Attachment # 00010174 - Information_Technology_Security_I_Week_6_Essay.docx
Information_Technology_Security_I_Week_6_Essay.docx (18.3 KB)
Raw Preview of Attachment:
(refer to the detailed question and attachment below)
Information Technology Security IWeek 6 EssaySecurity Auditing PaperConsider the following scenario:Tom works for a security consulting firm. He has been asked to audit a small business network (40 workstations, 5 servers). He takes the following steps: Checks all machines to see whether they have updated patches. Checks physical security. Checks to see that there is a properly configured and operating firewall, IDS, and proxy server (or NAT device). Checks to see that all machines have properly configured antivirus software.Probes the perimeter and all servers with NetCop.Assignment: Write a one-page paper that discusses the following questions. Apply knowledge learned in this week's readings. Was this adequate? Explain your answer. What other steps should Tom have taken? Give the reasons for your recommendations

Week 6 Essay

Question # 00418780 Posted By: chiquetta28 Updated on: 11/04/2016 08:49 PM Due on: 11/09/2016
Subject General Questions Topic General General Questions Tutorials:
Question
Dot Image

I need this assignment completed by Wednesday and I already have someone to do it. I work with the same person each week. If I don’t give the person the okay to do the assignment don’t just volunteer and do it on your own Thanks.

Dot Image
Tutorials for this Question
  1. Tutorial # 00416467 Posted By: Davidcharles Posted on: 11/09/2016 04:30 PM
    Puchased By: 3
    Tutorial Preview
    The solution of The Security Auditing...
    Attachments
    Security_Auditing.docx (20.86 KB)
Whatsapp Lisa