Ashford Chapters 12 and 13 Maintenance Tools & Troubleshooting Discussion

User Generated

oevgwbpne803

Writing

ashford university

Description

Maintenance, Tools, and Troubleshooting

Prior to beginning work on this assignment read Chapters 12 and 13 in the textbook, review the Network Maintenance Myths Busted (Links to an external site.) and the Top 5 Threat Protection Best Practices (Links to an external site.) online resources, and review any relevant information in this week’s lecture. For this assignment you will take on the role of a newly hired IT Director of a company that has been a victim of multiple cyber attacks in the last few months. You need to create new security plans, policies, and procedures to eliminate these attacks. These elements will serve as the basis of a manual to follow, filled with best and latest IT practices. Part of this documentation will be sections on best maintenance practices for your network, including the tools to deploy to defend against outside threats, and what to do in the event a network is faulty or down due to a malfunction or an outside breach.

Research a minimum of two professional sources on this topic. (Access the MISM Credible Resource Guide for assistance with finding appropriate credible professional resources.)

For this assignment, evaluate the telecommunication and network processes currently in place and explain how the company plans to protect its network and assets from both internal and external threats using best practices moving forward. Apply technical knowledge to the security issues and explain the tools that will be deployed to reach the new level of security. Create an outline of the procedures that will guide the organization in the event of a security breach, and then provide an explanation of each element in the procedure. Explain the troubleshooting tactics that will be employed when the network is down. Support your statements with evidence from at least two additional professional sources in addition to the required resources.

The assignment

  • Must be three to four double-spaced pages in length (not including title and references pages) and formatted according to APA style as outlined in the Ashford Writing Center (Links to an external site.).
  • Must include a separate title page with the following:
    • Title of paper
    • Student’s name
    • Course name and number
    • Instructor’s name
    • Date submitted
  • Must use at least two professional sources in addition to the required resources.
  • Must document all sources in APA style as outlined in the Ashford Writing Center.
  • Must include a separate references page that is formatted according to APA style as outlined in the Ashford Writing Center.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Here you go hun

Running Head: MAINTENANCE, TOOLS, AND TROUBLESHOOTING

Maintenance, Tools, and Troubleshooting
Instructor
Class
Date
Name

1

MAINTENANCE, TOOLS, AND TROUBLESHOOTING

2

Maintenance, Tools, and Troubleshooting
As a newly hired IT Director of ‘University Hospital,’ that has been recently attacked
using cybercrimes, I will take the role in describing the methods that could be employed to
enhance the protect the security of the system from future cyberattacks. This manual provides the
basis of an evaluation of the telecommunication and network processes while also establishing
the plans set forth to protect the network and assets from both internal and external threats. This
manual will also describe the tools that can be deployed to reach newer levels of security
protocols while outlining the procedural methods in-case for future security breaches. This
manual will conclude with a thorough explanation of element employed in the procedure while
detailing the troubleshooting tactics that could be used if the network were to become shut down.
Evaluation of Telecommunication and Network Processes
Using a method-based approach of judgments and analytical thinking concerning the
hierarchy process of the information security risks and assessments of the telecommunication
and network process of ‘University Hospital’ the impacts of threats have identified a vulnerable
weakness in the security protocols. Telecommunications have expanded to include email, instant
messaging, web browsing, and the distribution of private information regarding patients in the
healthcare system (Snyder, 2005). The University Hospital has recently been under attack by
cybercriminals while increasing the chances of private information regarding their patients
getting out. Some of ...


Anonymous
I use Studypool every time I need help studying, and it never disappoints.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags