preview

Nt1310 Unit 6 Lab

Good Essays

You are in charge of the security of information in a research lab. Most of the information is stored in electronic format on the LAN. The researchers can also access these files from their homes. The computers in the lab are also connected to the Internet. The current access is provided to Internet via a combination router-firewall. The entire network resides behind this single firewall-router configuration. It is quite important to maintain the confidentiality of the information, although the lab has limited funds allocated for security. There are 8 workers that use the network connections.

Identify at least 3-5 potential information security risks that the lab may be exposed to and propose counter measures for addressing those risks. Identify security technology and products that could be used to protect the lab environment from these risks. Use …show more content…

Many such software suites are available for no cost. These suites scan a network for possible intrusion vectors. These vectors can then be analyzed for the best way to close the potentially open doors to the network. The GFI Events Manager is available for as low as $45 per node for servers, and as low as $4.50 per node for workstations (www.gfi.com). In addition, there should be a discussion for a periodic network attack by the IT staff or a trusted outside contractor. The reason that an outside contractor should be used on occasion is because IT would have at least some knowledge of how to access the system already. A “black hat” simulated attack would begin with no knowledge of the system network at all. As such, it simulates how a hacker would attempt to access the network. Thus, knowledge of access points would be learned, and a decision made as to how best to close them. The Common Vulnerabilities and Exposures (www.cve.mitre.org) is also an exceptionally useful free

Get Access