Premium Essay

Nt1330 Unit 1 Case Study

Submitted By
Words 942
Pages 4
1. Lock up the server room

Even before we lock the servers, before we even turn them on for the first time, we should ensure that there are good locks on the server room door. The server room is the heart of our physical network, and someone with physical access to the servers, switches, routers, cables and other devices in that room can do enormous damage.

2. Set up surveillance

Locking the door to the server room is a good first step, but someone could break in, or someone who has authorized access could misuse that authority. We need a way to know who goes in and out and when. A log book for signing in and out is the most elemental way to accomplish this, but it has a lot of drawbacks. A person with harmful intent is likely to just …show more content…
Don't forget the workstations

Hackers can use any unsecured computer that's connected to the network to access or delete information that's important to our business. Workstations at unoccupied desks or in empty offices (such as those used by employees who are on vacation or have left the company and not yet been replaced) or at locations easily accessible to outsiders, such as the front receptionist's desk, are particularly vulnerable.

Disconnect and/or remove computers that aren't being used and/or lock the doors of empty offices, including those that are temporarily empty while an employee is at lunch or out sick. Equip computers that must remain in open areas, sometimes out of view of employees, with smart card or biometric readers so that it's more difficult for unauthorized persons to log on.

6. Keep intruders from opening the case

Both servers and workstations should be protected from thieves who can open the case and grab the hard drive. It's much easier to make off with a hard disk in our pocket than to carry a full tower off the premises. Many computers come with case locks to prevent opening the case without a …show more content…
For portables that contain sensitive information, full disk encryption, biometric readers, and software that "phones home" if the stolen laptop connects to the Internet can supplement physical precautions.

8. Pack up the backups

Backing up important data is an essential element in disaster recovery, but don't forget that the information on those backup tapes, disks, or discs can be stolen and used by someone outside the company. Many IT administrators keep the backups next to the server in the server room. They should be locked in a drawer or safe at the very least. A set of backups should be kept off site, and we must take care to ensure that they are secured in that offsite location.

Some workers may back up their work on floppy disks, USB keys, or external hard disks. If this practice is allowed or encouraged, there should be policies requiring that the backups be locked up at all times.

9. Disable the

Similar Documents

Premium Essay

Nt1330 Unit 1 Case Study

...1. Volume of Transactions: Volume of transactions is concerning parameter because it can measure and judge the behavior of service provider. For example, when you have two websites, one of them has 100 transactions have been completed, and you have another website with 100,000 transactions have been completed. By comparing these two numbers the costumer will choose the second one with bigger transaction because it is seems more reliable and efficient than the first one. Under volume of transaction parameter come sub parameters, or rules, to organize and clarify the meaning of this number. These rules are: - Period: we should specify a certain period to can judge the behavior of the system fairly. For example, there are two websites, the first one...

Words: 384 - Pages: 2

Premium Essay

Nt1330 Unit 1 Case Study

...(wheezy) and JVM build 1.8.0, connected via a wireless LAN. To measure energy consumption, we have used Monsoon Power Monitor, a hardware based power profiling tool. Algorithm 1 shows how we experimented with each protocol to assess performance, resource usages and energy efficiency on the client side. We do not measure the energy consumed by the server. First, to warm the JVM, the benchmark application sends small dummy data three times and then sends a randomly generated message to a remote server using different packet lengths ranging from 128 bytes to 1920 bytes. To measure the CPU and Java heap usage, we used jvmTop (github, 2015) and the \proc\[pid]\stat file, respectively. Benchmark procedure for each protocol. 5) What results are presented in support of the major claim? Are there any other interesting minor results? What is your opinion of the paper? Experimental Results...

Words: 740 - Pages: 3

Premium Essay

Nt1330 Unit 1 Case Study

...tabular view for accountants. The third part, the controller, accepts input and converts it to commands for the model or view. Interactions In addition to dividing the application into three kinds of components, the model–view–controller design defines the interactions between them. • A controller can send commands to the model to update the model's state (e.g., editing a document). It can also send commands to its associated view to change the view's presentation of the model (e.g., by scrolling through a document). • A model notifies its associated views and controllers when there has been a change in its state. This notification allows the views to produce updated output, and the controllers to change the available set of commands. In some cases an MVC implementation may instead be 'passive' and other components must poll the model for updates rather than being notified. • A view requests information from the model that it uses to generate an output representation to the user. D) The software implementation layer within the model-view-controller layer. The software implementation layer consists of the Actual Working Code, ActiveRecord, Template View, Transformation View, Data Mapper and REST. ...

Words: 458 - Pages: 2

Premium Essay

Nt1330 Unit 1 Case Study

...Some scholar praised him for “Calculation, control, and sensitivity” in his work. He was a composer as well as a well-known violinist. He knew that violin can generate complex melody in fast-moving pace, while other instruments, such as harpsichord, and basso continuo hit important bass lines and notes. One of very good example that shows the role of violin and style in the 17th century is Corelli’s Sonata in D major op.5 no.1. Musical style of this work can be described as “free virtuosity”. The performer has to pay attention to how Corelli carefully composed this work in marvelous improvisation. The Baroque violin players were supposed to have sprit of improvisation in their mind and technique in which most modern players...

Words: 770 - Pages: 4

Premium Essay

Nt1330 Unit 1 Case Study

...1. How response times are affected for the a) Speed of devices In a network, network devices like switch, routers and repeaters will responds to the users based on the speed that ISP is providing and the devices that we are using in a network. To get minimum or agreed responds time we need list down the requirements of customer, order accordingly and user suitable cables like cat5, 5E and 6. So that the components in these network devices will responds accordingly. For example, if it’s a small company with 10 users we don’t need to use high tech servers, printers and other network sharing devices. b) Bandwidth of transmission line Transmission line is a connectivity line through which your network is connected to the internet. These lines are rented by ISP to provide internet. The response times will depend upon bandwidth that ISP is providing. In other words, the amount of downloading...

Words: 494 - Pages: 2

Premium Essay

Nt1330 Unit 1 Case Study 1

...The personal care home has adults who may be considered mentally incompetent or a vulnerable adult. This may affect their ability to form decisions. A PGT can be appointed through the Mental Health Act when the client has no social or community support by opening a file by a psychiatric facility, the court, or an order of committeeship can start the process of obtaining a PGT. An Adult Services Administrator (ASA) is assigned to the case and helps establish the role of the PGT. When working with adults, the PGT has to give consent for any medical or psychiatric treatments. Therefore, as an occupational therapist we have to request funds from the PGT and also...

Words: 805 - Pages: 4

Premium Essay

Nt1330 Unit 7-1 Case Study

...Scenario 7-1: Automating Computer Maintenance and Program Launching Maria is a busy freelance writer who uses her computer many hours a day to research and write articles for several national magazines and newspapers. Her computer, which runs Windows 7 Professional, must be running at peak performance with little downtime. Maria has little time to devote to computer maintenance tasks. She also uses Internet Explorer 9 and Microsoft Word 2010 every day and would like them to start automatically when Windows starts. Maria asks you for advice how to maintain her computer with relatively little effort, and how to configure her computer to start programs automatically. What do you tell her? Tell Maria to ensure that Disk Defragmenter is scheduled to run at least once...

Words: 738 - Pages: 3

Premium Essay

Nt1330 Unit 1 Case Study Online

...Summary Notes "Ben reported that his laptop was running slow and asked that we clean it up. Connected remotely to the computer. Downloaded and ran quick scans with several anti-malware applications which did not detect any malware. Removed unnecessary items from the startup and cleaned the registry. Performance was improved. " Kimberly reported that the internet was down. Walked her through power cycling the modem and router which did not resolve the issue. Escalated to onsite. Amanda requested that Heather's email password be reset. Logged into the IT365 portal and reset the password. "Dwana reported that Internet Explorer would not open but just crashed at startup. Connected remotely to her computer. Downloaded and ran scans with multiple anti-malware applications which detected and removed a number of malware components. Verified that all malware was removed and that Internet Explorer worked correctly. " "Candace requested that a drive be mapped to a server share on the sales computer, and that two email accounts be set up in that computer. Connected remotely to the computer. Mapped a drive to the documents folder and configured the email accounts, Karen's and the sales account, in Outlook. " "Tiffany reported that she had added a company file to QuickBooks and that Carla could not access it. Logged into the server computer remotely and opened the company file for the first time on that system. Verified that it was then in the list of company files and that Carla...

Words: 1223 - Pages: 5

Premium Essay

Nt1330 Unit 1 Case Study Answers

...1. Some of my uncertainties would be the fear of nobody being able to comprehend my work and causing them feelings of helplessness, insecurity, and dependence on others. I might also hold the fear that my application may be like something previously designed and possible to buy off a shelf. My greatest fear would be how might the software affect my organization. 2. A business might undertake projects to integrate some of its information systems with its customers' systems in order to provide them with more timely, accurate, and useful information. It might even directly provide applications for its customer's use at low or no cost to the customer. Customers later considering changing suppliers would lose these benefits. Indeed, the very process...

Words: 494 - Pages: 2

Premium Essay

NT1330 Unit 1 Assignment 1: A Case Study

...FSO: FSO is a line-of-sight (LOS) technology approach. It uses invisible beams of lights to provide optical bandwidth connection. It is capable to send up to 25 Gbps of data including simultaneous voice and video communications. This type of optical connection does not require neither expensive fiber-optic cable nor securing spectrum licenses for radio frequency (RF) solutions. FSO technology is based on connectivity between FSO-based optical wireless units, each consisting of an optical transceiver with a transmitter and a receiver to provide full-duplex capability. Each optical wireless units uses an optical source and a lens or telescope that transmits light through the atmosphere to another lens receiving the information. FSO can provide point-to-point or point-to-multipoint connection with high data rate. It can be implemented on both ring and star architectures, but the best architecture to maximize the availability is to use the meshed architecture that includes both ring and star...

Words: 978 - Pages: 4

Premium Essay

Nt1330 Unit 3 Assignment 1 Case Study Of Configuration Auditing

...A closer look at LepideAuditor Suite Server systems are like pillars to establish the working environment in an organization. These servers should be up all times without any interruptions. If a server crashes or goes down because of an unwanted change, the users will not be able to work. Such problematic changes can be a result of IT Administrator’s trial to test a new policy in a live environment or it can be because of an unwelcome access. In case of the latter, the organization will not only lose valuable time of its professionals, but also there is a chance of an insider’s unexpected access to the million-dollar information stored on the servers. With change configuration auditing of servers in hand, an IT Administrator is supposed to save the...

Words: 900 - Pages: 4

Premium Essay

Test

...Description: This course examines security implementations for a variety of Windows platforms and applications. Areas of study include analysis of the security architecture of Windows systems. Students will identify and examine security risks and apply tools and methods to address security issues in the Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program:    IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA    NT2580 NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110  NT1210 Structure and Introduction to  ComputerLogic Networking    IS3120 IS3110 NT1210 Network  Risk Management in Introduction to General Education / General Studies NT2580 NT2799 Communications Information Technology Introduction to Information Security NSANetworking Capstone...

Words: 2305 - Pages: 10

Premium Essay

Nt1230 Syllabus

...aspects of typical network server functions. Client-Server Networking I Syllabus Where Does This Course Belong? 1st QTR GS1140 NT1110 GS1145 Problem Solving Theory Computer Structure and Logic Strategies for the Technical Professional 2nd QTR NT1210 Introduction to Networking NT1230 Client-Server Networking I MA1210 College Mathematics I 3rd QTR NT1310 NT1330 MA1310 4th QTR PT1420 NT1430 EN1320 5th QTR PT2520 NT2580 EN1420 6th QTR NT2640 NT2670 CO2520 7th QTR NT2799 SP2750 Physical Networking Client-Server Networking II College Mathematics II Introduction to Programming Linux Networking Composition I Database Concepts Introduction to Information Security Composition II IP Networking Email and Web Services Communications Network Systems Administration Capstone Project Group Theory The follow diagram indicates how this course relates to other courses in the NSA program: 1 Date: 8/31/2012 Client-Server Networking I Syllabus NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420...

Words: 1834 - Pages: 8

Premium Essay

Nothing

...practices, various media and interconnection components), networking devices and their specifications and functions. Students will practice designing physical network solutions based on appropriate capacity planning and implementing various installation, testing and troubleshooting techniques for a computer network. Where Does This Course Belong? | | | NT2799 | | | | | | | | NSA Capstone | | | | | | | Project | | | | | NT2580 | | | NT2670 | NT2640 | | PT2520 | | Introduction to | | | | | | | | | | | Email and Web | | | | | Information | | | | IP Networking | | Database Concepts | | | | | Services | | | | | Security | | | | | | | | | | | | | | | | NT1330 | | | NT1230 | NT1430 | | PT1420 | | Client-Server | | | Client-Server | | | Introduction to |...

Words: 10839 - Pages: 44

Premium Essay

Unit

...ITT TECHNICAL INSTITUTE NT1310 Physical Networking GRADED ASSIGNMENTS ------------------------------------------------- Student Professional Experience Project NSA SPE Project 1 (to be completed by the end of NT1310): Install, Configure, Test, Maintain and/or Document the Worksite Local Area Network and Its Components Purpose The purpose of the Student Professional Experience (SPE) project is to provide you an opportunity for work experience in your field or in a related field to add to your résumé. You may have an opportunity to serve your community or work for a local employer for a project that will take between 20 and 30 hours. Project Logistics Career Services will identify an employer with needs in the following areas: Network related tasks (mostly confined to the LAN and Microsoft Windows Server 2008 environments) Students are expected to practice various skills discussed in all the technical courses in Quarters 1 through 3 of the NSA program at an employer’s site on network related tasks (more confined to the LAN and Microsoft Windows Networking with Server 2008 environments) that would involve installation, configuration, testing, maintenance and documentation of the worksite network and its components, and to properly document the technical information in all involved activities. Such documentation will be used as the source material for Items 2 and 3 defined in the Deliverables section of this document. Possible example projects could...

Words: 6762 - Pages: 28