In your own words (NOT copy and pasting plagiarism), Thoroughly detail Recommend
ID: 3757055 • Letter: I
Question
In your own words (NOT copy and pasting plagiarism),
Thoroughly detail Recommend Standards for configuration of all devices and servers
also, explain why you choose each recommendation.
Thank You!
Requirements for the person that will be answering the above question.
* Type out responses in Your Own Words!
* Do not write on paper and send a photo.
* NO plagiarism/ NO copy and pasting from outside sources without properly citing your sources.
** FAILURE to adhere to the stated requirements will result in thumbs down and will be reported to Chegg administration. **
Explanation / Answer
Answer :
Assessment Overview:
The major risks identified for the Accounting firm are:
Public internet is used on a simple TCP/IP protocol which itself stands as an open invitation to hackers.
The firm has no security policies in place and there is a high risk of hackers stealing data while transmitting it to other offices.
High risk of network intrusion since security applications are not in place.
Windows environment without security applications is prone to viruses, Trojans, worms spyware and other malwares which could make the entire network standstill.
IT Security and Information Management is at its highest risk
Motivation for conducting the security review: The Accounting company is a new one and does not have proper network infrastructure. It also has offices in different countries. Critical data is transmitted to other offices every month and hence it became important to conduct a risk assessment.
Risk summary:
Considering the risks discovered, they must be treated as most critical since the network is vulnerable to the entire public.
Financial and HR information which is a backbone of the firm can be very easily accessed by hackers and other public.
Since network nor security applications are in place, hackers can easily access even the network and all systems of the firm.
Conclusions and reformations:
The entire firm’s data is prone to be stolen unless most of the below actions are taken immediately.
Virtual Private Networks (VPN) must be established with strong firewall policies to secure the transmission of data between offices located in different countries.
Since all systems are in Windows environment, Operating systems must be updated automatically.
Information that is being transmitted between offices must be encrypted.
HIDS (Host-Based Intrusion Detection System), or NIDS (Network Intrusion Detection) must be in place
Cyber security policies must be reviewed and updated on a regular basis detailing about passwords, browsers, anti viruses, spam control, system updates, etc.
Assessment Overview: The major risks identified for the Accounting firm are:
Public internet is used on a simple TCP/IP protocol which itself stands as an open invitation to hackers.
The firm has no security policies in place and there is a high risk of hackers stealing data while transmitting it to other offices.
High risk of network intrusion since security applications are not in place.
Windows environment without security applications is prone to viruses, Trojans, worms spyware and other malwares which could make the entire network standstill.
IT Security and Information Management is at its highest risk
Motivation for conducting the security review: The Accounting company is a new one and does not have proper network infrastructure. It also has offices in different countries. Critical data is transmitted to other offices every month and hence it became important to conduct a risk assessment.
Risk summary:
Considering the risks discovered, they must be treated as most critical since the network is vulnerable to the entire public.
Financial and HR information which is a backbone of the firm can be very easily accessed by hackers and other public.
Since network nor security applications are in place, hackers can easily access even the network and all systems of the firm.
Conclusions and reformations:
The entire firm’s data is prone to be stolen unless most of the below actions are taken immediately.
Virtual Private Networks (VPN) must be established with strong firewall policies to secure the transmission of data between offices located in different countries.
Since all systems are in Windows environment, Operating systems must be updated automatically.
Information that is being transmitted between offices must be encrypted.
HIDS (Host-Based Intrusion Detection System), or NIDS (Network Intrusion Detection) must be in place
Cyber security policies must be reviewed and updated on a regular basis detailing about passwords, browsers, anti viruses, spam control, system updates, etc.