NetworkSecurity for a Small Accounting FirmInaddition to the

NetworkSecurity for a Small Accounting FirmInaddition to the owner, who serves as the overall business manager, there areabout 20 people on staff:➢ 10 accountants➢ 3 administrative support specialists➢ 1 vice president➢ 1 financial manager➢ 2 internsThereis also one IT support technician on staff, who has basic computer hardware andnetworking knowledge. He has requested that the firm create a website, hostedinternally, so that new customers can get information about the firm. This willbe important to remember as you complete your final project.Thefirm has a simple network. There are currently 20 computers and twomultipurpose printers. All computers and printers are connected wirelessly to aNETGEAR MR814 device. This router is connected to a Motorola SB3100 cablemodem. Staff e mail accounts are set up through the company’s Internetprovider. Employees use a combination of Microsoft Outlook and standard webbrowsers to access their e-mail. The owner is known to use his personal iPadduring work hours to check and respond to e mail messages.Priorto your hiring, they hired a network cabling contractor to run Cat 6 cablesfrom the central wiring closet to all offices and cubicles. They want to moveaway from using wireless as the primary network connection, but want to keepwireless access for customers coming to the building. The technician who didthe wiring mentioned to your supervisor that he should look into setting up aWindows Server domain to manage user access, instead of the currentpeer-to-peer network. He also recommended that the firm invest in a managedswitch and a firewall, and look into having some backups. The internal ITsupport technician agreed with these recommendations but needs your help toimplement them.You’vebeen asked to assess the current vulnerabilities and provide a recommendationto the firm’s owner on how to better secure the network infrastructure. Nowthat you are aware of the firm’s history, your assessment and recommendationshould provide specifics about the network security settings that must beimplemented and the equipment that must be procured, installed, and configured.The firm’s owner has a basic understanding of computing, so it is importantthat you explain the technical issues in layman’s terms.To getstarted, follow the steps below.VulnerabilitiesAssessment and Recommendation Document (Parts 1-3)OverviewYou will provide a detailedvulnerabilities assessment document, along with some specific recommendationsto implement to address the vulnerabilities you have described. Your proposal will be submittedin three major parts:1.  VulnerabilitiesAssessment2.  NetworkSystem Security Recommendations3.  Application/End-UserSecurity RecommendationsIt should be written using theIEEEcitation style. To learn how you will be assessed on this assignment,please take a moment to review therubric.Use this as a guide while creating yourVulnerabilities Assessment and Recommendation Document (Parts 1-3).1. VulnerabilitiesAssessmentThis section should include areaswhere network security could pose security problems. Explain why thesevulnerabilities could be exploited and what the implications are if they arenot addressed. In this section, you do not need to provide specificrecommendations on how to mitigate these issues.2. NetworkSystem Security RecommendationsThis section should include specific recommendations based on thevulnerabilities identified in previous section. These would include procuringnew equipment or systems, and you should explain why these systems orequipment are needed. Cognizant that the firm only has a NETGEAR wirelessrouter, determine what else is needed. They have Cat 6 cable running from eachwork area to the central wiring closet. But those cables are just hanging fromthe ceiling right now. The technician has recommended implementing a managedswitch, a firewall, and a Windows domain, as well as setting up some backups(note: this could mean many things). Research appropriate equipment and provideguidance on their setup as appropriate for the business.Include anyconfiguration information for the equipment. For example, if you are getting afirewall, what setting(s) from a firewall should be in place for this firm?3. Application/End-UserSecurity RecommendationsThisshould include end-user specific recommendations such as the need for aspecific application on the end-user’s computer or a specific training orbest-practice that the user must employ. Again, explain why these are necessaryand provide the specific configuration information as needed

  1. Start by sharing the instructions of your paper with us  
  2. And then follow the progressive flow.
  3. Have an issue, chat with us now

Regards,

Cathy, CS.