SlideShare a Scribd company logo
1 of 1
Securing a LAN
Organizations often do not have the security built into their
infrastructure that is required as the organization grows. When
the need for security increases, someone is often assigned the
responsibility of determining what security measures need to be
improved.
A network administrator at PPI came to you with a new task.
PPI has a LAN using TCP/IP. They want the network to be
secure but also to gain the most return for the smallest
investment. You have been asked to advise the Global
Communications team on LAN security:
• Aside from the security measures of having a firewall and
requiring users to change their passwords occasionally, suggest
one or two additional security measures that you would advise
PPI to take. Explain your suggestions.
• Recommend one or two additional measures to secure file
systems and access to the network, such as training, additional
hardware or software, virus scanners, etc. For each measure you
recommend, discuss its rationale and any threats that it would
seek to mitigate. List and describe the vulnerabilities it might
not address.

More Related Content

Similar to Securing a LANOrganizations often do not have the security built i.docx

Assignment ContentResourcesThe Sample PowerPoint.docx
Assignment ContentResourcesThe Sample PowerPoint.docxAssignment ContentResourcesThe Sample PowerPoint.docx
Assignment ContentResourcesThe Sample PowerPoint.docx
elinoraudley582231
 
You need to analyze the features of three videoconferencing systems
You need to analyze the features of three videoconferencing systems You need to analyze the features of three videoconferencing systems
You need to analyze the features of three videoconferencing systems
walthamcoretta
 
Project Instructions You have been recently hired as a.docx
Project Instructions   You have been recently hired as a.docxProject Instructions   You have been recently hired as a.docx
Project Instructions You have been recently hired as a.docx
briancrawford30935
 
The Security Of Cloud Computing
The Security Of Cloud ComputingThe Security Of Cloud Computing
The Security Of Cloud Computing
Julie May
 
Businesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docxBusinesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docx
dewhirstichabod
 
Dr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should KnowDr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should Know
Nuuko, Inc.
 
Please help me with the answer below with detailed explanati.pdf
Please help me with the answer below with detailed explanati.pdfPlease help me with the answer below with detailed explanati.pdf
Please help me with the answer below with detailed explanati.pdf
ankit11134
 
228閉館公告.ppt
228閉館公告.ppt228閉館公告.ppt
228閉館公告.ppt
b4worker
 

Similar to Securing a LANOrganizations often do not have the security built i.docx (20)

Assignment ContentResourcesThe Sample PowerPoint.docx
Assignment ContentResourcesThe Sample PowerPoint.docxAssignment ContentResourcesThe Sample PowerPoint.docx
Assignment ContentResourcesThe Sample PowerPoint.docx
 
Security Readiness Profile
Security Readiness ProfileSecurity Readiness Profile
Security Readiness Profile
 
You need to analyze the features of three videoconferencing systems
You need to analyze the features of three videoconferencing systems You need to analyze the features of three videoconferencing systems
You need to analyze the features of three videoconferencing systems
 
Network concepts and wi fi
Network concepts and wi fiNetwork concepts and wi fi
Network concepts and wi fi
 
Project Instructions You have been recently hired as a.docx
Project Instructions   You have been recently hired as a.docxProject Instructions   You have been recently hired as a.docx
Project Instructions You have been recently hired as a.docx
 
Addressing the Data Security Risks of Cloud-Based Software - HBMA Presentation
Addressing the Data Security Risks of Cloud-Based Software - HBMA PresentationAddressing the Data Security Risks of Cloud-Based Software - HBMA Presentation
Addressing the Data Security Risks of Cloud-Based Software - HBMA Presentation
 
The Security Of Cloud Computing
The Security Of Cloud ComputingThe Security Of Cloud Computing
The Security Of Cloud Computing
 
Network Capability Profile
Network Capability ProfileNetwork Capability Profile
Network Capability Profile
 
Legal Aid Tech Baseline 2016
Legal Aid Tech Baseline 2016 Legal Aid Tech Baseline 2016
Legal Aid Tech Baseline 2016
 
Current topic in it presentation
Current topic in it presentationCurrent topic in it presentation
Current topic in it presentation
 
Businesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docxBusinesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docx
 
ISS CAPSTONE TEAM
ISS CAPSTONE TEAMISS CAPSTONE TEAM
ISS CAPSTONE TEAM
 
Dr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should KnowDr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should Know
 
ScenarioAs you are aware, many remote users will soon need acces.docx
ScenarioAs you are aware, many remote users will soon need acces.docxScenarioAs you are aware, many remote users will soon need acces.docx
ScenarioAs you are aware, many remote users will soon need acces.docx
 
Cst 630 project 2 incident response
Cst 630 project 2 incident responseCst 630 project 2 incident response
Cst 630 project 2 incident response
 
13 Tips for Cloud Security
13 Tips for Cloud Security13 Tips for Cloud Security
13 Tips for Cloud Security
 
Please help me with the answer below with detailed explanati.pdf
Please help me with the answer below with detailed explanati.pdfPlease help me with the answer below with detailed explanati.pdf
Please help me with the answer below with detailed explanati.pdf
 
228閉館公告.ppt
228閉館公告.ppt228閉館公告.ppt
228閉館公告.ppt
 
Preparing a Next Generation IT Strategy
Preparing a Next Generation IT StrategyPreparing a Next Generation IT Strategy
Preparing a Next Generation IT Strategy
 
Locking down server and workstation operating systems
Locking down server and workstation operating systemsLocking down server and workstation operating systems
Locking down server and workstation operating systems
 

More from edmondpburgess27164

AssignmentPART 5 (30 points) Mr. Smith died, leaving an in.docx
AssignmentPART 5 (30 points) Mr. Smith died, leaving an in.docxAssignmentPART 5 (30 points) Mr. Smith died, leaving an in.docx
AssignmentPART 5 (30 points) Mr. Smith died, leaving an in.docx
edmondpburgess27164
 
AssignmentMovie AnalysisThis week your signature assign.docx
AssignmentMovie AnalysisThis week your signature assign.docxAssignmentMovie AnalysisThis week your signature assign.docx
AssignmentMovie AnalysisThis week your signature assign.docx
edmondpburgess27164
 
AssignmentLocate a nursing study that examines the effects of.docx
AssignmentLocate a nursing study that examines the effects of.docxAssignmentLocate a nursing study that examines the effects of.docx
AssignmentLocate a nursing study that examines the effects of.docx
edmondpburgess27164
 
ASSIGNMENTINFORMATION.PLEASE READ CAREFULLY AND ALWAYS CITE. No co.docx
ASSIGNMENTINFORMATION.PLEASE READ CAREFULLY AND ALWAYS CITE. No co.docxASSIGNMENTINFORMATION.PLEASE READ CAREFULLY AND ALWAYS CITE. No co.docx
ASSIGNMENTINFORMATION.PLEASE READ CAREFULLY AND ALWAYS CITE. No co.docx
edmondpburgess27164
 
AssignmentIn preparation for the final prospectus and literature.docx
AssignmentIn preparation for the final prospectus and literature.docxAssignmentIn preparation for the final prospectus and literature.docx
AssignmentIn preparation for the final prospectus and literature.docx
edmondpburgess27164
 
AssignmentIn considering how personality develops, the impa.docx
AssignmentIn considering how personality develops, the impa.docxAssignmentIn considering how personality develops, the impa.docx
AssignmentIn considering how personality develops, the impa.docx
edmondpburgess27164
 
ASSIGNMENTIn a two to three page paper give some thought to.docx
ASSIGNMENTIn a two to three page paper give some thought to.docxASSIGNMENTIn a two to three page paper give some thought to.docx
ASSIGNMENTIn a two to three page paper give some thought to.docx
edmondpburgess27164
 
AssignmentIn 2017, one of the biggest cyberattacks ever to occur.docx
AssignmentIn 2017, one of the biggest cyberattacks ever to occur.docxAssignmentIn 2017, one of the biggest cyberattacks ever to occur.docx
AssignmentIn 2017, one of the biggest cyberattacks ever to occur.docx
edmondpburgess27164
 
AssignmentFor this task, compose a chart of the four types of co.docx
AssignmentFor this task, compose a chart of the four types of co.docxAssignmentFor this task, compose a chart of the four types of co.docx
AssignmentFor this task, compose a chart of the four types of co.docx
edmondpburgess27164
 
ASSIGNMENTGM 501 Summer 2019Assignment InstructionsCho.docx
ASSIGNMENTGM 501 Summer 2019Assignment InstructionsCho.docxASSIGNMENTGM 501 Summer 2019Assignment InstructionsCho.docx
ASSIGNMENTGM 501 Summer 2019Assignment InstructionsCho.docx
edmondpburgess27164
 
AssignmentFor this Career Development assignment, complete the fo.docx
AssignmentFor this Career Development assignment, complete the fo.docxAssignmentFor this Career Development assignment, complete the fo.docx
AssignmentFor this Career Development assignment, complete the fo.docx
edmondpburgess27164
 

More from edmondpburgess27164 (20)

AssignmentPlease research a scholarly article on scholar.google.docx
AssignmentPlease research a scholarly article on scholar.google.docxAssignmentPlease research a scholarly article on scholar.google.docx
AssignmentPlease research a scholarly article on scholar.google.docx
 
AssignmentPART 5 (30 points) Mr. Smith died, leaving an in.docx
AssignmentPART 5 (30 points) Mr. Smith died, leaving an in.docxAssignmentPART 5 (30 points) Mr. Smith died, leaving an in.docx
AssignmentPART 5 (30 points) Mr. Smith died, leaving an in.docx
 
AssignmentPart 1 Comprehensive Client Family Assessment.docx
AssignmentPart 1 Comprehensive Client Family Assessment.docxAssignmentPart 1 Comprehensive Client Family Assessment.docx
AssignmentPart 1 Comprehensive Client Family Assessment.docx
 
ASSIGNMENTModify the rotating cube program from your assignment to .docx
ASSIGNMENTModify the rotating cube program from your assignment to .docxASSIGNMENTModify the rotating cube program from your assignment to .docx
ASSIGNMENTModify the rotating cube program from your assignment to .docx
 
AssignmentOne-page reportDouble-spaced12-point font.docx
AssignmentOne-page reportDouble-spaced12-point font.docxAssignmentOne-page reportDouble-spaced12-point font.docx
AssignmentOne-page reportDouble-spaced12-point font.docx
 
AssignmentMovie AnalysisThis week your signature assign.docx
AssignmentMovie AnalysisThis week your signature assign.docxAssignmentMovie AnalysisThis week your signature assign.docx
AssignmentMovie AnalysisThis week your signature assign.docx
 
AssignmentLocate a nursing study that examines the effects of.docx
AssignmentLocate a nursing study that examines the effects of.docxAssignmentLocate a nursing study that examines the effects of.docx
AssignmentLocate a nursing study that examines the effects of.docx
 
ASSIGNMENTINFORMATION.PLEASE READ CAREFULLY AND ALWAYS CITE. No co.docx
ASSIGNMENTINFORMATION.PLEASE READ CAREFULLY AND ALWAYS CITE. No co.docxASSIGNMENTINFORMATION.PLEASE READ CAREFULLY AND ALWAYS CITE. No co.docx
ASSIGNMENTINFORMATION.PLEASE READ CAREFULLY AND ALWAYS CITE. No co.docx
 
AssignmentIn preparation for the final prospectus and literature.docx
AssignmentIn preparation for the final prospectus and literature.docxAssignmentIn preparation for the final prospectus and literature.docx
AssignmentIn preparation for the final prospectus and literature.docx
 
AssignmentIn considering how personality develops, the impa.docx
AssignmentIn considering how personality develops, the impa.docxAssignmentIn considering how personality develops, the impa.docx
AssignmentIn considering how personality develops, the impa.docx
 
AssignmentIn Situating Research, the authors talk about way.docx
AssignmentIn Situating Research, the authors talk about way.docxAssignmentIn Situating Research, the authors talk about way.docx
AssignmentIn Situating Research, the authors talk about way.docx
 
ASSIGNMENTIn a two to three page paper give some thought to.docx
ASSIGNMENTIn a two to three page paper give some thought to.docxASSIGNMENTIn a two to three page paper give some thought to.docx
ASSIGNMENTIn a two to three page paper give some thought to.docx
 
AssignmentIn 2017, one of the biggest cyberattacks ever to occur.docx
AssignmentIn 2017, one of the biggest cyberattacks ever to occur.docxAssignmentIn 2017, one of the biggest cyberattacks ever to occur.docx
AssignmentIn 2017, one of the biggest cyberattacks ever to occur.docx
 
AssignmentHow does minimum staffing” impact your ability to .docx
AssignmentHow does minimum staffing” impact your ability to .docxAssignmentHow does minimum staffing” impact your ability to .docx
AssignmentHow does minimum staffing” impact your ability to .docx
 
AssignmentFor this task, compose a chart of the four types of co.docx
AssignmentFor this task, compose a chart of the four types of co.docxAssignmentFor this task, compose a chart of the four types of co.docx
AssignmentFor this task, compose a chart of the four types of co.docx
 
ASSIGNMENTFor your final project, you will construct a moral ar.docx
ASSIGNMENTFor your final project, you will construct a moral ar.docxASSIGNMENTFor your final project, you will construct a moral ar.docx
ASSIGNMENTFor your final project, you will construct a moral ar.docx
 
ASSIGNMENTGM 501 Summer 2019Assignment InstructionsCho.docx
ASSIGNMENTGM 501 Summer 2019Assignment InstructionsCho.docxASSIGNMENTGM 501 Summer 2019Assignment InstructionsCho.docx
ASSIGNMENTGM 501 Summer 2019Assignment InstructionsCho.docx
 
AssignmentFor this Career Development assignment, complete the fo.docx
AssignmentFor this Career Development assignment, complete the fo.docxAssignmentFor this Career Development assignment, complete the fo.docx
AssignmentFor this Career Development assignment, complete the fo.docx
 
AssignmentFoodborne Disease PresentationFoodborne diseases are a.docx
AssignmentFoodborne Disease PresentationFoodborne diseases are a.docxAssignmentFoodborne Disease PresentationFoodborne diseases are a.docx
AssignmentFoodborne Disease PresentationFoodborne diseases are a.docx
 
AssignmentExercises How has the role of the strategic .docx
AssignmentExercises How has the role of the strategic .docxAssignmentExercises How has the role of the strategic .docx
AssignmentExercises How has the role of the strategic .docx
 

Recently uploaded

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Recently uploaded (20)

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 

Securing a LANOrganizations often do not have the security built i.docx

  • 1. Securing a LAN Organizations often do not have the security built into their infrastructure that is required as the organization grows. When the need for security increases, someone is often assigned the responsibility of determining what security measures need to be improved. A network administrator at PPI came to you with a new task. PPI has a LAN using TCP/IP. They want the network to be secure but also to gain the most return for the smallest investment. You have been asked to advise the Global Communications team on LAN security: • Aside from the security measures of having a firewall and requiring users to change their passwords occasionally, suggest one or two additional security measures that you would advise PPI to take. Explain your suggestions. • Recommend one or two additional measures to secure file systems and access to the network, such as training, additional hardware or software, virus scanners, etc. For each measure you recommend, discuss its rationale and any threats that it would seek to mitigate. List and describe the vulnerabilities it might not address.