100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
TM256 Cyber Security TMA3 £10.48
Add to cart

Essay

TM256 Cyber Security TMA3

 0 purchase

TM256 Cyber Security TMA3

Preview 2 out of 14  pages

  • September 2, 2023
  • 14
  • 2023/2024
  • Essay
  • Unknown
  • A+
All documents for this subject (2)
avatar-seller
Rekah
Module: Cyber Security TM256-23B
Assignment: TMA03

, Question One
a.
Three steps that could have been taken by the IT manager to prevent the network
infrastructure from being compromised are:


1. Endpoint security/antivirus software: a line of defense that could have been taken
to bolster the college's network security would have been the installation of a
comprehensive endpoint security solution and antivirus software. These security
measures would contain essential features such as real-time scanning, virus
detection and proactive procedures. With regular updates, the anti-virus software
would have lowered the possibility of a virus on a student’s laptop from spreading
onto the network. Endpoint security and antivirus software is a defense barrier
against unauthorised access, with regular scans, alerts and blocking of malicious
websites and downloads, automatic updates to shield endpoints from the latest
threats and the ability to identify various types of malware (Trellix, 2023).


2. Network Access Control (NAC): by introducing network access control to the
network, the IT manager could have prevented unauthorized or unsafe devices from
connecting to the network. NAC enforce stringent access controls that include device
registration, security checks and endpoint validation. A network access control
ensures that only authorised devices can access the network by implementing
switches, firewalls and wireless access points (Cyborg security, 2023).



3. VLANs and Network Segmentation: Through the implementation of network
segmentation and VLANs (Virtual Local Area Networks), specific sections of the
network can be isolated, creating separate zones or subnets for users such as
students, teachers and guests. This strategic approach, overseen by the IT manager
will effectively minimize the potential impact of a security breach as the network is
divided. The use of access controls and firewall rule restricts communication between
the various segments thereby preventing the spread of a virus or malware from
infecting the entire network (Cisco, 2023).

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Rekah. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for £10.48. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

67479 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy revision notes and other study material for 15 years now

Start selling
£10.48
  • (0)
Add to cart
Added