IT4070 Unit 3
docx
keyboard_arrow_up
School
Capella University *
*We aren’t endorsed by this school
Course
4070
Subject
Information Systems
Date
Feb 20, 2024
Type
docx
Pages
13
Uploaded by CommodorePenguin2708
Assignment Template
Learner Name: Janie Craig Lab Screenshots and Narrative
Insert and title all lab screenshots in the order they were taken. Briefly describe what you
learned or observed in the lab below each screenshot. Be specific.
[Screenshot section 1, part 1 Step 7
How to locate data in lab files
[Screenshot section 1, part 1Step 12]
1
IT4070 Unit 3
How to locate data in lab files
[Screenshot section 1 part 1 Step 15]
How to locate data in lab files
[Screenshot section 1, part 1 Step 18]
2
IT4070 Unit 3
How to locate data in lab files
Section 1 part 1 step 22
How to locate data with a link
Section 2 part 1 step 2
3
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
IT4070 Unit 3
How to locate data with a link and scrolling to certain information Section 2 part 1 step 3
How to locate data with a link and scrolling to certain information
Section 2 part 1 step college attended by Andrew Symonds went to San Diego State University, worked at Wodash for 13 years, and lives in Addison, Texas. Mike Hutchins profile not available Dee Dasher outside of my network wont let me view but lives in Addison, Texas as well. Section 2 part 1 step 8
4
IT4070 Unit 3
5
IT4070 Unit 3
How to locate a page with certain information Section 2 part 1 step 11
6
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
IT4070 Unit 3
How using additional search engines may assist in locating information needed for topics instead of one specific search engine. Section 2 part 2 step 3? 4
Locating a specific email sent to thunderbird
Section 2 part 2 step 5- 6
7
IT4070 Unit 3
I learned not to click links even if you tell us too.. Section 2 part 2 step 7
No step section 2 part 2 step 7 in this lab
Section 2 part 3 step 3
How to type locate and start nmap
Section 2 part 3 step 12
8
IT4070 Unit 3
How to locate an IP address within it
Section 2 part 3 step 20-21
How to diagnose a webpage
9
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
IT4070 Unit 3
Section 2 part 3 step 25
10
IT4070 Unit 3
Assignment
Reviewing over Anchor Hospitals security it has become vulnerable to unauthorized access as it only has two security guards. One security guard doing foot patrols leaves other areas at risk. Even with an additional security guard watching and communicating with this guard is not enough if it is across the hospital or if both have to go handle a situation no one would be monitoring the cameras, this can risk the hospitals systems as a
whole. As anyone could walk in and access a desktop or alter a system that is used by staff. Outside sourcing these security guards also could put the hospital at risk. A great idea would be to hire and do background checks on the security themselves rather than outside sourcing. As they may try to put their potential gains and access specific information of the hospital, employees, or even patients. As for the IT department it is only 6 people for 1,200 employees. I believe this is not enough as it can risk the systems if someone was improperly trained or either out and the others had to pick up the slack. This can allow them to miss things such as an employee clicking a phising email or baiting to happen within the system. Additional employees and proper training in both departments may assist in potentially less physical security risks and social engineering risks. A non- policy control that may effectively address the vulnerabilities above is proper background checks and proper training. These would be affective as without the proper background checks it can leave the hospital to be vulnerable. It is not just important to do background checks on doctors and nurses. But also IT personnel, security guards, and even janitors. Not properly checking each background can leave the hospital at risk to 11
IT4070 Unit 3
insider threats. Employees trying to gain access or even a disgrunteled employee purposesly putting the company at risk can occur. An additional step would be properly training, if improper training happens, or proper training is not completed it can risk the company to be vulernable. This could be within the IT, security, janitors, or doctors, etc. They should be aware of all policies and procedures they need to take action to. Policy page is down below! 😊
Policy: 12
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
IT4070 Unit 3
1.0 Purpose: This policy is to protect Anchor Hospital and express a social engineering policy. 2.0 Scope: This policy is for all employees or contracted employees to Anchor Hospital. 3.0 Policy: 1.
General : Employees should be given proper procedures and understand what attacks may occur, as it can assist in resolving or limting a risk as quickly as possible. 2.
Employees should contact the proper department if a security risk takes place as well as top management so shareholders can be advised. 3.
Employees should be aware of all risk to clicking emails they are not aware of
where they come from or risks to sharing any and all private information. 4.
Employees should be properly aware of the risk of improperly using email such as signing up to non work websites with the work email, possible password sharing risks, not regularly updating the password as needed . 4.0 Penatilies: Any employee not found following basic policies will be subject to disciplinary actions as needed.
13