IS3110
Unit 1 Roles Scenario
Mike Edmondson, Bruno Rodriguez
9/23/2014
1. Identify Threats to the seven domains of IT within the organization.
USER DOMAIN: sharing passwords. Not protecting your computer properly or sharing access with other individuals will allow threats from a user end.
Workstation Domain: if computer has not been updated with latest upgrades, patches or antivirus.
LAN domain: network has not secured with appropriate access controls, hubs must be upgraded with switches. And have limited access to switches or network controls.
LAN-WAN Domain: if users are allowed to visit malicious websites they can accidentally download software
WAN Domain: Dos attacks and DDos attacks uploads done to the
…show more content…
Threat / Vulnerabilities
Action to be taken
Competition getting access to the Proprietary management program through the shared T-1 line provided by ISP
Look into making sure that no other company is sharing the T-1 line that is provided by ISP; YeildMore could buy additional lines and better firewall protection protocols
VPN attack from outside sources by way of home connections from individual salespersons
Require the individual sales people to use the same security protocols that the company uses: provide secure laptops for the VPN connection
Attackers could use vulnerabilities in the Windows Vista platform and current LAN setup
Upgrade all workstations, switches, routers and software to current industry standards
Attack on the applications server
Upgrade all servers at the main HQ. Make sure that the firewall and security protocols for the LAN are updated and has redundancy protections to access the WAN
4. Estimate the likelihood of each threat action. The likelihood of an attack on the proprietary information for this company is a HIGH IMPACT that could happen, this due to the fact that the T-1 line is most likely shared by other companies that use the same ISP.
The likelihood of a breach by VPN is also a HIGH IMPACT area. This is due to the fact that the individual salespersons are using their own equipment and their own home networks.
The likelihood of an attack or breach dealing with the current infrastructure of the company’s
Individual users play an important role in any form of institution or organization but concerns are raised about the security. The network administrators clearly lay down a set of rules, regulations and protocols that an individual user has to agree accordingly upon which part of the resources and what class of service that the user can obtain.
Currently all the sites are still running 56K modems, this technology is outdated. This is technology is hindering the communication speed between each site. Having a high-speed connection is crucial to provide real time updates. These updates provide the profits made each day and the inventory sold so that those items can be restocked in real-time. These modems will be used as redundant system and a new Wide Area Network (WAN) will be created, each site will be setup with a Wireless Local Area Network (WLAN). The WAN will connect all the WLANs together. This will boost the network speed of the WAN and improve the way employees communicate. The network will be able to support a Voice over Internet Protocol (VoIP) for telephone
The next way to secure administrative permission is they need to make sure that they have some kind of security so keep the network secure , i thing i will add on the check list is an internet firewall this is used to try and stop unauthorized access to the organisation network.
In the Endian menu, we changed the internet protocol address to match the one we had previously set up in the boot menu. We created new passwords and if the credentials were rejected in the Endian authorization page, we reset the boot settings to factory default, since we didn’t have the previous credentials. In the Endian menu, we set the green icon to internal network (NIC) then to /24 network. We set the red icon to ETHO which is wide-area network and then to auto DNS/ DHCP. The DHCP option needs to be set to on. Normally, the Domain controller would assign the DHCP, but in this process, we had the company AT&T assign it to us. Finally, we connected the firewall to the internet to test it. We repeated the whole process for two more firewalls. On day twelve, I watched training videos on a new program that was implemented to the company. After learning how to add or edit information into, I created templates to store the company’s customer information. I created a tab for each customer and subtabs for their different type of contact and IT-related information. I gathered the IT-related data from a One Note file and through two remote support
Why did they need to update their system and how would they accomplish this in a timely and efficiently manor The reasoning behind getting this communication network up and running is the high priority
It’s likely that the initial response to these changes would not be all positive. In an organization like Avaya that has done things a certain way for so long, employee push-back on change is inevitable. Adding to this would be the fact that compensation among members of the sales team is much more directly affected by sales performance than members of the marketing team. An effective transition plan would have to be established with a two-way communications channel providing up-front and easily-understood information to employees about the planned changes. Perhaps creating a “transition team” comprised of select sales and marketing personnel would allow for a smoother implementation, as the representatives would hold an active role in fulfilling transition objectives.
Proprietary technology can make sure everyone is on the same page, both internally and externally.
The business case presented focuses on insatiable demand amongst a growing population for a service built on dilapidated, poorly maintained infrastructure, against a backdrop of government deregulation in the telecoms sector. As of 1992, there were a mere 78k telephone lines for the 27m people living in 4.7m households (a population set to double over the coming 24 years), with users suffering success rates of just 25%. Demand was forecast to grow to 500k subscribers by 1996. The recent deregulation of the telecoms sector (via the break-up of TPTC into TPC and TTCL) and the formation of a regulator (TCC) had
The identified software vulnerability is that customers, clients and employees have the same network privilege with access through a corporate firewall, as in the case of the Chula Vista location, there is direct access to the internet over WAN without any policy restrictions. The recommendation is to install additional host-based firewalls on all servers and user computers. In addition, remove the WAN connection at the Chula Vista location and route all network traffic through the corporate firewall.
Other specifications for CphoeniX INC's LAN include that each department is able to share peripherals devices; including scanners, copiers and printers. As well, CphoeniX INC would also like to be able to provide
As one of the world’s largest mobile operators, T-Mobile is growing at a rapid rate. While expanding its 3G and now 4G networks across the world to the UK, T-Mobile is now considered the best data services provider of choice. Customers need to compare the different broadband plans available to help them make an informed decision. By doing this, they need easy broadband access while in the retail stores. The vision for this company is to increase bandwidth speeds for customers. My strategy for this vision is to help improve internet services to customers by migrating, provisioning and configuring the ISP equipment on-site at designated retail store. The steps will include accurately migrating appropriate stores for better services, continuing to monitor circuits after migration is complete for several days and answering questions involving problems with circuits.
It was important to address these issues to improve routing efficiency and to increase user trust in the TMS with two goals:
The national telecom provider, MakTel, faces poor sales of ISDN service for several years. Although the service was introduced e years ago,
Peradventure there is need for you to change your host or provider probably because you require a larger traffic or other reasons; you can actually overcome all these easily.
(Purpose) Today we would like to explain alternative methods companies are using to provide internet to countries with