Explore BrainMass
Share

Networking Questions

This content was STOLEN from BrainMass.com - View the original, and get the already-completed solution here!

A small research company in Pittsburgh is working to develop a new method of mass storage to replace current hard drive technology. Four engineers and an office manager work there. The engineers are highly skilled professionals, and the office manager is a capable computer user. The company has an always-on Internet connection because employees must conduct research frequently. The employees have hopes of making a breakthrough and bringing the company public in the next two years. You have been hired as a security consultant to assess the company's needs. Write up an proposal that includes the following:

· What type of security policy should be used (open, moderately restrictive, or highly restrictive)? Why?

· What security technologies should be put in place? Why?

· What areas should the security policy focus on (physical security, data security, auditing, passwords, etc.)? Why?

· What technologies should be used to secure those areas?

Each question just needs to be answered with 25-50 words.

Thanks

© BrainMass Inc. brainmass.com October 25, 2018, 2:06 am ad1c9bdddf
https://brainmass.com/computer-science/computer-system-implementation/networking-questions-286783

Solution Preview

· What type of security policy should be used (open, moderately restrictive, or highly restrictive)? Why?

- The security policy must be highly restrictive. It is because the company is a research and development type and there must be confidentiality on the proprietary designs and documents, which could easily be stolen on a light security.

· What security technologies should be put in place? Why?

- There should be both physical and ...

Solution Summary

This posting contains answers to the given questions.

$2.19
See Also This Related BrainMass Solution

Networking Problems WK5

1. Based on the Ainsworth (2007) article, are network security best practices only based on implementing hardware and software solutions? If not, how can one of these network security best practices be customized to the needs or risks present in an organization? How are the risks to a particular organization discovered or established?

2.Based on the Friedlander et al. (2007) article, what are DNS and DNSSEC? Can DNSSEC be implemented effectively by the U.S.?

3. What are some things we need to evaluate when protecting our network?

4.What purpose does a firewall play in an organization?

View Full Posting Details