Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Provide recommendations for securing network traffic between the workstations wi

ID: 3821295 • Letter: P

Question

Provide recommendations for securing network traffic between the workstations within the building and the server. Identify trust boundaries for the organization and recommend security measures for each trust boundary. Characterize which trust boundaries represent the highest level of trust and what is proven by each activity. This should include testing activities to make sure the security system is working properly. An example of this would be using an intentionally incorrect password to make sure those that represent the lowest; what is the distinction between these levels?

Explanation / Answer

Answer:

To secure set-up traffic between employment stations:

1. Implement a firewall in order in the direction of make certain to analyses data being exchanged.

2. Total packet inspection should be complete of the inward bound data and the outgoing information between the work stations.

3. Passwords of the network be supposed to be encrypted along with important data and access ought to be agreed to only employees at higher levels.

4. Use WPA key to locked networks.

In arrange to secure the operating classification:

1. Install antivirus software to get rid of a number of bugs before virus.

2. Install anti-spyware to obtain rid rotten any spyware.

3. Dont opens unknown e-mail

4. Don reliance job offer and open them.

5. Keep the soft ware’s up and doing to date plus keep updating them each month using updates.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote