SlideShare ist ein Scribd-Unternehmen logo
1 von 7
Recommendations
•Cisco recommends placing the VPN on an
inbound port of the firewall.
•Remove the switch and router and mount it on
a shelf or place it in a closet
•Label cabling to simplify troubleshooting
•Best solution: place router, switch, back up
device, power backup, and file server all in one
closet
Recommendations Cont.
• Hide the SSID on the wireless access point
  from public view
• Ensure that PSK2 with AES and the built-in
  firewall are enabled
• Install a mount in the wire closet for the CSU/
  DSU to remove from the floor
• Written policy should be created to give
  guidance for automation security and
  acceptable use for technology
Equipment
• Computers: Most work stations contain Power
  Spec computers. 1 IBM and 1 HP as well.
• Printers: Two directly connected printers and
  a plotter. One printer is a multi-use and is a
  fax machine as well
• Other: Two credit card terminals. Video
  recording and Security System
• Inventory: There is no system in place to track
  assets (serial numbers or asset tags)
Software
• OS: Most systems are running Windows 7 Pro,
  3 are running XP, XP Home, or XP Pro. Some
  laptops are using Vista
• Anti-Virus: Norton 360
• Other: Microsoft Office, Peach Tree, and an
  industry specific design program
• Licensing: All softwares are licensed and
  recorded
• Maintenance: All are set to automatic updates
File Storage
• Employees are given a share of a file server
• Server is backed up daily on an external hard
  drive and then to Iron Mountain weekly
• Some information is still stored in paper
  format
Email
• External email service provided by web host
• Google Calendar, synched with Outlook, is
  used to link the Mason location with parent
  location
Security
• Physical: Motion sensors and cameras ran
  through a cellular service
• Logical: Microsoft’s built-in firewall. Router
  software provides a firewall. Data encryption
  is not being used.

Weitere ähnliche Inhalte

Was ist angesagt?

An introduction to microcontrollers
An introduction to microcontrollersAn introduction to microcontrollers
An introduction to microcontrollersasmhemu
 
Unit 3, P1 computer components
Unit 3, P1 computer componentsUnit 3, P1 computer components
Unit 3, P1 computer componentsclevlandbrown69
 
Network Security: Protecting SOHO Networks
Network Security: Protecting SOHO NetworksNetwork Security: Protecting SOHO Networks
Network Security: Protecting SOHO NetworksJim Gilsinn
 
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEMNetwork Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEMJim Gilsinn
 
Wireless Keyboard Threats
Wireless Keyboard ThreatsWireless Keyboard Threats
Wireless Keyboard ThreatsWill Hatcher
 
A PRESENTATION ON Simulation Home automation System using Proteus and Arduino...
A PRESENTATION ON Simulation Home automation System using Proteus and Arduino...A PRESENTATION ON Simulation Home automation System using Proteus and Arduino...
A PRESENTATION ON Simulation Home automation System using Proteus and Arduino...Ekansh Agarwal
 
Preatorian Secure partners with Cipher loc - New Encryption Technology
Preatorian Secure partners with Cipher loc -  New Encryption Technology Preatorian Secure partners with Cipher loc -  New Encryption Technology
Preatorian Secure partners with Cipher loc - New Encryption Technology Austin Ross
 

Was ist angesagt? (18)

iTwin
iTwiniTwin
iTwin
 
Abdulkarim 1 and 2
Abdulkarim 1 and 2Abdulkarim 1 and 2
Abdulkarim 1 and 2
 
I twin
I twinI twin
I twin
 
Stuxnet
StuxnetStuxnet
Stuxnet
 
Lecture 4
Lecture 4Lecture 4
Lecture 4
 
I twin technology
I twin technologyI twin technology
I twin technology
 
Ppt embedded systems
Ppt embedded systemsPpt embedded systems
Ppt embedded systems
 
Resume
ResumeResume
Resume
 
An introduction to microcontrollers
An introduction to microcontrollersAn introduction to microcontrollers
An introduction to microcontrollers
 
Unit 3, P1 computer components
Unit 3, P1 computer componentsUnit 3, P1 computer components
Unit 3, P1 computer components
 
Network Security: Protecting SOHO Networks
Network Security: Protecting SOHO NetworksNetwork Security: Protecting SOHO Networks
Network Security: Protecting SOHO Networks
 
Email Security: Alligators In The Swamp
Email Security: Alligators In The SwampEmail Security: Alligators In The Swamp
Email Security: Alligators In The Swamp
 
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEMNetwork Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
 
Wireless Keyboard Threats
Wireless Keyboard ThreatsWireless Keyboard Threats
Wireless Keyboard Threats
 
A PRESENTATION ON Simulation Home automation System using Proteus and Arduino...
A PRESENTATION ON Simulation Home automation System using Proteus and Arduino...A PRESENTATION ON Simulation Home automation System using Proteus and Arduino...
A PRESENTATION ON Simulation Home automation System using Proteus and Arduino...
 
Preatorian Secure partners with Cipher loc - New Encryption Technology
Preatorian Secure partners with Cipher loc -  New Encryption Technology Preatorian Secure partners with Cipher loc -  New Encryption Technology
Preatorian Secure partners with Cipher loc - New Encryption Technology
 
Praetorian secure encryption_services_overview
Praetorian secure encryption_services_overviewPraetorian secure encryption_services_overview
Praetorian secure encryption_services_overview
 
I twin technology
I twin technologyI twin technology
I twin technology
 

Andere mochten auch

Wireless Catalog - Inter. Clouds 2016
Wireless Catalog - Inter. Clouds 2016Wireless Catalog - Inter. Clouds 2016
Wireless Catalog - Inter. Clouds 2016Sharon Cheung
 
2015.10.05 Updated > Network Device Development - Part 1: Switch
2015.10.05 Updated > Network Device Development - Part 1: Switch2015.10.05 Updated > Network Device Development - Part 1: Switch
2015.10.05 Updated > Network Device Development - Part 1: SwitchCheng-Yi Yu
 
Basic Networking Tutorial
Basic Networking TutorialBasic Networking Tutorial
Basic Networking TutorialManpreetgill347
 
1 networking devices 2014
1 networking devices 20141 networking devices 2014
1 networking devices 2014Zuhaib Zaroon
 
Firewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration ReviewFirewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration ReviewChristine MacDonald
 
6 network devices
6 network devices6 network devices
6 network devicesMuuluu
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocolsbarodia_1437
 
difference between hub, bridge, switch and router
difference between hub, bridge, switch and routerdifference between hub, bridge, switch and router
difference between hub, bridge, switch and routerAkmal Cikmat
 
Networking devices
Networking devicesNetworking devices
Networking devicesrupinderj
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devicesRajesh Sadhukha
 

Andere mochten auch (14)

Wireless Catalog - Inter. Clouds 2016
Wireless Catalog - Inter. Clouds 2016Wireless Catalog - Inter. Clouds 2016
Wireless Catalog - Inter. Clouds 2016
 
Networkdevices by Jetarvind kumar madhukar
Networkdevices by Jetarvind kumar madhukarNetworkdevices by Jetarvind kumar madhukar
Networkdevices by Jetarvind kumar madhukar
 
2015.10.05 Updated > Network Device Development - Part 1: Switch
2015.10.05 Updated > Network Device Development - Part 1: Switch2015.10.05 Updated > Network Device Development - Part 1: Switch
2015.10.05 Updated > Network Device Development - Part 1: Switch
 
Basic Networking Tutorial
Basic Networking TutorialBasic Networking Tutorial
Basic Networking Tutorial
 
Managing Network Device Security
Managing Network Device SecurityManaging Network Device Security
Managing Network Device Security
 
1 networking devices 2014
1 networking devices 20141 networking devices 2014
1 networking devices 2014
 
Firewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration ReviewFirewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration Review
 
Network Devices
Network DevicesNetwork Devices
Network Devices
 
6 network devices
6 network devices6 network devices
6 network devices
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocols
 
difference between hub, bridge, switch and router
difference between hub, bridge, switch and routerdifference between hub, bridge, switch and router
difference between hub, bridge, switch and router
 
Ppt of routing protocols
Ppt of routing protocolsPpt of routing protocols
Ppt of routing protocols
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devices
 

Ähnlich wie Final project

Utc summer project by samuel coghlan white (best 1 evr)
Utc summer project by samuel coghlan white (best 1 evr)Utc summer project by samuel coghlan white (best 1 evr)
Utc summer project by samuel coghlan white (best 1 evr)samthking25
 
Care for Network and Computer Hardware L-2 (3).pptx
Care for Network and Computer Hardware     L-2 (3).pptxCare for Network and Computer Hardware     L-2 (3).pptx
Care for Network and Computer Hardware L-2 (3).pptxaytenewbelay1
 
XPDS16: Hypervisor Enforced Data Loss Prevention - Neil Sikka, A1LOGIC
XPDS16: Hypervisor Enforced Data Loss Prevention - Neil Sikka, A1LOGICXPDS16: Hypervisor Enforced Data Loss Prevention - Neil Sikka, A1LOGIC
XPDS16: Hypervisor Enforced Data Loss Prevention - Neil Sikka, A1LOGICThe Linux Foundation
 
Operating system security
Operating system securityOperating system security
Operating system securityRamesh Ogania
 
Windows 7 professional Vs Windows 7 enterprise
Windows 7 professional Vs Windows 7 enterpriseWindows 7 professional Vs Windows 7 enterprise
Windows 7 professional Vs Windows 7 enterprise247infotech
 
2018 FRecure CISSP Mentor Program- Session 4
2018 FRecure CISSP Mentor Program- Session 42018 FRecure CISSP Mentor Program- Session 4
2018 FRecure CISSP Mentor Program- Session 4FRSecure
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11Waqas Ahmed Nawaz
 
Suresh_ System administrator.doc
Suresh_ System administrator.docSuresh_ System administrator.doc
Suresh_ System administrator.docSuresh Annadurai
 
ITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfThangDang53
 
dokumen.tips_comptia-a.ppt
dokumen.tips_comptia-a.pptdokumen.tips_comptia-a.ppt
dokumen.tips_comptia-a.pptApdiazizHussein
 
First Cloud based enterprise Backup & Recovery in India
First Cloud based enterprise Backup & Recovery in IndiaFirst Cloud based enterprise Backup & Recovery in India
First Cloud based enterprise Backup & Recovery in IndiaBlaze Arizanov
 
CNIT 121: 3 Pre-Incident Preparation
CNIT 121: 3 Pre-Incident PreparationCNIT 121: 3 Pre-Incident Preparation
CNIT 121: 3 Pre-Incident PreparationSam Bowne
 
Design computer system group a
Design computer system group aDesign computer system group a
Design computer system group aRaheem Mohamed
 

Ähnlich wie Final project (20)

Utc summer project by samuel coghlan white (best 1 evr)
Utc summer project by samuel coghlan white (best 1 evr)Utc summer project by samuel coghlan white (best 1 evr)
Utc summer project by samuel coghlan white (best 1 evr)
 
Care for Network and Computer Hardware L-2 (3).pptx
Care for Network and Computer Hardware     L-2 (3).pptxCare for Network and Computer Hardware     L-2 (3).pptx
Care for Network and Computer Hardware L-2 (3).pptx
 
Protecting Hosts
Protecting HostsProtecting Hosts
Protecting Hosts
 
XPDS16: Hypervisor Enforced Data Loss Prevention - Neil Sikka, A1LOGIC
XPDS16: Hypervisor Enforced Data Loss Prevention - Neil Sikka, A1LOGICXPDS16: Hypervisor Enforced Data Loss Prevention - Neil Sikka, A1LOGIC
XPDS16: Hypervisor Enforced Data Loss Prevention - Neil Sikka, A1LOGIC
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Encryption
EncryptionEncryption
Encryption
 
Windows 7 professional Vs Windows 7 enterprise
Windows 7 professional Vs Windows 7 enterpriseWindows 7 professional Vs Windows 7 enterprise
Windows 7 professional Vs Windows 7 enterprise
 
Hardware Concepts.ppt
Hardware Concepts.pptHardware Concepts.ppt
Hardware Concepts.ppt
 
2018 FRecure CISSP Mentor Program- Session 4
2018 FRecure CISSP Mentor Program- Session 42018 FRecure CISSP Mentor Program- Session 4
2018 FRecure CISSP Mentor Program- Session 4
 
linux - Google Docs.pdf
linux - Google Docs.pdflinux - Google Docs.pdf
linux - Google Docs.pdf
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
 
Suresh_ System administrator.doc
Suresh_ System administrator.docSuresh_ System administrator.doc
Suresh_ System administrator.doc
 
ITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdf
 
Chapter08
Chapter08Chapter08
Chapter08
 
dokumen.tips_comptia-a.ppt
dokumen.tips_comptia-a.pptdokumen.tips_comptia-a.ppt
dokumen.tips_comptia-a.ppt
 
Ch 2
Ch 2Ch 2
Ch 2
 
First Cloud based enterprise Backup & Recovery in India
First Cloud based enterprise Backup & Recovery in IndiaFirst Cloud based enterprise Backup & Recovery in India
First Cloud based enterprise Backup & Recovery in India
 
CNIT 121: 3 Pre-Incident Preparation
CNIT 121: 3 Pre-Incident PreparationCNIT 121: 3 Pre-Incident Preparation
CNIT 121: 3 Pre-Incident Preparation
 
Design computer system group a
Design computer system group aDesign computer system group a
Design computer system group a
 

Kürzlich hochgeladen

Psychic Reading | Spiritual Guidance – Astro Ganesh Ji
Psychic Reading | Spiritual Guidance – Astro Ganesh JiPsychic Reading | Spiritual Guidance – Astro Ganesh Ji
Psychic Reading | Spiritual Guidance – Astro Ganesh Jiastral oracle
 
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...SOFTTECHHUB
 
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxGo for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxRakhi Bazaar
 
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...Aggregage
 
Fundamentals Welcome and Inclusive DEIB
Fundamentals Welcome and  Inclusive DEIBFundamentals Welcome and  Inclusive DEIB
Fundamentals Welcome and Inclusive DEIBGregory DeShields
 
Technical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamTechnical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamArik Fletcher
 
20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdfChris Skinner
 
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdftrending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdfMintel Group
 
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfGUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfDanny Diep To
 
5-Step Framework to Convert Any Business into a Wealth Generation Machine.pdf
5-Step Framework to Convert Any Business into a Wealth Generation Machine.pdf5-Step Framework to Convert Any Business into a Wealth Generation Machine.pdf
5-Step Framework to Convert Any Business into a Wealth Generation Machine.pdfSherl Simon
 
Entrepreneurial ecosystem- Wider context
Entrepreneurial ecosystem- Wider contextEntrepreneurial ecosystem- Wider context
Entrepreneurial ecosystem- Wider contextP&CO
 
Implementing Exponential Accelerators.pptx
Implementing Exponential Accelerators.pptxImplementing Exponential Accelerators.pptx
Implementing Exponential Accelerators.pptxRich Reba
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...Operational Excellence Consulting
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterJamesConcepcion7
 
Rakhi sets symbolizing the bond of love.pptx
Rakhi sets symbolizing the bond of love.pptxRakhi sets symbolizing the bond of love.pptx
Rakhi sets symbolizing the bond of love.pptxRakhi Bazaar
 
Jewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreJewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreNZSG
 
Interoperability and ecosystems: Assembling the industrial metaverse
Interoperability and ecosystems:  Assembling the industrial metaverseInteroperability and ecosystems:  Assembling the industrial metaverse
Interoperability and ecosystems: Assembling the industrial metaverseSiemens
 
Neha Jhalani Hiranandani: A Guide to Her Life and Career
Neha Jhalani Hiranandani: A Guide to Her Life and CareerNeha Jhalani Hiranandani: A Guide to Her Life and Career
Neha Jhalani Hiranandani: A Guide to Her Life and Careerr98588472
 

Kürzlich hochgeladen (20)

Toyota and Seven Parts Storage Techniques
Toyota and Seven Parts Storage TechniquesToyota and Seven Parts Storage Techniques
Toyota and Seven Parts Storage Techniques
 
Psychic Reading | Spiritual Guidance – Astro Ganesh Ji
Psychic Reading | Spiritual Guidance – Astro Ganesh JiPsychic Reading | Spiritual Guidance – Astro Ganesh Ji
Psychic Reading | Spiritual Guidance – Astro Ganesh Ji
 
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
 
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxGo for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
 
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
 
Fundamentals Welcome and Inclusive DEIB
Fundamentals Welcome and  Inclusive DEIBFundamentals Welcome and  Inclusive DEIB
Fundamentals Welcome and Inclusive DEIB
 
Technical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamTechnical Leaders - Working with the Management Team
Technical Leaders - Working with the Management Team
 
20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf
 
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdftrending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
 
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfGUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
 
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptxThe Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
 
5-Step Framework to Convert Any Business into a Wealth Generation Machine.pdf
5-Step Framework to Convert Any Business into a Wealth Generation Machine.pdf5-Step Framework to Convert Any Business into a Wealth Generation Machine.pdf
5-Step Framework to Convert Any Business into a Wealth Generation Machine.pdf
 
Entrepreneurial ecosystem- Wider context
Entrepreneurial ecosystem- Wider contextEntrepreneurial ecosystem- Wider context
Entrepreneurial ecosystem- Wider context
 
Implementing Exponential Accelerators.pptx
Implementing Exponential Accelerators.pptxImplementing Exponential Accelerators.pptx
Implementing Exponential Accelerators.pptx
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare Newsletter
 
Rakhi sets symbolizing the bond of love.pptx
Rakhi sets symbolizing the bond of love.pptxRakhi sets symbolizing the bond of love.pptx
Rakhi sets symbolizing the bond of love.pptx
 
Jewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreJewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource Centre
 
Interoperability and ecosystems: Assembling the industrial metaverse
Interoperability and ecosystems:  Assembling the industrial metaverseInteroperability and ecosystems:  Assembling the industrial metaverse
Interoperability and ecosystems: Assembling the industrial metaverse
 
Neha Jhalani Hiranandani: A Guide to Her Life and Career
Neha Jhalani Hiranandani: A Guide to Her Life and CareerNeha Jhalani Hiranandani: A Guide to Her Life and Career
Neha Jhalani Hiranandani: A Guide to Her Life and Career
 

Final project

  • 1. Recommendations •Cisco recommends placing the VPN on an inbound port of the firewall. •Remove the switch and router and mount it on a shelf or place it in a closet •Label cabling to simplify troubleshooting •Best solution: place router, switch, back up device, power backup, and file server all in one closet
  • 2. Recommendations Cont. • Hide the SSID on the wireless access point from public view • Ensure that PSK2 with AES and the built-in firewall are enabled • Install a mount in the wire closet for the CSU/ DSU to remove from the floor • Written policy should be created to give guidance for automation security and acceptable use for technology
  • 3. Equipment • Computers: Most work stations contain Power Spec computers. 1 IBM and 1 HP as well. • Printers: Two directly connected printers and a plotter. One printer is a multi-use and is a fax machine as well • Other: Two credit card terminals. Video recording and Security System • Inventory: There is no system in place to track assets (serial numbers or asset tags)
  • 4. Software • OS: Most systems are running Windows 7 Pro, 3 are running XP, XP Home, or XP Pro. Some laptops are using Vista • Anti-Virus: Norton 360 • Other: Microsoft Office, Peach Tree, and an industry specific design program • Licensing: All softwares are licensed and recorded • Maintenance: All are set to automatic updates
  • 5. File Storage • Employees are given a share of a file server • Server is backed up daily on an external hard drive and then to Iron Mountain weekly • Some information is still stored in paper format
  • 6. Email • External email service provided by web host • Google Calendar, synched with Outlook, is used to link the Mason location with parent location
  • 7. Security • Physical: Motion sensors and cameras ran through a cellular service • Logical: Microsoft’s built-in firewall. Router software provides a firewall. Data encryption is not being used.