Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Consider the following Security Analysis categories that were discussed in class

ID: 3888182 • Letter: C

Question

Consider the following Security Analysis categories that were discussed in class and are contained in the security analysis template:

Network/Wireless Security

System (PC/Server) Security

Backups/Disaster Recovery

Physical Security

AAA (Authorization/Authentication/Accounting)

User Education

For EACH of the above categories, create five to seven topics/questions in each category that you will analyze for your customer.

Then, for each topic/question, write a brief action item describing how you will approach that topic for your customer.

For example:

Category: Wireless Network Security

Topic: Is the wireless network password protected?
Action: Use laptop to try and connect to wireless network.

Explanation / Answer

Answer)

Network/Wireless Security :

1. Topic : Is the encryption wpa2 enabled ?

Action : Login to the router using laptop browser and check for the same.

2. Topic : Is the default username and password of the router changed ?

Action : If not, login to that using browser and change it.

3. Topic : Is the network security for firewall enabled ?

Action : Turn it on from windows settings.

4. Topic : The number of devices connected are the auhorised ones or not ?

Action : Check for the same using laptop's browser by logging into your router and check in management.

5. Topic : Is your password length strong ?

Action : Check for the same using laptop's browser by logging into your router and check in wireless security.

System (PC/Server) Security:

1. Topic : Is your Pc virus free ?

Action : Check for the same by doing a complete system scan.

2. Topic : Is your pc password protected ?

Action : Try turning it on and see if it asks for password or not

3. Topic : Is your pc secure from realtime password ?

Action : Open the antivirus and check in real time security

Backups/Disaster Recovery:

1. Topic : Backup kept in an external device ?

Action : Plugin the external device to your system and check for the same

2. Topic : Is there enough extra storage available for creating backup

Action : Plugin the external device to laptop and check for spaces

3. Topic : Is the reset point set in the system ?

Action : Check for the same by going in the system reset settings.

4. Topic : Has the data been placed at a safe location ?

Action : Inspect through the location by creating various audits

Physical Security:

1. Topic : Is the placement of device accurate ?

Action : Check for the edges by slightly moving your device

2. Topic : Is the area you are keeping your device have only authorised access ?

Action : Try going in that place and see if any security is there or not

3. Topic : Is the device covered with some external safety ?

Action : Inspect the outer areas of device by simply touching the outer surface for checking the quality

AAA (Authorization/Authentication/Accounting):

1. Topic : Is the username and password asked ?

Action : Check by logging in to the system.

2. Topic : After access granted, are the commands running ?

Action : Try by giving various commands on the system.

3. Topic : Is the calculation of resources used being done ?

Action : Keep yourself logged in for a while and have access to some of the commands. Logout and see if the records are there or not

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote