This website uses cookies to ensure you have the best experience. Learn more

Desktop Technician Essay

1578 words - 7 pages

Quality Web Design

Submitted to:
SE571 Principles of Information Security and Privacy
Submitted: September 21, 2011

Executive Summary
This report was commissioned to inspect and recommend solutions for Quality Web Designs (QWD) hardware equipment and software security concerns. QWD is a small local company concerned about the continual losses of hardware by employees travelling and stationary. The review of software solutions for the company revealed that they were lacking in several areas, the backup and recovery process, as well the lack of an antivirus solution. Hardware solutions were described as weak and require upgrade from the controls at the home and remote offices as well ...view middle of the document...

Laptops connecting from outside the network provide added risk, ample security measures are needed to ensure security is not breached. No antivirus software was noted in either the home or remote offices or in the software inventory. It is well known that virus protection is vital in all aspects of computing. Having a solid antivirus/anti-spam solution would diminish the probability of users local and remotely being infected and protect the network from would be attacks against them. An effective backup/recovery plan would prevent the loss of data from either structure failure or acts of nature and provide the company with a way to continue business while recuperating.

Software Recommended Solutions

Deployment of a VPN firewall that employs packet filtering to allow or disallow the flow of very specific types of network traffic should be put in place. Checkpoint can provide wired and wireless firewall security for the entire enterprise as well as a single office. The Firewall solutions provide comprehensive network security, rapid deployment, and excellent price / performance.

Symantec Backup Exec 2010 delivers reliable backup and recovery designed a growing business. Easily protect more data while you reduce storage and management costs through integrated reduplication and archiving technology. Reduce business downtime, ensure critical information on virtual or physical systems is always protected and restored in seconds.

Data Loss Prevention (DLP) systems identify, monitor, and protect data in use (e.g., endpoint actions), data in motion (e.g., network actions), and data at rest (e.g., data storage), through deep content inspection and contextual security analysis of transactions. The systems are designed to detect and prevent the unauthorized use and transmission of confidential information.

Encryption software should be used to protect the equipment from unwanted plug and play devices. This prevents unwanted data being placed onto media from the equipment owned by the company. The Checkpoint Blade server can protect mobile devices by providing a 100% encryption protection solution that for Hard Disk Drives. The software also protects against data being transferred from devices onto external media (i.e. thumb drives, CD/DVD ROMs).
Product | Purchase price | Life expectancy | Annual maintenance |
VPN Firewall | Included w/blade | 4 years | N/A |
Symantec Backup Software | $550 | 3 years | $300 |
Checkpoint Certification Training | $3000 | N/A | N/A |

Hardware Vulnerability
Keeping the firmware updated on the servers PCs, handheld devices, printers and switches to avoid exploits and vulnerabilities being exposed should be consistent and managed centrally. A hacker could pray on the weakness discovered and put the company at risk by planting viruses or other mischievous worms. The Physical security to keep assets from being misplaced or stolen should be put in place to protect them. There are no safe...

Other Papers Like Desktop Technician

Network Plus Essay

1396 words - 6 pages network device that allows remote users access to a network? a) DNS server b) Content filter c) Load balancer d) VPN concentrator Question 4. Objective: Given a scenario, use the appropriate network monitoring resource to analyze traffic. A technician suspects that a virus has been introduced on the network. Which network resource is BEST used to confirm this problem? a) Syslog b) SNMP c) Network sniffer d) Environmental monitor

Ethical Behavior on Managers Essay

4286 words - 18 pages Electrical Engineer II 16 1 Electrical Engineer I 13 1 Dist. Engineer Technician III 14 4 Subtotal 7 3 Head, Inspection and quality control office 17 1 Dist. Operation and Construction Electrical Engineer II 15 2 Dist. Engineer Technician II 11 4 Subtotal 7 3.1 Inspection and quality control crew Dist. Engineer Technician III 14 1 Customer Care Technician III 11 4 Subtotal 5

Unit 5 Db

759 words - 4 pages building (Westland, 2013). There are many situations that can make using remote management easier to everyone involved. When I used to work at U.S. Xpress Enterprises, we would have our desktop telephones on the computer. On occasion the phones would go out or need a software update and it was easy to send an IT desktop technician an IM to address the problem. From there they could, of course, type in the IP address of the computer and remotely

Computer Laboratory Security System

3875 words - 16 pages the Dona Victoriana building at EDSA corner New York St. also began with electronics courses specializing in radio and television. In 1981, further expansion of the Institute included the offering of the two-year Electronic Computer Technician courses in its Pasay and Cubao schools, thereby earning the distinction of being the first private school in the Philippines to offer such a program. In 1983, IETI opened its fourth school in Kalookan

Information Technology Infrastructure

1022 words - 5 pages systems allow all employees to share this information on a variety of devices like the traditional desktop pc, laptops, and now even to handhelds with the use of what is known as a network link. The IT infrastructure provides the foundation for supporting all the information systems within your business. Technology advances forward at blazing speeds these days and this is where IT systems may find it hard to be competitive by that I mean if the

You Decide

764 words - 4 pages network printers still get all filled up. 3) Current network bandwidth is 10 Mb. 4) The HVAC technician believes it would be really suitable to have wireless access points. 5) Each of the 23 classrooms in the recent wing must be added to the network. 6) Leisurely connections to the remote mail server. 7) Wanting to integrate VoIP into the existing data network and 8) the previous and new wing backbone switches just 120 meters separately are connected

Case Project

1350 words - 6 pages there is no need to consider it a “business risk” when a technician can experiment with it first before applying it on a much grander scale. “Linux…is a freely available multitasking and multiuser operating system. From the outset, Linux was placed under General Public License (GPL). The system can be distributed, used and expanded free of charge.” (Computerhope.com) With an edge in security and cost effectiveness, it makes Linux a more

Defining and Building Networks

1083 words - 5 pages marketplace (intended for the field technician), (CITATION). Significant features consist of quick access how-to videos, often featuring a recognizable trainer that has the ability to convey important information in a clear, optimistic, and concise manner. Within specified limits, call-center employees can quickly access videos from their desktop that will provide specific information to assist customers placed on a brief hold – 90 seconds. On

Computer Maintenance

4510 words - 19 pages computer has new hardware and test that hardware to verify that it is working correctly. Once the memory test is over and the computer reaches a login screen or the desktop of the system the technician has successfully completed a memory install. The removal and installation of a hard drive is a very easy process. First the old hard drive must be removed. You as a technician should make sure the power to the computer is turned off and all of the

Nt1310 Week 4 Assignment

1433 words - 6 pages flexible when installing so incase a technician has to bend it around a wall or at a certain angle to reach it to an end point, the cable can handle it. Also equipment to support copper wiring is relatively inexpensive to run. The weaknesses to copper wiring would be that it is susceptible to electromagnetic inference (EMI) from outside forces and also has a higher rate of corrosion over time by oxidation. Fiber optic cabling is a more expensive

Windows Server Proposal for Worldwide Advertising Inc

2361 words - 10 pages , 2009)  All servers and operating systems will be installed using image files remotely from a master computer through Windows Deployment Services (WDS). Windows Deployment Services role will make the installation of 45 operating systems dramatically faster than sitting behind each console or desktop. Windows Automated Installation Kit (AIK) needed to install Windows System Image Manage (SIM) for answer files, which can be downloaded from the

Related Essays

Computer Forensics Essay

4003 words - 17 pages examination of the booted system using standard Windows tools. Windows Explorer did not show any folders or files of relevance to the case being investigated. Web browser bookmarks also did not point to any Web sites which could be relevant. The Computer Technician then checked what additional software was installed on the investigated system, and discovered on the desktop an icon for the Simple File Shredder (Simple File Shredder, 2006) (see figure 7

Mis 582 Ilab 2 Essay

641 words - 3 pages programming. In addition to the seven technicians, Coastline has one receptionist/bookkeeper. As a small organization, Coastline is an informal, "shirt-sleeve" environment. Everyone is on a first-name basis, even with Peter Charles, the president. Organization Structure Coastline Systems Consulting [pic] Information Systems Facilities PCs Each technician works uses a Dell notebook: o Pentium M class

Civilian Career Outlook Essay

1987 words - 8 pages the military. As such, a number of us have to take a step down; earning less than what our experience would suggest we could. If we play it smart though, we can easily make a place for ourselves in the private sector. Following is what can be expected from a Client Systems Technician, what it takes to be one and the salary one can expect when moving into the private sector. Table of Contents Introduction 2) Education and Training 3) Duties

Official Letter To Ceo Essay

700 words - 3 pages branch office there is a branch manager and a representative for the IT departments. The company provides 01 to 05 employees from the sales department to work full time at the Customer offices. All head quarter employees use Windows 98 desktop computers and the IT department uses Windows NT Workstation 4.0 desktop computers. Lanka Staffing Corporation has 28 Windows NT Server 4.0 computers at headquarters. Lanka staffing corporation would be the