StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Unit 3 Discussion CIS 204 - Case Study Example

Cite this document
Summary
Since it is a lunch meeting, I need to be brief. I would ask them about the last time they updated their firewall firmware. I would further like to know how often there is a security breach at this small local company. Knowledge about missing updates on their servers and PCs…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.5% of users find it useful

Extract of sample "Unit 3 Discussion CIS 204"

Computer Case Study Institute Since it is a lunch meeting, I need to be brief. I would ask them about the last time they updated their firewall firmware. I would further like to know how often there is a security breach at this small local company. Knowledge about missing updates on their servers and PCs would be crucial at this point. Before going to the site, I would like to know if they have a secure backup for their data. Since it is a lunch meeting it would be highly improbable for them to be carrying the flowchart or any documentation of their network, but I would still inquire about that.

Lastly, I would ask them if they have WEP encryption because this is highly vulnerable to attack. 2. There are many things that can be arranged for securing the routers but in such a short time I would; disable remote access, update the firmware and change the default login credentials.3. If the company invites me again, I will lock down Wi-Fi access. This will prevent an outsider from tampering with the router. Disabling UPnP is also an option for the same purpose. After the configuration, I would also log out from the router’s web interface.

This process will prevent cross site scripting flaws (XSS). After doing these procedures I would go back to the basics; I would ensure that the routers are password protected both in the login mode and privileged mode.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Unit 3 Discussion CIS 204 Case Study Example | Topics and Well Written Essays - 250 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1660644-unit-3-discussion-cis-204
(Unit 3 Discussion CIS 204 Case Study Example | Topics and Well Written Essays - 250 Words)
https://studentshare.org/information-technology/1660644-unit-3-discussion-cis-204.
“Unit 3 Discussion CIS 204 Case Study Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1660644-unit-3-discussion-cis-204.
  • Cited: 0 times

CHECK THESE SAMPLES OF Unit 3 Discussion CIS 204

Examining Achievement-Related Attributions

The school's mission is to provide high quality education to all students who seek education as a key to a successful future.... The curriculum and assessment that is… Moreover, the school also has a summer school for children between the ages of 3 to 16 years old.... The assessment being utilized by the school is from the International Baccalaureate (IB) Organization....
5 Pages (1250 words) Research Paper

CRISPR/CAS9 in Toxoplasma gondii

CRISPR/Cas 9 system is widely used for genome engineering in eukaryotic organisms, because it helps in the rapid generation of the cell lines with the modified alleles.... CRISPR along with Cas9 acts as an auto immune system to the body, with the Cas proteins converting the foreign… These nucleotides are inserted into the CRISPR locus, and as a result RNAs are produced....
12 Pages (3000 words) Article

Unit 2 Discussiion CIS 204

Since RIP may not be suited to the large scale networks and given the shortest path first function, it may compromise the security aspect of the network. The RIP protocol may be left over against OSPF and EIGRP… The RIP protocol provides for the shortest path first, while OSPF allows fulfilling the requirements of the entire loop and network, hence the team lead may well be justified suggesting the use of OSPF I totally agree with the team leader on account of leaving out RIP....
1 Pages (250 words) Coursework

US Intel Community

An element of the National Security Act of 1947 stated “…No United States intelligence information may be provided to the United Nations or any organization affiliated with the United Nations.... ... ... ?? Briefly defend this position from an ethical perspective. Whenever the… ional Security Act of 1947 were precisely constituted, it would have been addressed the National Subversives Security Act since it constituted the administrative model for revolutionists to the United States....
4 Pages (1000 words) Essay

Designing a USB Drive Product

The paper 'Designing a USB Drive Product' focuses on the final report in designing a USB drive product for enhancing cloud storage through Bluetooth.... The USB drive product was found to be useful for the USB Bluetooth cloud storage to be incorporated in high definition cameras.... hellip; Go Pro Camera Company specializes in high definition camera development, manufacturing, and marketing....
12 Pages (3000 words) Term Paper

Concerted Practice and Article 101 of the TFEU

This paper undertakes a critical discussion of the statement relating to concerted practice in relation to Article 101 of the TFEU - how concerted practice, among the different Article 101 categories, is deemed as being the most vague.... 1 The third paragraph of that Article… The first paragraph on the other hand explicitly makes a prohibition of concerted practices as being not compatible with the European internal market, 2 With regard to paragraph three and exceptions to the prohibitions in paragraph one of Article 101, those relate to what the law determines as contributing to society either through economic development, technical development, and improvements in the way goods are produced or distributed 3 Under the law, moreover, the European Commission has the power to impose the law, to investigate infringements relating to the violation of the prohibitions in Article 101, and to impose penalties and sanctions....
12 Pages (3000 words) Essay

The Computer and Communication Technology

The paper 'The Computer and Communication Technology' presents Information and Communication Technology which is an all-pervasive scientific field that has revolutionized the way people live, the way they work and even the way they relax, play and have fun.... hellip; ICT has pervaded all walks of life and work....
9 Pages (2250 words) Case Study

The Assessment and Treatment of Muslims

The author concludes that counseling Muslim clients may not be easy for the therapist who is neither religious nor able to see past the idea that "all Muslims" are not terrorists.... They must have an inner understanding of themselves and who they can counsel versus who they cannot.... nbsp;… As therapists begin to understand multicultural counseling, they must take into consideration that there are some groups that may be very difficult for them to counsel....
14 Pages (3500 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us