Cash-back offer from April 23rd to 27th, 2024: Get a flat 10% cash-back credited to your account for a minimum transaction of $50.Post Your Questions Today!

Question DetailsNormal
$ 25.00

List and discuss two (2) user authentication policies that you can implement to help | Solution

Question posted by
Online Tutor Profile
request

Part 1
Write a ten to fifteen (10-15) page paper in which you analyze and solve the following issues:
Imagine you are a senior systems administrator who has recently been given the task to help improve security of your company’s IT infrastructure after a series of network security breaches. These breaches included someone accessing the network who was not authorized to do so, and authorized users being asked for their passwords by someone who claimed to work in the IT department.
You have also been asked to implement IT troubleshooting best practices to help improve the efficiency of solving IT issues that end users frequently experience. Your first task is to ensure secure user accounts since most network security breaches have occurred through social engineering means.
1.List and discuss two (2) user authentication policies that you can implement to help improve the network’s security.

You have been asked to develop an action plan that you will use to communicate the importance of IT security to all of the company’s employees by creating two unique forms of communication material (e.g., detailed email, detailed memo, brochure, electronic presentation, etc.) to help disseminate the security message to company employees. Approach the communication material from the perspective of the core tasks these employees are responsible for.
2.Create a communication medium that: 1.Caters to all company employees and these employees’ core tasks.
2.Approaches this from the perspective of security best practices and awareness from the user perspective.
3.Includes at least four (4) best practice methods.
4.Includes at least two (2) supplemental graphical renderings of best practice methods through the use of Excel, Visio, MS Project, or one of their equivalents such as Open Project, Dia, and OpenOffice (flowcharts, process diagrams, tables, etc.). Note: The graphically depicted solution is not included in the required page length.

3.Create a communication medium that: 1.Caters to technicians who work in the IT department and these employees’ core tasks.
2.Approaches this communication from the perspective of specific technologies the IT technicians can implement to tighten IT security.
3.Includes at least four (4) different Windows 7 technologies, excluding authentication.


You need to present IT troubleshooting best practices to junior systems administrators at an IT department meeting to ensure departmental efficiency with solving issues. You want to present some of these issues from a case scenario perspective.
4.Create and describe (3) scenarios where there is an IT problem that requires troubleshooting.
5.Describe the steps you would take to handle the situation by modeling them after an effective troubleshooting methodology for each scenario you previously created in Question four (4).
6.Explain the specific IT administration activities required to solve the problems.
7.Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Part 2
Develop a three to six (3-6) slide PowerPoint presentation in which you:
8.Illustrate the authentication policies, in which you identified in Part 1 Question 1, by including at least two (2) SmartArt diagrams graphically depicting them.
9.Describe at least two (2) network security breach scenarios that can be prevented by implementing the authentication policies in which you identified in Part 1 Question 1.
10.Include PowerPoint speaker notes that will accompany each slide with five to ten (5-10) sentences and provide more detail about the slide content to be used when presenting this to a group.

Your assignment must follow these formatting requirements:
•Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions.
•Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required page length.
•Include charts or diagrams created in Excel, Visio, MS Project, or one of their equivalents such as Open Project, Dia, and OpenOffice. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

Available Answer
$ 25.00

[Solved] List and discuss two (2) user authentication policies that you can implement to help | Solution

  • This solution is not purchased yet.
  • Submitted On 25 Apr, 2015 06:17:07
Answer posted by
Online Tutor Profile
solution
Access to non-public company IT can be achieved by a person and unique logins will require authentication, a username and combination. Authentication credentials should not be translated into other forms such as if it is not encrypted, and only no other reasonable options exist. Authentication...
Buy now to view the complete solution
Other Similar Questions
User Profile
termp...

ECE 660 Competency Checklist and Professional Development ECE 660Personnel Management

ECE 660 Competency Checklist and Professional Development ECE 660€”Personnel Management and Staff Development for Early Childhood Administrators Part 1 Competency Checklist Competency Describe an example of a teache...
User Profile
termp...

ECE 660 Week 2 Assignment.docx ECE 660 Competency Checklist and Professional Development

ECE 660 Week 2 Assignment.docx ECE 660 Competency Checklist and Professional Development ECE 660€”Personnel Management and Staff Development for Early Childhood Administrators Part 1 Competency Checklist Competency ...
User Profile
bhuvs...

List and define the three types of diversity

List and define the three types of diversity. What is the most important kind of diversity? Explain please. Answer: These are three.. Ecosystem Diversity: Ecosystem diversity is the sophisticated network of various types o...
User Profile
Tutor...

Assignment 3 List and discuss some of the advantages and disadvantages in using seniority as a

Assignment 3 Seniorityis important in some private sector workplaces, professions, skilled trades, and in union-represented workplaces. Forward-thinking organizations are less likely to provide preference for senior emplo...
User Profile
Tutor...

1. List and describe skills necessary for developing a

Question 1 Skills necessary for developing a good project plan The necessary skills for developing a good project plan can broadly be categorised into technical skills, organisational skills and business skills. Technical ski...

The benefits of buying study notes from CourseMerits

homeworkhelptime
Assurance Of Timely Delivery
We value your patience, and to ensure you always receive your homework help within the promised time, our dedicated team of tutors begins their work as soon as the request arrives.
tutoring
Best Price In The Market
All the services that are available on our page cost only a nominal amount of money. In fact, the prices are lower than the industry standards. You can always expect value for money from us.
tutorsupport
Uninterrupted 24/7 Support
Our customer support wing remains online 24x7 to provide you seamless assistance. Also, when you post a query or a request here, you can expect an immediate response from our side.
closebutton

$ 629.35