Using the project report from W2 Assignment 2, complete the following tasks by adding 3- to 4-pages to your existing report:
Modify the report from W2 Assignment 2
to accommodate suggestions and recommendations from your instructor and
your own changes based on the readings and activities for this week.
Color code your changes to the report so that they are easy to identify.
to secure the computers in the Marketing department of this
organization. These computers travel outside of the network, so you need
to consider how they will connect to the home server, and what should
be done to protect them. You should consider the level of access they
have to the network and the consequence if they are stolen or used by
someone outside of the organization.
for securing network traffic between the workstations within the
building and the server. Identify trust boundaries for the organization
and recommend security measures for each trust boundary. Characterize
which trust boundaries represent the highest level of trust and those
that represent the lowest; what is the distinction between these levels?
Recommend measures to
harden the server OS to prevent outsiders from accessing the networked
computers. Identify the services for your recommended OS that will aid
in the security effort. Explain the policy that should be used for
patches and updated on both the server and the workstation OSs. Why is
this an important consideration?
Secure the database of
the organization and assign the required permissions to the users. You
should create a chart of groups and permissions for this portion of the
assignment (you do not need to identify specific tables, just
implementation process and timeline for your recommendations. Try to
give as reasonable a timeline as possible and explain the timeframe you
Expand the section of your report for verifying the implementation of the previously suggested security recommendations from Week 1and2.
Identify what is being tested for each verification activity and what
is proven by each activity. This should include testing activities to
make sure the security system is working properly. An example of this
would be using an intentionally incorrect password to make sure the
system does not allow the login.
Be sure to include your references and citations for
the measures and activities you suggest. You should have gathered this
from the research in the library or on the Internet.
Support your responses with appropriate research, reasoning, and examples.