Question: RISK ASSESSMENT LAB Use the information from Chapter 8 in the textbook to complete the following lab. Ensure that you answer all questions and complete
RISK ASSESSMENT LAB Use the information from Chapter 8 in the textbook to complete the following lab. Ensure that you answer all questions and complete the network diagram required below. You are asked to conduct a security audit on a local credit unions network. The credit union currently has two locations, a headquarters office downtown and a branch office on the east side of town. The headquarters has the following equipment: Ten Windows 7 workstations, connected to a Windows Server 2008 file server
Ten Windows 8 workstations, connected to a Windows Server 2008 file server
One Windows Server 2008 RRAS server accessed by home workers after hours
One Windows Server 2008 print server One Linux database server
One Linux Web server for members to check their account balances online
One firewall where the network connects to the credit unions ISP via a T3 dedicated link
The east side office has five Windows 7 workstations, connected to the headquarters office WindowsServer 2008 server through a T1 link. All tape backups are housed in a secure room in the headquarters office, with copies kept in a file cabinet at the east-side office. At the headquarters, the servers reside in a locked room that admits authorized user with an electronic badge access system. Both locations have numerous security cameras, including cameras in the computer room and a backup tape storage vault at the headquarters.The manager also tells you that the credit union has a security policy that all employees are required to read and sign when they become employees. He believes that the network is very secure and asks you if he could do anything else to ensure that the network is safe from security breaches. In response: 1. Create a checklist of items on this network that should be evaluated for security. 2. Sketch a network diagram for the credit union (remember to include connectivity devices
necessary for the LAN and WAN connections).
3. Describe any entry points (physical or data transmission related) or situation that constitute
potential security risks.
4. Explain how the credit union manager could better train his employees to understand
network security.
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
