How JustAnswer Works:

  • Ask an Expert
    Experts are full of valuable knowledge and are ready to help with any question. Credentials confirmed by a Fortune 500 verification firm.
  • Get a Professional Answer
    Via email, text message, or notification as you wait on our site.
    Ask follow up questions if you need to.
  • 100% Satisfaction Guarantee
    Rate the answer you receive.

Ask Steve Herrod Your Own Question

Steve Herrod
Steve Herrod, System Administrator
Category: Networking
Satisfied Customers: 2624
Experience:  Fully conversant with Networking (LAN/WAN) and associated systems (Active Directory/Firewalls etc)
65126503
Type Your Networking Question Here...
Steve Herrod is online now
A new question is answered every 9 seconds

Emerging Technologies Case Study You are a junior staff

Customer Question

Emerging Technologies Case Study

You are a junior staff member assigned to the chief information security officer’s (CISO) team in a major medical center. The medical center’s senior leadership recently reviewed plans for changes to the center’s facilities and found that risks associated with the adoption of several new or emerging technologies had not been addressed. To address this planning gap, the hospital’s chief operating officer (COO) has given the CISO two weeks to provide a quick-look evaluation of the risks associated with two of the planned expansion areas that may pose technology problems:

moving one or more clinical IT support functions (including both fixed and mobile devices for end users) into a grid and/or cloud computing environment

including intelligent building capabilities (sensors, tracking devices, and the associated IT systems) in a new medical office building housing doctor’s offices, clinics, and outpatient services (e.g., labs for blood tests, physical therapy facilities)

For this assignment, research and write a short case study (three pages) using one or more articles from the CISO’s emerging technologies reading list. In your case study, you must discuss one of the listed technology problems (a or b above) and include a discussion of the potential risks associated with the technologies discussed in your chosen article. Your case study must also answer the question, how can these technologies be secured? You have one week to complete your paper.

Remember to cite your sources in APA format and use only authoritative/scholarly sources such as journal articles, books, government documents, and other industry publications (e.g., trade journals or magazines for health care or security professionals). The title page and list of references are not included in the required page count.
Submitted: 2 years ago.
Category: Networking
Expert:  Steve Herrod replied 2 years ago.

Steve Herrod :

Hi, I'll be happy to help with this

Steve Herrod :

when do you need it by?

Steve Herrod :

and how long does it need to be?

Steve Herrod :

Cheers

Steve Herrod :

Steve

Customer:

i need it by next Friday. it needs to be a 3 pages case study. i would like for you to use letter B in the project and i would like for it to be on Klingbeil, L., & Wark, T. (2008). A wireless sensor network for real-time indoor localisation and motion monitoring. Proceedings of the 2008 International Conference on Information Processing in Sensor Networks, 39–50. doi: 10.1109/IPSN.2008.15 which is from the CISO’s emerging technologies reading list

Steve Herrod :

ok

Steve Herrod :

no problem

Steve Herrod :

Just going to send this through shortly

Steve Herrod :

Here is the file

Steve Herrod :

alternative link is here

Steve Herrod :

Cheers

Steve Herrod :

Steve

Steve Herrod, System Administrator
Category: Networking
Satisfied Customers: 2624
Experience: Fully conversant with Networking (LAN/WAN) and associated systems (Active Directory/Firewalls etc)
Steve Herrod and 14 other Networking Specialists are ready to help you
Customer: replied 1 year ago.

Steve are you on line

Expert:  Steve Herrod replied 1 year ago.
Yes, am on line

Cheers

Steve
Customer: replied 1 year ago.

Law and Policy Case Study


Congratulations! You have just been hired by a major security consulting firm that has recently won several contracts to support chief information security officers (CISOs) in the Washington, DC, area. As part of your first consulting assignment, you have been asked to research and write a short case study (three pages) in which you discuss the legal environment (i.e., policies, regulations, and laws) and its impact upon how an organization (e.g., business, government agency, nonprofit) ensures the confidentiality, integrity, and availability of information and information systems. You have one week to complete your assignment.


The immediate audience for your case study is a group of senior managers (stakeholders) in a client organization who are not familiar with information security laws and practices. These managers need a brief overview of the legal environment to assist them in reviewing and commenting upon a new governance policy for their organization’s information security program. Your case study should be general enough, however, that it can be reused with other clients.


Your supervisor has also given you a “heads up” about a trap that previous consultants have missed when completing similar work for other clients: the term policy has two meanings that you must address: (a) government policies (e.g., those issued by federal, state, local, or tribal governments) and (b) organizational policies (e.g., those written to guide an organization’s compliance with laws, regulations, and policies).


Remember to cite your sources in APA format and use only authoritative/scholarly sources such as journal articles, books, government documents, and other industry publications (e.g., trade journals or magazines for health care or security professionals). The title page and list of references are not included in the required page count.

Expert:  Steve Herrod replied 1 year ago.
Thanks - so is this for end of week?

cheers

Steve
Customer: replied 1 year ago.

yes

Expert:  Steve Herrod replied 1 year ago.
No problem - will send an update tomorrow

Cheers

Steve
Customer: replied 1 year ago.

thank you

Expert:  Steve Herrod replied 1 year ago.
No problem!

Cheers

Steve
Expert:  Steve Herrod replied 1 year ago.
Steve Herrod, System Administrator
Category: Networking
Satisfied Customers: 2624
Experience: Fully conversant with Networking (LAN/WAN) and associated systems (Active Directory/Firewalls etc)
Steve Herrod and 14 other Networking Specialists are ready to help you
Expert:  Steve Herrod replied 1 year ago.
Can you let me know you got the Law and Policy Case Study document?

If so, please rate the answer to ensure I am credited and I can remove the files.

Cheers

Steve
Customer: replied 1 year ago.

Information Security White Paper


Watch the Information Technology Security for Small Businesses video from the National Institutes of Standards and Technology (NIST):



Video Transcript (Courtesy of NIST)



Source: National Institute of Standards and Technology (Creator). (2009, September 30). Information technology security for small businesses [Video]. Retrieved from http://csrc.nist.gov/groups/SMA/sbc/library.html#04.


Then write an information security white paper that can be used to market your firm’s security consulting services to small businesses in the Washington, DC, area. Your white paper must:




  • Be concise—no more than three pages long.




  • Provide a general explanation of the business need for information security (protection measures) even in the smallest of businesses (e.g., protect against loss of profit, damage to company’s reputation, costs of litigation, etc.).




  • Explain information security threats and vulnerabilities in plain English to small business owners who, while experts in their own business areas, have limited knowledge of computers, networks, and software.




  • Explain the following key concepts as part of the threats and vulnerabilities discussion:



    • confidentiality

    • integrity

    • availability

    • non-repudiation

    • authentication

    • authorization

    • risk




  • Recommend technologies, processes, and policies that can be used to solve or mitigate one of the following common information security threats:



    • data breach and/or data theft (confidential client information)

    • denial-of-service (DOS) attacks

    • insider theft of intellectual property

    • deliberate corruption of electronic files (hacker attack or malicious insider) including virus/worm infections




  • Discuss the impact or results that can be expected:



    • costs and benefits of effective protection measures

    • costs and penalties of ineffective or nonexistent protection measures




Remember to present your white paper and cite your sources in APA format and use only authoritative/scholarly sources such as journal articles, books, government documents, and other industry publications (e.g., trade journals or magazines for health care or security professionals). The title page and list of references are not included in the required page count.

Expert:  Steve Herrod replied 1 year ago.
Hi Robert,

When would you need this by?

cheers

Steve
Customer: replied 1 year ago.

by friday will be good

Expert:  Steve Herrod replied 1 year ago.
Thanks - shouldn't be a problem, also what is the page count for this?

Cheers

Steve
Expert:  Steve Herrod replied 1 year ago.
Here is the document

http://www.mediafire.com/view/?bd95yz9j6pmdw3v


Cheers

Steve
Expert:  Steve Herrod replied 1 year ago.
Let me know once you've downloaded the document

Cheers

Steve
Expert:  Steve Herrod replied 1 year ago.
Can you let me know if you got the document ok?

cheers

Steve
Steve Herrod, System Administrator
Category: Networking
Satisfied Customers: 2624
Experience: Fully conversant with Networking (LAN/WAN) and associated systems (Active Directory/Firewalls etc)
Steve Herrod and 14 other Networking Specialists are ready to help you
Customer: replied 1 year ago.

Steve are you online


 

Expert:  Steve Herrod replied 1 year ago.
Yes - be offline for next 60 minutes or so but let me know how I can help

Cheers

Steve
Customer: replied 1 year ago.

Steve, this next project is a group project. when i send you the description of this project, i only have to do two parts of the project. i am doing the project on Equifax credit company. the two parts i have to do is Physical Security Management and Network Security Management. i only have to do either a half page or one page of each one and i also have to do a PowerPoint of those to subjects. after i send you this message i will send the description. i need this by Tuesday if possible. if you have any question let me know.

Customer: replied 1 year ago.

Group Project: Develop an Organization-Level Information Security Program


Your security consulting firm has been retained by an insurance company to help it develop and implement a risk reduction program for companies purchasing cybersecurity liability insurance. The next task on this multi-year contract is to develop a set of program plans for organization-level information security programs for small businesses (i.e., up to 100 employees, no more than five offices / work locations). These documents must be tailored to specific industries and, due to the high percentage of Internet-based businesses seeking cybersecurity insurance, must address state, federal, and international laws, regulations, and standards.




  1. To begin this assignment, your team (group) must select one industry or business type from the list below, which links out to the U.S. Small Business Administration website, http://www.sba.gov. (If you wish to use an industry or business type not in this list you must first obtain permission from your instructor.)





  2. Next, read Information Security Program Background Information and Concepts.




  3. Investigate how businesses in your selected industry use information technology to do business. Research your industry using the UMUC library and the Internet. As a starting point use the business guides found at http://www.sba.gov/category/navigation-structure/starting-managing-business/managing-business/business-guides-industry.




  4. As a team, complete the information security program requirements gathering and analysis exercise using the provided worksheet.




  5. Finally, each team (group) is to write and submit a five- to eight-page organization-level information security program plan, tailored to your chosen industry or type of business, using information from your completed worksheet. Use the outline provided below as a guide for writing your program plan. Organization-level information security program plans describe/specify the required organization and management structures (people and processes) as well as the technologies used to implement required information security protections and countermeasures.




Outline: Information Security Program Plan



  1. Introduction

  2. Security Policy and Planning

  3. Personnel Management

  4. Physical Security Management

  5. Data Security Management

  6. Software Security Management

  7. Hardware Security Management

  8. Network Security Management

  9. Business Continuity / Disaster Recovery

  10. Incident Reporting and Management

Expert:  Steve Herrod replied 1 year ago.
No problem - will have that with you by Tuesday

Cheers

Steve
Expert:  Steve Herrod replied 1 year ago.
Steve Herrod, System Administrator
Category: Networking
Satisfied Customers: 2624
Experience: Fully conversant with Networking (LAN/WAN) and associated systems (Active Directory/Firewalls etc)
Steve Herrod and 14 other Networking Specialists are ready to help you
Customer: replied 1 year ago.

Individual Project: Technology Evaluation and Recommendation


A new client of your security consulting firm is worried about the potential for data leaks that could expose it to financial losses as well as a damaged reputation. The client recently read a front-page story about a negligence lawsuit arising out of a data leak that exposed confidential client information. The source of the data leak was a peer-to-peer file sharing application that had been installed on an employee’s desktop computer. An initial quick-look security assessment found that your client’s concerns were well founded. At least one department (Marketing) was using a similar peer-to-peer file-sharing application to distribute promotional videos and audio podcasts to potential customers. Your team leader has asked you to prepare a short technology evaluation paper (deliverable) in which you address one of the problem areas (a or b) identified in the quick-look assessment:




  1. Data: Identify and provide an assessment of the risks associated with collection, processing, and storage of confidential client information (loss of confidentiality).




  2. Software: Identify and provide an assessment of the risks associated with unauthorized installation of file-sharing software on company computers, including servers, desktops, and laptops (loss of system integrity).




Use the provided matrix to categorize and assess the risks associated with your chosen option (a or b). Then research and evaluate three or more technology-based solutions that could provide effective protection measures. Use one row per technology solution.


Your technology evaluation paper must begin with an executive summary followed by your technology evaluation matrix. The executive summary should provide an overview of your risk assessment and evaluation. It should also provide additional information to help the client understand your recommended solution. Your summary should be concise—approximately three pages long—and include the following elements:




  • an explanation of the information security threats (risks) and vulnerabilities (in plain English) associated with your selected option (a or b)




  • a comparison (compare/contrast) of the capabilities and weaknesses of the candidate technology-based solutions




  • a recommendation of the best fit technology-based solution to solve/mitigate the problem(s) associated with your selected option




Remember to present your findings and cite your sources in APA format and use only authoritative/scholarly sources such as journal articles, books, government documents, and other industry publications (e.g., trade journals or magazines for health care or security professionals). The title page and list of references are not included in the required page count.

Customer: replied 1 year ago.

Can you please do letter B and can you please fill out the Matrix that is dealing with the project. i need it by Friday if possible, if not Monday is good. Thank you.

Expert:  Steve Herrod replied 1 year ago.
Yes, no problem - with you by Friday

Cheers

Steve
Expert:  Steve Herrod replied 1 year ago.
Steve Herrod, System Administrator
Category: Networking
Satisfied Customers: 2624
Experience: Fully conversant with Networking (LAN/WAN) and associated systems (Active Directory/Firewalls etc)
Steve Herrod and 14 other Networking Specialists are ready to help you
Customer: replied 1 year ago.

  • Using the GDI Case Study, create the security policy document.

  • The security policy document must be 8 to 10 pages long, conforming to APA standards. See "Writing Guideline" in WebTycho where you'll find help on writing for research projects.

  • At least three authoritative, outside references are required (anonymous authors or web pages are not acceptable). These should be listed on the last page titled "References."

  • Appropriate citations are required. See the syllabus regarding plagiarism policies.

  • This will be graded on quality of research topic, quality of paper information, use of citations, grammar and sentence structure, and creativity.

  • The paper is due during Week 7 of this course.
















Grading Rubrics



























































Final Deliverable


Category


Points


%


Description


Documentation and Formatting


10


10%


Appropriate APA citations/referenced sources and formats of characters/content.


Case Study Security Policy Analysis


25


25%


Accurate Completion of Security Policy.


Real-time Security


25


25


Real-time Security Protection against dynamically changing threats.


Continuous Monitoring


25


25


Continuous Monitoring for up-to-date Asset Management and Security Posture


Executive Summary


15


15%


Provide an appropriate summary of the Security Policy Document.


Total


100


100%


A quality paper will meet or exceed all of the above requirements.





















































Criteria


Good


Fair


Poor


Documentation and formatting


7-10 points








At least 3 Appropriate APA citations/referenced sources and formats of characters/ content.



3-6 points

Included 3 references but incorrect formatting or referencing/ citation


0-2 points

Does not include at least 3 references


Security Policy analysis


17-25 points








Effectively describes the security policy in a manner that will allow the Senior Management to understand the organizational security requirements and make the appropriate decisions to enforce.

Analysis is supported with documentation and evidence.



8-16 points

Describes the security policy in a manner that allows the Senior Management to understand the organizational security requirements but not enough to make the appropriate decisions to enforce. And/or is not sufficiently supported with documentation and evidence. And/or the description is somewhat unclear.


0-7 points

Describes the security policy in a manner that is unclear to the Senior Management. The analysis Is not sufficiently supported with documentation and evidence. Senior management would not have enough detail to make appropriate decisions.


Real-time Security


17-25 points

Effectively designs real-time security measures to mitigate any known vulnerabilities, prevent attacks, and deter any real-time threats; and also efficiently meets the organization’s objectives.


8-16 points

Designs technically feasible real-time security measures to mitigate any known vulnerabilities, prevent attacks, and deter any real-time threats, but lacks efficiency to meet the organization’s objectives.


0-7 points

Ineffectively designs real-time security measures to mitigate any known vulnerabilities, prevent attacks, and deter any real-time threats; also lacks efficiency to meet the organization’s objectives.


Continuous Monitoring


17-25 points

Effectively designs continuous monitoring measures to mitigate any unknown vulnerabilities, prevent future attacks, and deter any real-time unknown threats; and also efficiently meets the organization’s objectives.


8-16 points

Designs technically feasible continuous monitoring measures to mitigate any unknown vulnerabilities, prevent future attacks, and deter any real-time unknown threats, but lacks efficiency to meet the organization’s objectives.


0-7 points

Ineffectively designs continuous monitoring measures to mitigate any unknown vulnerabilities, prevent future attacks, and deter any real-time unknown threats; also lacks efficiency to meet the organization’s objectives.


Executive summary


11-15 points








Effectively summarizes the security policy analysis. Includes all key points of the analysis and allows the senior management to understand the organizational security requirements but not enough to make appropriate decisions

.



6-10 points

Describes the security policy analysis in a manner that allows the Senior Management to understand the organizational security requirements but not enough to make appropriate decisions. Key information is left out or not made clear.


0-5 points

Describes the security policy analysis in a manner that is unclear and/or insufficient. Summary is difficult to follow or does not include key information and details.





Background

For those that are not familiar with the term, this project is called an Authentic Assessment Project. These projects are designed to reflect “real life” activities and will require you to perform considerable self-directed study. Like real life problems, you will not find all the answers you need in the textbook. You will, however, have the help of your instructor to resolve issues you may encounter.


Project Description


The project is to write a company Security Policy Document for a fictitious company called Global Distribution, Inc. (GDI). A Security Policy Document is an absolutely essential item for any organization that is subjected to a security audit. Lack of such a document will result in an automatic failed audit. A Security Policy Document within an organization provides a high-level description of the various security controls the organization will use to protect its information and assets. A typical Security Policy Document contains a large set of specific policies and can run several hundred pages. However, for this project, you will write a brief document with a maximum of 20 specific policies for the GDI Company. Therefore, you must carefully consider and select only the most important policies from hundreds of possible specific policies. A brief description of the GDI Company is given below.


You will work individually on this project for a total of 25% of your grading for the course. You may collaborate with your classmates to share ideas and activities in preparation of the final project deliverable. However, you will be graded for your individual effort and deliverables, and you will submit the project in your individual project assignment folders. You will treat this project deliverable as if you would deliver it to your own customer or client who will be paying you for the deliverables.


Suggested Approach


These are only recommendations on the general approach you might take for this project. This is your project to develop individually.


  1. Determine the most important assets of the company, which must be protected

  2. Determine a general security architecture for the company

  3. Determine the real-time security measures that must be put in place

  4. Determine the monitoring and preventative measures that must be put in place

  5. Develop a list of 15 to 20 specific policies that could be applied along with details and rationale for each policy

  6. Integrate and write up the final version of the Security Policy Document for submittal



The GDI company description is deliberately brief. In all real life projects, you typically add complexity as you become smarter as you go along. State the assumptions/rationale you make to justify the selection of the particular security policies you select. Attach the assumptions/rationale to each specific security policy.


References

There are many information sources for Security Policy Documents on the Internet. However, one good source to start with is the SANS Security Policy Projectthat lists many example security policy templates.



Company Description

Global Distribution, Inc. (GDI)

Global Distribution, Inc. (GDI) is a distribution company that manages thousands of accounts across Canada, the United States, and Mexico. A public company traded on the NYSE, GDI specializes in supply chain management and in coordinating the warehousing, staging, distribution, transportation, and wholesaler/VAR relationship for their customers.

GDI employs over 3,200 employees and has been experiencing consistent growth keeping pace with S&P averages (approximately 8%) for nearly six years. A well-honed management strategy built on scaling operational performance through automation and technological innovation has propelled the company into the big leagues; GDI was only recently profiled in Fortune Magazine.

The executive management team of GDI:


BACKGROUND AND YOUR ROLE

You are the Computer Security Program Manager (CSPM) educated, trained, and hired to protect the physical and operational security of GDI’s corporate information system.

You were hired by COO Don Jacobson and currently report to the COO. You are responsible for a $7.25m annual budget, a staff of 17, and a sprawling and expansive data center located on the 9th floor of the corporate tower. This position is the pinnacle of your career – you are counting on your performance here to pave the way into a more strategic leadership position in IT, filling a vacancy that you feel is so significantly lacking from the executive team.

There is actually a reason for this. CEO Jamie Pierce believes that the IT problem is a known quantity – that is, she feels the IT function can be nearly entirely outsourced at fractions of the cost associated with creating and maintaining an established internal IT department; the CEO’s strategy has been to prevent IT from becoming a core competency since so many services can be obtained from 3rd parties. Since the CEO has taken the reigns two years ago, the CEO has made significant headway in cutting your department’s budget by 30% and reducing half of your staff through outsourcing. This has been a political fight for you: maintaining and reinforcing the relevance of an internal IT department is a constant struggle. COO Jacobson’s act of hiring you was, in fact, an act of desperation: the increasing operational dependence on technology combined with a diminishing IT footprint gravely concerned Jacobson, and he begged to at least bring in a manager to whom these obligations could be delegated to. Jacobson’s worst nightmare is a situation where the Confidentiality, Integrity, and Availability of the information system was compromised – bringing the company to its knees – then having to rely on vendors to pull him out of the mess.

There’s no question that the company’s CEO sees the strategic importance of technology in executing her business plan, and in this way you share a common basis of principle with her: that IT is a competitive differentiator. However, you believe that diminishing internal IT services risks security and strategic capability, whereas the CEO feels she can acquire that capability immediately and on the cheap through the open market. You’re told that CEO Pierce reluctantly agreed to your position if only to pacify COO Jacobson’s concerns.

CORPORATE OFFICE NETWORK TOPOLOGY

You are responsible for a corporate WAN spanning 81 remote facilities (warehouses) and interconnecting those facilities to the central data processing environment. Data is transmitted from suppliers and customers through an FTP bridgehead server situated in the DMZ; files are encrypted and copied to the FTP server through automated replication; remote automation or users connect with the FTP server to transmit or receive encrypted EDI files.

A bulk of the data processing for your company is handled by twin IBM System/390 mainframes; all GL and financial functions are located on the mainframe platform; a microcomputer cluster manages email routing, file storage functions, HRIS, and other value-added applications; an application-layer proxy server serves as the central gateway for Internet connectivity for the corporate office and 81 remote sites – a strict philosophy of control, centralization, and outsourced services has guided much of the design of this network; GDI’ web server and e-commerce functions are hosted by an external party outside of the scope of this topology.

OTHER CONSIDERATIONS

1. Ever since the article ran in Fortune about GDI, your network engineers report that they’ve noted a significant spike in network traffic crossing into the DMZ. They report that they cannot be certain what or who is generating this traffic, but the volume and frequency of traffic is certainly abnormal.

2. Increasingly, GDI’s CEO Pierce attempts to outsource IT competency. In fact, you’ve been told of a plan from COO Jacobson to outsource network management functions away from your department and to a service integrator. COO Jacobson warns you that the political environment will only become more contentious over time; you must make a compelling case as to what value your department can bring over an integrator that can provide services at 40% less annual cost than you.

3. The interrelationship between data and operations concerns you. Increasingly, some of the 81 warehouses have been reporting significant problems with network latency, slow performance, and application time-outs against the System/390’s. The company’s business model is driving higher and higher demand for data, but your capability to respond to these problems are drastically limited.
Expert:  Steve Herrod replied 1 year ago.
Hi,

No problem on completing this one but it will need to be asked as a new question - can you request me either by putting 'For Steve Herrod' in the subject or using this link?

http://www.justanswer.com/homework/expert-steveherrod/

Also - let me know the due date etc.

Cheers

Steve
Customer: replied 1 year ago.

Steve, I tried to put it in as a new question, but the question is to long and all the question will not fit in the box that is provided. I need this answer by March 1,2013

Expert:  Steve Herrod replied 1 year ago.
Ok, no problem - I can complete it for then. If you can ask a new question and just put in the question box 'GDI Security Policy' thatwill be great.

Cheers

Steve
Customer: replied 1 year ago.

I put the GDI Security Policy in the question box with your name in the subject.

Expert:  Steve Herrod replied 1 year ago.
Thanks - got it!

Cheers

Steve

JustAnswer in the News:

 
 
 
Ask-a-doc Web sites: If you've got a quick question, you can try to get an answer from sites that say they have various specialists on hand to give quick answers... Justanswer.com.
JustAnswer.com...has seen a spike since October in legal questions from readers about layoffs, unemployment and severance.
Web sites like justanswer.com/legal
...leave nothing to chance.
Traffic on JustAnswer rose 14 percent...and had nearly 400,000 page views in 30 days...inquiries related to stress, high blood pressure, drinking and heart pain jumped 33 percent.
Tory Johnson, GMA Workplace Contributor, discusses work-from-home jobs, such as JustAnswer in which verified Experts answer people’s questions.
I will tell you that...the things you have to go through to be an Expert are quite rigorous.
 
 
 

What Customers are Saying:

 
 
 
  • I am very happy with my very fast response. Eric is very knowledgeable in the subject area. Thank you! RP Austin, TX
< Last | Next >
  • I am very happy with my very fast response. Eric is very knowledgeable in the subject area. Thank you! RP Austin, TX
  • My Expert answered my question promptly and he resolved the issue totally. This is a great service. I am so glad I found it I will definitely use the service again if needed. One Happy Customer New York
  • Wonderful service, prompt, efficient, and accurate. Couldn't have asked for more. I cannot thank you enough for your help. Mary C. Freshfield, Liverpool, UK
  • This expert is wonderful. They truly know what they are talking about, and they actually care about you. They really helped put my nerves at ease. Thank you so much!!!! Alex Los Angeles, CA
  • Thank you for all your help. It is nice to know that this service is here for people like myself, who need answers fast and are not sure who to consult. GP Hesperia, CA
  • I couldn't be more satisfied! This is the site I will always come to when I need a second opinion. Justin Kernersville, NC
  • Just let me say that this encounter has been entirely professional and most helpful. I liked that I could ask additional questions and get answered in a very short turn around. Esther Woodstock, NY
 
 
 

Meet The Experts:

 
 
 
  • James

    Sr. Network Administrator

    Satisfied Customers:

    1711
    Highly experienced with wireless networks and wireless equipment, LAN and networking protocols
< Last | Next >
  • http://ww2.justanswer.com/uploads/BA/barrenrock/2011-10-19_215925_JamesJAFinal.64x64.jpg James's Avatar

    James

    Sr. Network Administrator

    Satisfied Customers:

    1711
    Highly experienced with wireless networks and wireless equipment, LAN and networking protocols
  • http://ww2.justanswer.com/uploads/Claws224/2009-07-07_063935_Dork_Portrait.JPG Claws224's Avatar

    Claws224

    IEEE Network Engineer

    Satisfied Customers:

    1256
    IEEE, Microsoft
  • http://ww2.justanswer.com/uploads/KN/knelly74/2011-4-14_215651_kevin.64x64.jpg Kevin's Avatar

    Kevin

    LAN/WAN Specialist

    Satisfied Customers:

    1165
    Certified MCSA and MCP Network Administrator with over 20 years of PC experience.
  • http://ww2.justanswer.com/uploads/tealnet/2009-09-26_000218_headshot_64.jpg Eric K.'s Avatar

    Eric K.

    Network Administrator

    Satisfied Customers:

    510
    13 years of desktop, server and network support experience
  • http://ww2.justanswer.com/uploads/CL/clagesolutions/2012-6-27_145545_20120608Geoff.64x64.jpg Mr. Clark's Avatar

    Mr. Clark

    Network Engineer

    Satisfied Customers:

    510
    Computer Business Owner / Former DoD Network Specialist
  • http://ww2.justanswer.com/uploads/MA/matthewpj73/2012-1-20_18729_TWO.64x64.jpg Matthew J's Avatar

    Matthew J

    Computer Support Specialist

    Satisfied Customers:

    397
    12+ yrs computer diagnosis/repair, network infrastructure install and support, IT Administration
  • http://ww2.justanswer.com/uploads/SE/Seashore2011/2011-12-6_33418_111205223015.64x64.jpg Chris L.'s Avatar

    Chris L.

    Support Specialist

    Satisfied Customers:

    384
    Certified Networking expert with over 10 years experience.
 
 
 
Chat Now With A Network Technician
Steve Herrod
Steve Herrod
Network Technician
2624 Satisfied Customers
Fully conversant with Networking (LAN/WAN) and associated systems (Active Directory/Firewalls etc)