Analyze the requirements necessary to allow for proper os

Assignment Help Computer Networking
Reference no: EM131187473

Assignment: Designing Compliance within the LAN-to-WAN Domain

Note: Review the page requirements and formatting instructions for this assignment closely. Graphically depicted solutions, as well as the standardized formatting requirements, do NOT count toward the overall page length.

Imagine you are an Information Systems Security Officer for a medium-sized financial services firm that has operations in four (4) states (Virginia, Florida, Arizona, and California). Due to the highly sensitive data created, stored, and transported by your organization, the CIO is concerned with implementing proper security controls for the LAN-to-WAN domain. Specifically, the CIO is concerned with the following areas:

• Protecting data privacy across the WAN
• Filtering undesirable network traffic from the Internet
• Filtering the traffic to the Internet that does not adhere to the organizational acceptable use policy (AUP) for the Web
• Having a zone that allows access for anonymous users but aggressively controls information exchange with internal resources • Having an area designed to trap attackers in order to monitor attacker activities
• Allowing a means to monitor network traffic in real time as a means to identify and block unusual activity
• Hiding internal IP addresses
• Allowing operating system and application patch management

The CIO has tasked you with proposing a series of hardware and software controls designed to provide security for the LAN-to-WAN domain. The CIO anticipates receiving both a written report and diagram(s) to support your recommendations.

Write a three to five page paper in which you:

1. Use MS Visio or an open source equivalent to graphically depict a solution for the provided scenario that will:

a. filter undesirable network traffic from the Internet

b. filter Web traffic to the Internet that does not adhere to the organizational AUP for the Web

c. allow for a zone for anonymous users but aggressively controls information exchange with internal resources

d. allow for an area designed to trap attackers in order to monitor attacker activities

e. offer a means to monitor network traffic in real time as a means to identify and block unusual activity

f. hide internal IP addresses

2. Identify the fundamentals of public key infrastructure (PKI).

3. Describe the manner in which your solution will protect the privacy of data transmitted across the WAN.

4. Analyze the requirements necessary to allow for proper operating system and application patch management and describe a solution that would be effective.

5. Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Note: The graphically depicted solution is not included in the required page length.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

• Include charts or diagrams created in Visio or an equivalent such as Dia or OpenOffice. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

The specific course learning outcomes associated with this assignment are:

• Analyze information security systems compliance requirements within the Workstation and LAN Domains.
• Use technology and information resources to research issues in security strategy and policy formation.
• Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions.

Reference no: EM131187473

Questions Cloud

Discuss telemarketing : Discuss telemarketing. - Should marketers be prohibited from using the telephone to solicit prospective customers? Why or why not?
Calculate freds net capital gain for the current year : HI6028 Taxation - Theory, Practice and Law - Calculate Freds net capital gain for the current year. Assume he also has a net capital loss from last year of $10,000 arising from the sale of shares.
How can a caregiver foster secure attachment : What behaviors in children are associated with being insecurely attached: avoidant, disorganized, and resistant? What are the short- and long-term effects of secure attachment?
Identify the key points you want to highlight : Your presentation Should: Identify the key points you want to highlight. Contain a minimum of three slides in the body of the presentation
Analyze the requirements necessary to allow for proper os : Analyze the requirements necessary to allow for proper operating system and application patch management and describe a solution that would be effective.
Propose the conflict management techniques : Propose the conflict management techniques that you believe would be most effective to achieve the desired outcome(s) of your recommendation.
How is moore''s law relevant to programmers : Suppose a transistor on an integrated circuit chip were 2 microns in size. According to Moore's Law, how large would that transistor be in 2 years? How is Moore's law relevant to programmers?
Discuss methods of measuring intellectual functioning : Provide a brief overview of at least two theories of intelligence related to the content of your selected articles to help your audience understand what intelligence testing accomplishes. Discuss methods of measuring intellectual functioning.
Evaluate the pros and cons of sealed bidding contracts : Evaluate the pros and cons of sealed bidding contracts and negotiated contracts, emphasizing which one would be best for this purchase

Reviews

Write a Review

Computer Networking Questions & Answers

  Explain the differences between the database administrator

write a 200- to 300-word short-answer response for the followingdescribe the differences between a database

  Network that covers a large geographic area

A network that covers a large geographic area is most commonly referred to as a(n)

  Define communications including connectivity

Define communications, including connectivity, the wireless revolution, and communication systems. Discuss communication channels, including physical connections and wireless connections.

  Distinguish between lan and wan

Distinguish between local area networks (LANs), wide area networks (WANs), and wireless technologies.

  Which access method is used by ethernet

Calculate the minimum length of time it would take to download a 20MByte document from a workstation to a server across each of the following networks.  This means you will have to convert bytes to bits.

  In the previous unit you learned about the importance of a

in the previous unit you learned about the importance of a well-designed and constructed user experience in the

  Describe how you would design a logistics network

We discussed and reviewed network planning. Describe how you would design a logistics network consisting of only one warehouse. In the discussion, include the steps you need to take in order to design the optimal network

  Create a file manager in linux

Create a file manager in Linux using shell script. It may coverfollowing features:

  What rfc describes the gopher protocol

What RFC describes the Gopher protocol? Print and read the first two pages of the RFC and list and illustrate 5 RFCs that describe the IMAP protocol. Print and read the first two pages of one of these RFCs.

  How rtsp vary from http in-band-out-of-band traffic

Describe how does RTSP vary from HTTP (a) in sustaining client state information; (b) in terms of in-band, out-of-band traffic?

  Research to find professional organization either locally

research to find one professional organization either locally or nationally that you feel will provide you with

  What is the maximum size of the tcp header

What is the maximum size of the TCP header; What is the minimum size of the TCP header?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd