Question
Review the hypothetical scenario below, then answer the subsequent questions. A large law firm, Block & Diddle, employs over 800 lawyers. Most of the lawyers
Review the hypothetical scenario below, then answer the subsequent questions.
A large law firm, Block & Diddle, employs over 800 lawyers. Most of the lawyers work in the firms main office located in the city, and some lawyers work in the firms smaller satellite offices located in surrounding areas. The law firm hired a network manager and a network technician to setup and maintain their computer networks in all offices. However, after working for the firm for a couple of years, both the network manager and network technician left to pursue other jobs. Rather than hiring people in their place, the firm asked a few of their lawyers with some I.T. background to take care everyones computer needs on the side, thinking this would be sufficient since the networks were already setup.
Some time has passed, and they are now experiencing some significant network issues that they do not know how to solve. Block & Diddle has hired you as a consultant to identify the problems and propose solutions for their network issues.
Issue 2 Main Office Hacked
Some servers located at main office were hacked. The contents of the firms public website were replaced with images of graffiti. Worse, there is evidence that some of the legal documents and client information was downloaded by the intruders. The law firm is scrambling to add security to their network.
People use these endpoints to store the data and intellectual property. Some is stored in the server/cloud but not always though. Once a piece of malware is resident on the machine, then it can execute and start doing things on your devices. Your server could be at risk from hackers because its target for many types of attacks. Therefore, this topic is really important to people who work with the data.
5. There are additional ways to secure points of entry other than using firewalls. For each point of entry identified in #3 for the firms network, identity and describe a device or method that could be used to secure it other than a firewall. ( #3 = I used Passwords, the cloud and the staff computing system)
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started