Computer networking and cybersecurity

  Assume you have discovered all of the recent malware spreads through mapped network drives. This organization has a shared common drive (X:). Prevent users from being able to run executable files from the X: drive OR prevent executable files from being able to be saved to the X: drive. Document and screenshot the settings you enable. 8. Review the firewall ACLs. Modify them to take a least privilege approach. Screenshot your ACLs in your report. Here are the items to consider: a. End users need to be able to authentication to Active Directory. b. No servers in the DMZ are domain-members but currently point to DC1 for DNS. c. The SMTP service needs to be accessible on SMTP1 for the company’s email. d. Workstations need to be able to access file shares, FTP and WSUS on App1. e. Workstations need to be able to browse internet websites.

Unlock Your Academic Potential with Our Expert Writers

Embark on a journey of academic success with Legit Writing. Trust us with your first paper and experience the difference of working with world-class writers. Spend less time on essays and more time achieving your goals.

Order Now