Analyze and identify the fundamentals of pki

Assignment Help Computer Networking
Reference no: EM13805217

Assignment: Designing Compliance Within the LAN-to-WAN Domain

Imagine you are an Information Systems Security Officer for a medium-sized technology firm that has two (2) sites (one located in Virginia, and the second in California). Due to the highly sensitive data created, stored, and transported by your organization, the CIO is concerned with implementing proper security controls for the LAN-to-WAN domain. Specifically, the CIO is concerned with the following areas:

  • Protecting data privacy across the WAN
  • Filtering undesirable network traffic from the Internet
  • Filtering traffic to the Internet that does not adhere to the organizational AUP for the Web
  • Having a zone that allows access for anonymous users but aggressively controls information exchange with internal resources
  • Having an area designed to trap attackers in order to monitor attacker activities
  • Allowing a means to monitor network traffic in real time as a means to identify and block unusual activity
  • Hiding internal IP addresses
  • Allowing operating system and application patch management

The CIO has tasked you with proposing a series of hardware and software controls designed to provide security for the LAN-to-WAN domain. The CIO anticipates receiving both a written report and diagram(s) to support your recommendations.

Write a four to six (4-6) page paper in which you:

  1. Suggest a solution for the provided scenario that will:
    1. filter undesirable network traffic from the Internet
    2. filter Web traffic to the Internet that does not adhere to the organizational AUP for the Web
    3. allow for a zone for anonymous users but aggressively controls information exchange with internal resources
    4. allow for an area designed to trap attackers in order to monitor attacker activities
    5. offer a means to monitor network traffic in real time as a means to identify and block unusual activity
    6. hide internal IP addresses

Analyze and identify the fundamentals of PKI in writing and depict graphically using MS Visio or its open source alternative software. Note: The graphically depicted solution is not included in the required page length.

Examine and describe how your solution will protect the privacy of data transmitted across the WAN and why this solution would be effective.

Analyze the requirements necessary to allow for proper operating system and application patch management and describe a solution that would be effective.

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Reference no: EM13805217

Questions Cloud

Write an essay about freedom of speech and religion in us : Write an essay about Freedom of speech and religion in the United States.
How do unjust laws justify readers assertion to break law : From the resistance to Civil Government of The riverside reader. How do unjust laws justify his assertion to break the law?
Risk management and effective communication planning : Assignment: Risk Management and Effective Communication Planning, Imagine that you have been asked to participate as a project manager for a website renovation project for a clothing department store
Which ted talk have you liked the most and why : Which Ted talk have you liked the most and why? How did it "speak" to you and in what ways did it change or enhance your view?
Analyze and identify the fundamentals of pki : Analyze and identify the fundamentals of PKI in writing and depict graphically using MS Visio or its open source alternative software. Note: The graphically depicted solution is not included in the required page length
Training requirements in the hazard communication : Compare and contrast the training requirements in the Hazard Communication Standard (HAZCOM) (1910.1200) and the Lead Standard (1910.1025). If an employee is exposed to lead above the action level, would the training specified in the HAZCOM standa..
The significance of the slope coefficient. : Evaluating and reporting the value of the correlation coefficient (r); report on the statistical significance of the parameter and provide a scatterplot.
Corporate-level and international strategies : To support your work, use your course and text readings and also use outside sources. As in all assignments, cite your sources in your work and provide references for the citations in APA format. Length of this paper should contain a minimum of 40..
How did wal-mart corporation integrate mti and strategy : View the following video: A Brief History of Wal-Mart. Identify aspects of Porter's Five Forces that impacted Wal-Mart. How did Wal-Mart Corporation integrate M.T.I and strategy

Reviews

Write a Review

Computer Networking Questions & Answers

  Configure a network printer on tcpip port

Configure a network printer on TCPIP port 192.168.2.250 with a printer name of Admissions Printer Configure a local printer that is shared as Admissions Color InkJet. Create the folder structure shown below.

  Describe how to configure a switch and router in a 350- to

describe how to configure a switch and router in a 350- to 750-word paper in apa format. be sure to include the

  Find round-trip delay due-speed of light equal transmission

At what data rate does round-trip delay due to speed of light equal transmission delay for 1-KB packet? Suppose speed of light in fibre to be 2/3 speed of light in vacuum.

  Illustrate direct mapping and address bits for tag field

The main memory of a computer is organized as 128 blocks, with a block size of 16 words. The cache has eight block frames. Illustrate direct mapping and address bits that recognize the tag field, the block number, and the word number.

  Ipv6 give operational improvement-increased address space

What are some immediate differences in the two protocols? Does IPv6 provide operational improvement, as well as increased address space?

  Authentication factor utilized by authentication server

which authentication factor is being utilized by authentication server which respond to login request by creating a random number or code.

  Use ios to properly deny icmp in your acl list

You want deny any ICMP traffic to the subnet 192.168.12.0/24 by adding an entry to existing access list 105. This existing ACL ends with a "permit all" entry, so you will add the new entry before that last entry. Use IOS to properly deny icmp in y..

  Explain benefits of providing synchronization tool

Using a FIFO policy, slim reader-writer locks favor neither readers nor writers, nor are waiting threads ordered in a FIFO queue. Explain the benefits of providing such a synchronization tool.

  List the networking and commination devices required

List the networking and commination devices required, including the IP addresses, product numbers, the cost of each and the approximate total cost.

  Attacks on servers on one of company-s departments

After reading about attacks on servers like to ones used in one of company's departments, the CIO has asked you to come up with a report as to what.

  Why is it important to explore traffic behavior

Why is it important to explore traffic behavior when designing a network? What problems could arise if you do not understand traffic behavior when you build a new network or upgrade a network

  In major task you are assumed as a digital forensics

in major task you are assumed as a digital forensics examiner. considering a real or a hypothetical case you are

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd