Are you pressed for time and haven’t started working on your assignment yet? Would you like to buy an assignment? Use our custom writing services for better grades. Even if your deadline is approaching fast, our writers can handle your task right when you need it. Our writers will complete your order from scratch and make sure it’s completely unique.
Order a Similar Paper Order a Different Paper
This assignment focuses on authentication technologies and protections.
Bering now has employees all across the United States who will need access to the companyâ€™s network and management is concerned that their current use of a username and password is not providing the security necessary to protect their systems.
Beringâ€™s network houses servers that host a customer database, manufacturing blueprints as well as an employee payroll system. These are vital functions for the company to protect; however, customer service representatives need access to the customer database and employees on both manufacturing floors need access to the blueprints.
Note: Employees on the factory floor use a mixture of devices including tablets and laptops â€“ concern regarding chemicals on the workers hands affecting the screens should be taken into consideration when making recommendations.
In this assignment, you are to prepare a presentation for the board of the company with your recommendations to increase security for remote users and manufacturing users. Authentication, authorization and methods of hardening your network MUST be addressed. Please also address intrusion detection and prevention methodologies.
You must present your findings to the executive team and the venture capital group in order to convince the group that your solution is optimal. Please also provide an executive summary at the end of your presentation.
The final deliverable for this project will be a PowerPoint presentation and revised network drawings. Begin by reviewing the company network diagrams provided here:
Next, create a minimum ten (10) slide PowerPoint presentation using this template in which you address the following:
- The assumptions you will need to make in order to identify vulnerabilities and recommend any new authentication equipment/techniques. Your focus should be on authentication methods: two factor authentications, adding directory servers and security devices needed.
- Review the current diagrams and describe how each area is protected or unprotected.
- Describe and explain your recommended techniques to increase security and ensure authentication.
- Discuss how your design successfully supports a remote access policy.
- Revise your Network Diagrams to reflect your recommendations. Consider rearranging the Databases based on what server they are located on and who needs access to what server/database.
- Create bulleted speaking notes for your presentation to the executive board in the notes section of the PowerPoint. Note: You may create or assume any fictitious names, data, or scenarios that have not been established in this assignment for a realistic flow of communication.
- Provide a brief Executive Summary of how your design is meeting the strategic goals of the company outlined in the Course Project Introduction, as applicable.
Notes on submission:
- Insert the Visio diagrams into the body of your power point.
- Use at least three (3) quality resources as references in this assignment. Wikipedia and similar Websites do not qualify as quality resources
- Use professional tone and vocabulary, APA format, and proper spelling and grammar.