Description
You work as a network administrator for a small security firm. The company's main office includes 20 workers, most of whom use laptops. This year, the company plans to upgrade the network. The company asks your team to create a list of common network security issues, to make recommendations for hardware and software, and to create guidelines to secure the network.
Review the different networking security risks discussed in this course module and determine the following:
- Describe the risk
- Review an example of an industry article or blog post describing an experience with the risk
- What damage was done?
- What steps did the network's administrator take to recover from the damage and/or prevent future attacks?
- What hardware or software can be used to safeguard against the risk?
- What guidelines for network users should be in place to help avoid the risk?
Explanation & Answer
Attached.
Running Head: NETWORK SECURITY
1
NETWORK SECURITY
Student Name
Institution Affiliation
NETWORK SECURITY
2
The organization is upgrading the network, and almost every employee has a laptop. The
company has the probability of being exposed to a data breach by employees without even noticing
it, which is known as Bolster Access Control. Bolster Access Control is a breach whereby the
employees leave the system and the data disposed to the unauthorized users (Dosal, 2020).
Chase bank expe...