Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Help me to draw a diagram, please. I don't need anything fancy, just basic stuff, what goes after what. Fox example: Internet, (T3 link) then

Help me to draw a diagram, please. I don't need anything fancy, just basic stuff, what goes after what. Fox example: Internet, (T3 link) then a firewall, etc.

Here is the question:

As an experienced networking professional, you are asked to conduct a security audit on a local credit unions network. The credit union currently has two locations, a headquarters office downtown and a branch office on the east side of town.

The headquarters has the following equipment;

10 windows 7 workstations, connected to a Windows 2012 file server

Ten windows 10 workstations, connected to a windows server 2012 file server

One windows server 2012 RRAS (routing and remote access server) server accessed by home workers after hours

One windows server 2012 print server

One Linux database server

One Linux web server for members to check their accounts online

One firewall where the network connects to the credit unions ISP via a T3 dedicated link

The east office has 5 windows 7 workstations, connected to the headquarters office windows server 2012 server through a T1 link. All tapes are housed in a secure room in the headquarters office with copies kept in a file cabinet at the east side office. At the headquarters, servers reside in a locked room that admits authorized users with an electronic badge access system. Both locations have numerous security cameras, including a camera in the computer room and a backup tape storage vault at the headquarters. The manager also tells you that all employees are required to read and sign when they become employees.

Your Job! The manager believes the network is very secure and asks you if he could do anything else to ensure that the network is safe from security breaches.

1. Create a checklist of items on this network that should be evaluated for security. Please identify an area of risk for each item.

2. Sketch a network diagram for the credit union (remember to include connectivity devices necessary for the LAN and WAN connections) (Use MS Word shapes to make the diagramplease be sure to identify locations of network devices, including any security devices you believe should be in place) Below your diagram describe any entry points (physical or data transmission related) or situations that constitute potential security risks.

3. Explain how the credit union manager could better train his employees to understand network security.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

AWS Certified Database Study Guide Specialty DBS-C01 Exam

Authors: Matheus Arrais, Rene Martinez Bravet, Leonardo Ciccone, Angie Nobre Cocharero, Erika Kurauchi, Hugo Rozestraten

1st Edition

1119778956, 978-1119778950

More Books

Students also viewed these Databases questions

Question

Question Can plan participants borrow from a VEBA?

Answered: 1 week ago

Question

Question What is an educational benefit trust and how is it used?

Answered: 1 week ago

Question

Question How are VEBA assets allocated when a plan terminates?

Answered: 1 week ago