Network Case Study
Network Case Study
3. Passwords do not need to be Passwords that do not need to be Implement a password policy
changed changed can be easily guessed or that requires regular changes -
cracked, providing attackers with This is a priority because it
unauthorized access to the helps prevent unauthorized
network. access to the network. Regular
password changes help ensure
that passwords are not easily
guessed or cracked.
4. Guests and employees use Guests and employees using the Separate guest and employee
the same network same network can increase the networks- This is a priority
risk of unauthorized access to because it minimizes the risk of
sensitive information or resources. unauthorized access to
sensitive information. By
separating the networks,
guests cannot access
employee-only resources, and
vice versa.
5. Employee and guest cell Employee and guest cell phones Develop and implement an
phones can access the hotel's accessing the hotel's wireless employee network policy -
wireless network network can increase the risk of This is a priority because it sets
malware infection or unauthorized the foundation for secure
access. network usage by employees.
It outlines what is and isn't
allowed on the network, and
provides guidelines for
password management,
software installation, and
other important security
measures.
6. Firewall software requires Firewall software that requires Implement automatic firewall
manual updates manual updates can lead to updates - This is a priority
outdated protection, leaving the because it ensures that the
network vulnerable to new network is protected against
threats. the latest threats. Automatic
updates help ensure that the
firewall is up-to-date, and can
block new threats as they
emerge.
7. No employee network policy No employee network policy can Develop and implement an
currently exists result in inconsistent security employee network policy -
practices, leaving the network This is a priority because it sets
vulnerable to attack. the foundation for secure
network usage by employees.
It outlines what is and isn't
allowed on the network, and
provides guidelines for
password management,
software installation, and
other important security
measures.
8. Business center computers do Business center computers that do Require passwords for
not require passwords not require passwords can be business center computers-
easily accessed by unauthorized Requiring passwords for
users, leading to data breaches or business center computers
malware infection. prevents unauthorized access
and protects sensitive
information. This ensures that
only authorized individuals can
use the computers and
reduces the risk of data theft.
9. Software installation is Software installation allowed on Implement software
allowed on all computers all computers can lead to restriction policies to prevent
unauthorized or malicious unauthorized software
software being installed on the installation - This is a priority
network. because it limits the risk of
malware infection. By
restricting software
installation, only authorized
software can be installed on
the network.
10. Ability to access the hotel's The ability to access the hotel's Implement firewall rules to
wireless across the street wireless network from across the restrict access - This is a
street can increase the risk of priority because it limits the
unauthorized access or ability of an attacker to gain
interference with the network. access to the network. By
restricting access to the
network, only authorized users
can connect.