Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Review the hypothetical scenario below, then answer the subsequent questions. A large law firm, Block & Diddle, employs over 800 lawyers. Most of the lawyers

Review the hypothetical scenario below, then answer the subsequent questions.

A large law firm, Block & Diddle, employs over 800 lawyers. Most of the lawyers work in the firms main office located in the city, and some lawyers work in the firms smaller satellite offices located in surrounding areas. The law firm hired a network manager and a network technician to setup and maintain their computer networks in all offices. However, after working for the firm for a couple of years, both the network manager and network technician left to pursue other jobs. Rather than hiring people in their place, the firm asked a few of their lawyers with some I.T. background to take care everyones computer needs on the side, thinking this would be sufficient since the networks were already setup.

Some time has passed, and they are now experiencing some significant network issues that they do not know how to solve. Block & Diddle has hired you as a consultant to identify the problems and propose solutions for their network issues.

Issue 2 Main Office Hacked

Some servers located at main office were hacked. The contents of the firms public website were replaced with images of graffiti. Worse, there is evidence that some of the legal documents and client information was downloaded by the intruders. The law firm is scrambling to add security to their network.

People use these endpoints to store the data and intellectual property. Some is stored in the server/cloud but not always though. Once a piece of malware is resident on the machine, then it can execute and start doing things on your devices. Your server could be at risk from hackers because its target for many types of attacks. Therefore, this topic is really important to people who work with the data.

5. There are additional ways to secure points of entry other than using firewalls. For each point of entry identified in #3 for the firms network, identity and describe a device or method that could be used to secure it other than a firewall. ( #3 = I used Passwords, the cloud and the staff computing system)

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Systems For Advanced Applications 27th International Conference Dasfaa 2022 Virtual Event April 11 14 2022 Proceedings Part 2 Lncs 13246

Authors: Arnab Bhattacharya ,Janice Lee Mong Li ,Divyakant Agrawal ,P. Krishna Reddy ,Mukesh Mohania ,Anirban Mondal ,Vikram Goyal ,Rage Uday Kiran

1st Edition

3031001257, 978-3031001253

More Books

Students also viewed these Databases questions