One important thing Advanced Research corporation must do is ensure the company’s network remains active as well as secure. Down time on the network means loss of productivity of its employees since they won’t be able to access network resources when needed.
Recently the company has been attacked in different ways. Attackers have tried to steal intellectual property and sell it to competitors. Advanced Research corporation has been accused of false and unethical research development practices. The public website for Advanced Research corporation has been attacked several times using Denial of Service attacks several times within a 9 month period. We need to ensure that Advanced Research corporation is better prepared against future attacks.
The current infrastructure for Advanced Research corporation is based on 2 sites and as the company grows the possibility of adding more computer hardware rises. Currently the network consists of 58 Windows Servers, 15 Unix servers 2207 Windows client machines and a few other servers for web, database and networking services.
I would like to ensure the network as well as the physical hosts are all locked down as much as they can be while remaining functional. Also ensure that the servers are up to date on patching and security packs.
One tool that can assist in locking down the servers that I would recommend is the Nessus scan ...
... middle of paper ...
...p to $15000 for a 3 year subscription. I would recommend one install per site. One for the Reston Research Facility and one for New York Headquarters. A subscription would be necessary to ensure Nessus can be kept up to date with the plugins to scan against the latest vulnerabilities.
With the recommended tool it would not have much if any effect on the production environment. It would mainly be used to gather information on vulnerabilities that exist and give a way to mitigate them leaving Advanced Research corporation more secure. We can perform the scans during off time hours at night to ensure production is not Affected. We can also control how many hosts or devices we scan at a time which is good in case we saw network speeds drop.
In closing the Nessus Scan tool from Tenable would be a great tool to better secure your network at Advanced Research corporation.
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- The soldiers of that era faced a lot of hardships like severe cold weather, lack of food, lighting struck, deadly diseases, and dirty water. Also, they lacked sufficient clean clothes. Most of them were discouraged and felt like giving up on several occasions. Moreover, the soldiers were confused and frustrated due to shortage of ammunition. During the revolutionary war, soldiers missed home food at the thought of home. But they were even more saddened at the fact that their home was far away . Unfortunately they were already in the field and could not turn back.... [tags: American Revolutionary War, Army, Continental Army]
1520 words (4.3 pages)
- On September 11, the world was riveted by the events of that day. Terrorist invaded our country, killing thousands of innocent people and injuring thousands more. September 11th was a horrible day in our history the terrorist acts of 9/11 showed how unprepared The United State had been as a nation. People wondered, why is this happening. How is it possible that this could happen in America. What can be done so it never happens again. September 11th was the day people understood the concept, that freedom isn’t free.... [tags: Terrorism, September 11 attacks]
1024 words (2.9 pages)
- When someone is asked today what he or she thinks an issue the United States has, more than one comes into mind. We can go on and on about them but the one that really stands out is terrorism. As we have all heard, the Paris attack was unreal and then that followed by the attack that just happened in California. The terrorist attacks are not going to stop if we keep doing nothing about it. We need to continue to keep full body scanners in all U.S. airports, have the power to detain any suspected acts of terrorism, and increase the number of troops over in Afghanistan.... [tags: September 11 attacks, Osama bin Laden, Terrorism]
1031 words (2.9 pages)
- Introduction If we have learned nothing else in recent years, we know that protecting the United States requires a multi-faceted approach to prevention, innovation, and response. In December of 2003, the President issued Homeland Security Directive (HSPD)-8 to establish a federal policy that aims to strengthen our preparedness against many types of emergencies, including terrorist response. Unfortunately, the approach taken by many departments in emergency response is to use examples based upon prior experience, but prior experience leans heavily on natural disasters rather than the unique characteristics of terrorist incidents.... [tags: warr on terror, homeland security]
2011 words (5.7 pages)
- In the beginning of issue guide it summarizes the Terrorist attacks of September 11th. How it sets off of a chain of events and questionable efforts to deal with what occurred that day. The article explains after the attacks on the world trade center, our nation lost comfort in thinking our state of security was actually secure, that we were vulnerable. The government gave a false impression to citizens that to overcome what happened that day was to come together, to show the strength and our allegiance to the U.S.... [tags: Terrorism, September 11 attacks, Al-Qaeda]
1077 words (3.1 pages)
- Remember the tragic events on 9/11/01. What if I told you there was a more powerful and horrifying group out there besides the 9/11 terrorist. There is today a group far more horrendous and powerful than the al-Qaeda group who caused the 9/11 attacks. ISIS is a terrorist organization that is wealthy powerful, deadly, and poses a threat to lives everyday. ISIS is growing as a bigger threat and people need to be informed about them, their culture, their lifestyle, goals, ideas and what they have already done.... [tags: Al-Qaeda, September 11 attacks, Islam]
1323 words (3.8 pages)
- After Japanese victories in the First Sino-Japanese War, the Russo-Japanese War, and World War I, Japanese experience and confidence in military operations began to soar. As early as 1905, Japan had identified the United States as their primary threat and began preparations to win a war against it. Despite Japan’s vast combat experience and military buildup prior to the Pacific War, their prewar preparation was only slightly more robust than the United States and this edge was eaten away by time for three different reasons.... [tags: Japanese History, War, Amphibious warfare]
2590 words (7.4 pages)
- INDEX 1. Introduction 2. Type of Attack in ATM 3. Replay Attack in ATM 4. Counter Measures for Replay Attack :-RIPSEC Protocol 5. References Introduction In present era, with rapid growth of banking and financial system throughout the world.Currently there are more than 730 million Debit/Card circulating throughout the world. Evesdroppers or Cyber-thief comes with new measures/attack to perform fraudulent transactions. It has been very necessary to come up with the proper security measures in ATM transactions so that people and banks do not suffer the monetary effect of fraudulent transactions.... [tags: Replay Attacks]
967 words (2.8 pages)
- Psychic attacks can have a tremendous impact on all aspects of our lives, a psychic attack can undermined our relationships by ripping and tearing apart the very foundation in which we have built our lives upon. I was contacted in March of this year by a young man whose life was gravely impacted and torn apart by a vicious psychic attack. This young man's ordeal started when he approached a psychic that set up shop at a local fair in his hometown, he had never had a psychic reading before and in fact he had often scoffed at the idea of a psychic reading, he probably would've been better off had he never approached this gypsy for a reading.... [tags: Psychic attacks, Psychics,]
2180 words (6.2 pages)
- Within the last decade, the internet has proven to be the most efficient way to complete tasks in today’s society. Every major business in today’s society relies on the internet to conduct business. Though the internet is a useful tool, our reliability on it opens up the door for cyber-attacks that can be detrimental to business as a whole. One example of a cyber-attacks that have recently started becoming more prevalent are DDoS attacks. Recently, DDoS attacks have been a rising issue for businesses owners who run their own servers, such as video game companies and other high profile web servers, including banks and other credit card payment gateways.... [tags: DDoS Attacks, Cyber Terrorism]
627 words (1.8 pages)