Free Essay

Nt2580 Unit 10

In:

Submitted By jayman2023
Words 373
Pages 2
Unit 10: Assignment 1.

A company like Microsoft would have to back up everything on the server. Having a full backup is necessary for Microsoft because of the software and tools they provide for computers and for the financial department for payment plans. They would be required to have a full rotation of data. Microsoft would need roughly 15 data sets. They would be required to backup any search history, email history and file history; which will be dependent on the client. The data should be taken offsite on a daily basis. Sometimes, depending on the amount of data being backed up, the data should be taken twice a day for a company so big. If the current set in the server room were to be destroyed, a lot of data would lost (Too much to try and calculate). The most amount of time the server could be down could be at least 24 hours, maybe even longer. The most amount of data that could be saved by paper backup, would be roughly 2%, everything is done electronically now so 2% seems like a fair estimate. To fully restore a server from Microsoft, it could take a few days or a few weeks. Depending on if the company does a Data restore on a daily basis and how much they restore. To test any restore, you would perform a Data Recovery Restore on a daily basis to ensure that the backup restore is functioning properly. The backup media will be tested for corruption. The procedures for testing and verifying the backup media is the same. Do a data restore on a daily basis. If you’re data restore does not work after restoring the rest of the data, try and download it again or gather the information from the data center or another server. The IT Manager is responsible for the backup and restore of any and all information. This is determined by his job title and job description. Usually with a company that does everything electronically, most of the employees do their own backups on their computers before leaving work for the day. But the physical job relies mostly on the IT Manager and the employees that work in the IT Department.

Similar Documents

Premium Essay

Random

...Search Results Nt2580 - College Essays - Hendrome www.termpaperwarehouse.com › Computers and Technology Nov 11, 2012 – Nt2580. Making tradeoffs due to economic scarcity and that every society faces ... For a given set of laboratory services, there is a defined cost. Nt2580 Lab 4 - Term Papers - Jrains www.termpaperwarehouse.com › Computers and Technology Jan 18, 2013 – Nt2580 Lab 4. 1. Define why change control management is relevant to security operations in an organization. Change control is a systematic ... NT2580 Introduction to Network Security stankong.bol.ucla.edu/NT2580/index.htm Welcome to NT2580 Introduction to Network Security ... Home Work , Labs, PowerPoint , Project and Exam Reviews. Fall Quarter 2012 ... Itt tech nt2580 lab 6 - 6 ebooks - free download www.getbookee.org/itt-tech-nt2580-lab-6/ Itt tech nt2580 lab 6 download on GetBookee.org free books and manuals search - 094 ALB 01-09-13 01-09-13 Vol 37-a. Nt2580 unit 9 lab - 4 ebooks - free download www.getbookee.org/nt2580-unit-9-lab/ Nt2580 unit 9 lab download on GetBookee.org free books and manuals search - NT2580 Introduction to If ti S itInformation Security. Nt2580 unit 6 lab - 4 ebooks - free download www.getbookee.org/nt2580-unit-6-lab/ Nt2580 unit 6 lab download on GetBookee.org free books and manuals search - NT2580 Introduction to If ti S itInformation Security. Lab itt edition nt2580 answers - 1 ebooks -...

Words: 435 - Pages: 2

Premium Essay

Test

...Corequisite(s): Prerequisite: NT2580 Introduction to Information Security or equivalent Course Description: This course examines security implementations for a variety of Windows platforms and applications. Areas of study include analysis of the security architecture of Windows systems. Students will identify and examine security risks and apply tools and methods to address security issues in the Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program:    IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA    NT2580 NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110  NT1210 Structure and Introduction to  ComputerLogic Networking    IS3120 IS3110 NT1210 Network  Risk Management in Introduction to General Education / General Studies NT2580 NT2799 Communications ...

Words: 2305 - Pages: 10

Free Essay

Microsoft Remote Desktop Gateway (Rdg)

...3Mokihana Sabang NT2580 Unit 3 10/11/12 Wallace Dear Richman Investments, I am happy to hear that you are looking to expand your company and are currently looking for a remote access policy. One, I think giving your employees the ability to use their company computers from home and when traveling for the business is a great opportunity, I also believe it can be a high risk with nothing in place of security. I purpose that all computers in which has been provided by the company use RDG. Microsoft Remote Desktop Gateway (RDG) * Allows you to log in to your ETSU computer from off-campus * Requires no software installation * Presents a lower security risk * Does not expire (subject to periodic review) With that said there will be rules set for all employees’ in which RDG is to use. 1) All employees will sign a RDG agreement. 2) All employees who will be given a company computer will need to get permission from Vice president. 3) When connect to the company internet/server you must make sure no one else will be on your network. 4) Computers must be up to date with anti-virus and any recommended software. 5) 30 minutes of inactivity, computer will automatically disconnect from the network. 6) Only the Headquarters VP, Presidents, and IT will be able to access any other sites on the network. *(not vice versa) I want to thank you for giving me the opportunity to help you with getting this setup for your company. Feel free...

Words: 263 - Pages: 2

Premium Essay

Nt1230 Syllabus

...network client computers, and related aspects of typical network server functions. Client-Server Networking I Syllabus Where Does This Course Belong? 1st QTR GS1140 NT1110 GS1145 Problem Solving Theory Computer Structure and Logic Strategies for the Technical Professional 2nd QTR NT1210 Introduction to Networking NT1230 Client-Server Networking I MA1210 College Mathematics I 3rd QTR NT1310 NT1330 MA1310 4th QTR PT1420 NT1430 EN1320 5th QTR PT2520 NT2580 EN1420 6th QTR NT2640 NT2670 CO2520 7th QTR NT2799 SP2750 Physical Networking Client-Server Networking II College Mathematics II Introduction to Programming Linux Networking Composition I Database Concepts Introduction to Information Security Composition II IP Networking Email and Web Services Communications Network Systems Administration Capstone Project Group Theory The follow diagram indicates how this course relates to other courses in the NSA program: 1 Date: 8/31/2012 Client-Server Networking I Syllabus NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420...

Words: 1834 - Pages: 8

Free Essay

Unit 2 Assignment 2

...NT2580 Unit 2 Assignment 2 10/1/13 1. The five vulnerabilities that exist for this LAN based workgroup are 2755801, 2501696, 2588513 2639658, 2659883. 2. Yes, the vulnerability that involves privilege elevation is 2639658 (Vulnerability in TrueType Font Parsing), but it is not a high priority. 3. 2719662 Solution: Workarounds refer to a setting or configuration change that does not correct the underlying issue but would help block known attack vectors before a security update is available. Apply the Microsoft Fix it solution that blocks the attack vector for this vulnerability. Disable Sidebar in Group Policy. Disable the Sidebar in the system registry. 2737111 Solution: Workarounds refer to a setting or configuration change that does not correct the underlying issue but would help block known attack vectors before a security update is available. Disable WebReady document view for Exchange. 2755801 Solution: Workaround refers to a setting or configuration change that would help block known attack vectors before you apply the update. Prevent Adobe Flash Player from running. Prevent Adobe Flash Player from running on Internet Explorer 10 through Group Policy on Windows 8 and Windows Server 2012. Prevent Adobe Flash Player from running in Office 2010 on Windows 8 and Windows Server 2012. Prevent ActiveX controls from running in Office 2007 and Office 2010. Set Internet and Local intranet security zone settings to "High" to block ActiveX Controls and Active Scripting...

Words: 257 - Pages: 2

Free Essay

Nt2580 Unit 6 Assign 1

...JO STARNES, NT2580, UNIT 2 CALCULATING THE WINDOW OF VULNERABILITY The window of vulnerability is the amount of time the systems defense measures are compromised, minimized, or eliminated. This is when the system is most likely to be at risk, and can be affected by malicious attacks. It is not stated as what day the server software detected the attack on the SMB server. It only states that it was detected the day before. So from day one, these are the steps we will need to take to get the SMB server back up and running properly and safely, as well as the amount of time it will take for us to solve the issue: Day 1 - The software company will release a patch for this attack in three days. Day 4 – We will receive the patch, and we need to install and test the patch, this will take at least five days. Day 9 – After installation and testing is completed; we will send the update to the entire company’s network devices. As soon as all the updates are sent out to all the devices, they will need to be rebooted in order for the patch to take effect. We can send out a message to all devices to insure this happens. This could take a day or two to complete. This could all be completed as early as 10 days if there are no issues during the process, however problems may arise and it could possibly take a day or two more. I hope that this is helpful and we will start immediately on the problem. It is of upmost importance that you have team members monitoring the server at all times during...

Words: 310 - Pages: 2

Premium Essay

Unit 2 Assignment 1

...10/ 1/ 2014 NT2580 Unit 2 assignment 1 The workgroup consists of three primary workgroups, which contain group membership lists of users within the Active Directory infrastructure that currently exists on the SMB Server that is located within the confines of the LAN structure. The security breach, which is defined as any event that results in a violation of any of the CIA (confidentiality, integrity, availability) security principles, was caused by the SMB server being accessed by an unauthorized user due to a security hole that was detected by the server software manufacturer the previous day. The security patch will not be available until possible as long as three days, but hopefully within that timeframe. In addition, the LAN administrator needs at least one week (minimum) to download, test, and install the patch. To calculate the Window of Vulnerability (WoV) for this security breach, the following timeline will be used as a guideline to determine the basis for calculation: First it is important to understand the variables considered in this timeline formula. The WoV is the period within which defensive measures are reduced, compromised, or lacking. The WoV covers a timeline from the moment vulnerability is discovered and identified by the vendor. It also includes the time taken to create, publish, and finally apply a fix to the vulnerability. It is also important to explore the device(s) that were targeted by the attack. In this instance, being the SMB server within...

Words: 286 - Pages: 2

Free Essay

Information Technology

...Kingstone, Joseph M NT2580 Mr. Lewis Unit 7 Encryption Types 1. (ECC) Elliptic curve cryptography - is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. Elliptic curves are also used in several integer factorization algorithms that have applications in cryptography, such as Lenstra elliptic curve factorization. 2. commonly used encryption and authentication algorithm and is included as part of the Web browsers from Microsoft and Netscape. 3. (3DES) Triple DES - a mode of the DES encryption algorithm that encrypts data three times. Three 64-bit keys are used, instead of one, for an overall key length of 192 bits (the first encryption is encrypted with second key, and the resulting cipher text is again encrypted with a third key). 4. Diffie-Hellman key exchange - is a specific method of exchanging cryptographic keys. It is one of the earliest practical examples of key exchange implemented within the field of cryptography. The Diffie–Hellman key exchange method allows two parties that have no prior knowledge of each other to jointly establish a shared secret key over an insecure communications channel. This key can then be used to encrypt subsequent communications using a symmetric key cipher. 5. International Data Encryption Algorithm (IDEA)- is a block cipher. 6. Data Encryption Standard – Encryption cipher that is a product cipher with a 56bit key consisting of 16 iterations of substitution and transformation. ...

Words: 415 - Pages: 2

Premium Essay

Nt2640

...Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1210 Introduction to Networking or equivalent Course Description: This course explores network design and implementation by applying the TCP/IP protocols to provide connectivity and associated services. Planning and deployment of network addressing structures, as well as router and switch configurations, are also examined. IP Networking Syllabus Where Does This Course Belong? This course is required in the associate degree program in Network Systems Administration and associate degree in Mobile Communications Technology. The following diagrams indicate how this course relates to other courses in respective programs: Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1201 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College Mathematics I MA1310 College Mathematics II Networking Technology Courses Programming Technology Courses General Education/ General Studies 1 Date: 7/18/2011 ...

Words: 2573 - Pages: 11

Premium Essay

Nt 1210

...switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1210 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College Mathematics I MA1310 College Mathematics II Networking Technology Courses Programming...

Words: 4400 - Pages: 18

Premium Essay

Nt2580 Unit 1

...NT2580-M1 Introduction to Information Security Unit 1: Information Systems Security Fundamentals 2015-Summer, 6/20/2015, Saturday (9:00am – 1:30pm) Student Name ___________________________________ Lesson Plan Theory (in class, Lab #2)……………………………..…………………..……...2 Reading  Kim and Solomon, Chapter 1: Information Systems Security. Objectives……………..………………….……………………………….2 Student Assignments for this Unit Unit 1 Lab Perform Reconnaissance & Probing Using ZenMap GUI (Nmap) Lab #1: Performing Network Reconnaissance using Common Tools Overview and access vLab..............................................................................................3 Part 1: Exploring the Tools used in the Virtual Lab Environment……………16 Unit 1 Assignment Match Risks/Threats to Solutions Part 2: Connecting to a Linux Machine …………………. .........................44 Unit 1 Assignment Impact of a Data Classification Standard Part 3: Using Zenmap to Perform Basic Reconnaissance ……………………59 Appendix A. SYLLABUS………………………………………………..……..………….69 B. Forgot your password?………………………………………………..……..73 Instructor: Yingsang “Louis” HO Tel: 425-241-8080 (cell), (206) 244-3300 (school) Email: yho@itt-tech.edu NT2580_2015_Summer_M1_UNIT1.doc Page 1 of 76 Unit 1: Information Systems Security Fundamentals Learning Objective  Explain the concepts of information systems security (ISS) as applied to an IT infrastructure. Key Concepts  Confidentiality, integrity, and availability...

Words: 3379 - Pages: 14

Premium Essay

Nt1210 Introduction to Networking Onsite Course

...switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1210 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College Mathematics I MA1310 College Mathematics II Networking Technology Courses Programming...

Words: 4400 - Pages: 18

Premium Essay

Nothing

...22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1210 Introduction to Networking or equivalent Course Description: This course examines industry standards and practices involving the physical components of networking technologies (such as wiring standards and practices, various media and interconnection components), networking devices and their specifications and functions. Students will practice designing physical network solutions based on appropriate capacity planning and implementing various installation, testing and troubleshooting techniques for a computer network. Where Does This Course Belong? | | | NT2799 | | | | | | | | NSA Capstone | | | | | | | Project | | | | | NT2580 | | | NT2670 | NT2640 | | PT2520 | | Introduction to | | | | | | | | | | | Email and Web | | | | | Information | | | | IP Networking | | Database Concepts | | | | | Services | | | | | Security | | | | | | | | | | | | | | | | NT1330 | | | NT1230 | NT1430 | | PT1420 | | Client-Server | | | Client-Server | | | Introduction to |...

Words: 10839 - Pages: 44