Question
Help me to draw a diagram, please. I don't need anything fancy, just basic stuff, what goes after what. Fox example: Internet, (T3 link) then
Help me to draw a diagram, please. I don't need anything fancy, just basic stuff, what goes after what. Fox example: Internet, (T3 link) then a firewall, etc.
Here is the question:
As an experienced networking professional, you are asked to conduct a security audit on a local credit unions network. The credit union currently has two locations, a headquarters office downtown and a branch office on the east side of town.
The headquarters has the following equipment;
10 windows 7 workstations, connected to a Windows 2012 file server
Ten windows 10 workstations, connected to a windows server 2012 file server
One windows server 2012 RRAS (routing and remote access server) server accessed by home workers after hours
One windows server 2012 print server
One Linux database server
One Linux web server for members to check their accounts online
One firewall where the network connects to the credit unions ISP via a T3 dedicated link
The east office has 5 windows 7 workstations, connected to the headquarters office windows server 2012 server through a T1 link. All tapes are housed in a secure room in the headquarters office with copies kept in a file cabinet at the east side office. At the headquarters, servers reside in a locked room that admits authorized users with an electronic badge access system. Both locations have numerous security cameras, including a camera in the computer room and a backup tape storage vault at the headquarters. The manager also tells you that all employees are required to read and sign when they become employees.
Your Job! The manager believes the network is very secure and asks you if he could do anything else to ensure that the network is safe from security breaches.
1. Create a checklist of items on this network that should be evaluated for security. Please identify an area of risk for each item.
2. Sketch a network diagram for the credit union (remember to include connectivity devices necessary for the LAN and WAN connections) (Use MS Word shapes to make the diagramplease be sure to identify locations of network devices, including any security devices you believe should be in place) Below your diagram describe any entry points (physical or data transmission related) or situations that constitute potential security risks.
3. Explain how the credit union manager could better train his employees to understand network security.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started