
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
siemaillard
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Denish Jangid
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 

Recently uploaded (20)

BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 

Assignment Network Security ControlsAssignment Requirements.docx

  • 1. Assignment: Network Security Controls Assignment Requirements Securing Windows networks requires recognizing potential vulnerabilities and selecting the best control to address that vulnerability. You as a network administrator working for Ken 7 Windows Limited have been given the task of reviewing the current network security policy and recommending the best network security control to satisfy the policy. You can select from a short list of network security controls. For each policy statement, select the best control to ensure Ken 7 Windows Limited fulfills the stated requirements and provide a rationale. Required Resources Case Scenario for Rationale: Importance of Windows Access Control and Authentication (see below) Worksheet: Network Security Requirements Policy (see below)
  • 2. Submission Requirements Format: Microsoft Word Font: Arial, Size 12, Double-Space Citation Style: APA Length: 1 – 2 pages Self-Assessment Checklist I have selected appropriate network security controls for each domain of the Ken 7 IT environment.
  • 3. I have provided rationale for my choices by explaining how each control makes the environment more secure. I have followed the submission requirements. Case Scenario for Rationale: Importance of Windows Access Control and Authentication Ken 7 Windows Limited is a manufacturer of Windows for residential and commercial builders. Ken 7 Windows Limited carries a variety of Windows and related products. It supplies builders with all of the tools and supplies to install finished Windows in any type of building. Ken 7 Windows Limited has just purchased a new enterprise resource planning (ERP) software package to help control costs and increase both quality and customer responsiveness. The
  • 4. ERP software collects and stores information including: • Raw material costs • Labor costs • Materials and labor requirements for products • Purchasing requirements Ken 7 Windows Limited has identified six basic roles for users in the new ERP software: • Administrators — maintain ERP data and system operation. • Planners — run planning software and generate requirements reports. • Shop Floor users — enter operational data (receiving, shipping, and product progress during
  • 5. manufacturing). • Managers — manage department personnel. • Purchasing users — generate purchasing documents based on planning requirements. • Accounting users — maintain cost and accounting data. Access controls limit what users or roles can do with different types of data. For example, consider the following types of data: • Cost information — raw materials and labor costs, including the cost of finished goods. •
  • 6. Manufacturing details — cost, amount of labor, and time required to produce finished goods. • Purchasing requirements — rules for determining when raw materials, components, or supplies should be purchased. Through access control: • Cost information can be viewed only by Accounting users. • Manufacturing details can be viewed only by Shop Floor users. • Purchasing requirement can be viewed only by Purchasing users. During the analysis phase of the ERP implementation, Ken 7 Windows Limited raised concerns about users being able to access restricted data. • Accounting users are able to login to shop floor computers.
  • 7. • Purchasing users are able to access human resource (HR) applications and data. The ERP implementation team suggested the following access control measures to protect restricted data. • Create an organizational unit (OU) in Active Directory for shop floor computers. • Deploy Group Policy Objects (GPOs) to restrict shop floor users to the shop floor OU. • Define data access controls in the ERP software to deny access for all non-HR users to restricted data. Implementation of several access control measures helped Ken 7 Windows Limited to restrict the data access. Hence access control and authentication is important, as it helped Ken 7 Windows Limited in reducing costs and increasing profits.
  • 8. COM520 Written Assignment 5 Worksheet: Network Security Requirements Policy Securing Windows networks requires recognizing potential vulnerabilities and selecting the best control to address that vulnerability. You as a network administrator working for Ken 7 Windows Limited have been given the task of reviewing the current network security policy and recommending the best network security control to satisfy the policy. You can select from a short list of network security controls. For each policy statement, select the best control to ensure Ken 7 Windows Limited fulfills the stated requirements and also provide a rationale at the end of the table. Select from these security controls: a. Place a firewall between the Internet and your Web server. b. Place a firewall between your Web server and your internal network. c. Enforce password complexity. d. Implement Kerberos authentication for all internal servers. e. Require encryption for all traffic flowing into and out from
  • 9. the Ken 7 Windows environment. f. Separate wired and wireless network entry points into separate logical networks. g. Require all personnel attend a lunch and learn session on updated network security policies. Security policy statements: 1. More and more users are using the Ken 7 Windows network to access social media sites during business hours, causing the network to slow down. Users should not use Ken 7 network resources for social media access. 2. Most Ken 7 personnel own mobile phones and PDAs that can connect to the Internet. Ken 7 network administrators are concerned that personal device access may pose a security threat to Ken 7 network resources. Personal devices must not be allowed to connect to the Ken 7 Windows network. 3. Anonymous users of Ken 7 Web application should only be able to access servers located in the demilitarized zone (DMZ). No anonymous Web application users should be able to access any protected resources in the Ken 7 infrastructure.
  • 10. 4. Users who print confidential reports must not be allowed to send reports to unsecured printers. 5. Passwords should not be words found in the dictionary.