Introduction: The SNHU Energy Inc. overall framework and architecture of the current network will not be capable of supporting more users than it currently has. The network cannot grow any further in its current configuration. If SNHU Energy wishing to expand and grow in the near future it would be in the best interest of the business, employees and customers to upgrade the current hardware of the network. The network must be able to support current and future needs of the company. Network Devices
Words: 1099 - Pages: 5
software not only runs slower, but it also has more security risks. If you cannot check for updates daily, do so at least once a week. You can also allow automatic updating if you desire. 4. Use a Windows Firewall—A firewall is another layer of protection for your Windows VPS account. A firewall works by controlling and restricting traffic to your server. There are many different options, which you can set up in your administrator account. If you don't have the time to go through each option, consider
Words: 442 - Pages: 2
the correct LANs. b. Firewall: It will filter all the incoming and outgoing traffic of the network, which means that it will protect the network and the network systems from unauthorized access. It will allow only a certain set of services to pass through it for the systems of the internal network. c. A gigabit ethernet wired connection (switch): The switch is used to interconnect multiple network devices on this network. All the filtered traffic from the firewall will reach the switch and
Words: 479 - Pages: 2
SELinux SELinux was developed by the United States National Security Agency. It was then released for open source development on December 22, 2000 and was merged into the main Linux kernel version 2.6.0-test3 on August 8, 2003. SELinux was designed to change the access control protocols for Linux users, to make them more secure and computer resources and applications less likely to be exploited. Prior to the development of SELinux, systems used a form of DAC, Discretionary Access Control. In
Words: 792 - Pages: 4
DESIGN FEATURES Server Room The server room shall be a locked room, properly vented and air conditioned where the servers switches, firewalls, and an un-interruptible power supply will be housed along with any other electronic interfaces such as telephone systems, cable tv, internet access point of entry. 1. Link to an internet connection a. Modem b. Firewall 2. 2 -12 port switches will allow for growth and provide adequate levels of security and speed 3. 1 Server – server 2008 Small
Words: 721 - Pages: 3
An operating system, or OS, is a software program that enables the computer hardware to communicate and operate with the computer software. Without a computer operating system, a computer would be useless. As computers have progressed and developed so have the many different operating systems. We will talk about the different operating systems and how they compare and contrast as far as their security and memory management. The first operating system we will compare and contrast is Windows
Words: 750 - Pages: 3
Principles of Information Security and Privacy Introduction and Overview Aircraft Solutions (AS) is a design and fabrication firm that serves different sectors of the industry by providing high quality products and services with a variety of applications in the defense, aerospace, or electronics industry. AS is known by its large capacity automated production facilities located in Southern California and its well-trained workforce of design engineers, programmers, machinists, and other specialized
Words: 846 - Pages: 4
Discuss the pros and cons of defense in depth, for example the need for defense in depth versus satisfying other operational requirements. The business has to run in order to stay in business. The best security is leaving the system turned off. If the system is turned off, the business will not run and therefore the business will not make money. This simple sentence directly relates to the implementation of defense in depth within an enterprise environment. The multiple rings of defense portrayed
Words: 420 - Pages: 2
Integrative Network Design NTC 362 Integrative Network Design This project will consist of five different phases totaling a timeline of six months. The first month will be the planning phase. This phase will have a deadline no longer than 30 days. After the first 30 days, the second phase will take into effect, which is the installation phase. This phase will also have a timeline of no more than 30 days. The Third Phase will be the longest phase of a timeline of 60 days. The third phase
Words: 2910 - Pages: 12
WATERWORLD WATERPARKS Information Security Policy Version 1.0 Revision 191 Approved by John Smothson Published DATE March 23, 2011 CONFIDENTIAL/SENSITIVE INFORMATION This document is the property of WATERWORLD WATERPARKS. It contains information that is proprietary, confidential, sensitive or otherwise restricted from disclosure. If you are not an authorized recipient, please return this document to WATERWORLD WATERPARKS, Attention: IT Director. Dissemination, distribution, copying or use of
Words: 28277 - Pages: 114