Reference no: EM131310632
CASE PROJECT: LAW FIRM
Company: Law Firm: Lincoln Partners, Esq.
A law firm has hired you as a Network Security Consultant to help its operations by providing a secure network to support its growth. The Law firm currently has offices in Philadelphia, Cherry Hill, Wilmington, Harrisburg and Princeton. Its corporate office out of Philadelphia will provide all of its IT support.
Philadelphia Office is the main corporate office and consists of the following groups
Legal Group
Partners: There are 3 Attorneys that are the principals of the firm.
Associates: There are 10 Associates, attorneys, who work for the firm but do not share in the company profits, and therefore are not partners.
Paralegals: There are 15 Paralegals, who work on a part time basis to support the law firm
Office Manager: One manager who is responsible to support the office and she is responsible to ensure that everything runs smoothly, such as telephone, Fax, Copy, Supplies, Utilities, IT, etc. Also Manages the Cherry Hill Location.
IT Admin: He is responsible for maintaining all of the IT equipment: Internet Services, Telephone Services, Desktops, Servers, Routers and Switches, and Website. Also supports the Cherry Hill location.
Other Offices:
Associates: There are three associates, who help get new clients from other offices and their respective areas.
Paralegal: There is one paralegal to support the associates
IT Background Information
|
Philadelphia
|
Other Offices
|
Servers (Windows )
|
1
|
1
|
Desktops
|
20
|
4
|
Network Printers / Copier / Fax
|
1
|
0
|
Desktop Printers
|
5 - (Partners, Office Manager, IT Admin)
|
4
|
Laptops
|
4
|
0
|
Routers
|
1
|
1
|
Switches
|
1 Main 2 Distributions
|
1
|
Website - Outsourced
|
Outsourced
|
|
Email -
|
Outsourced
|
|
Security Issues: What concerns the partners at this firm
1) Associates and paralegals taking clients / stealing business
2) Not having the ability to monitor business in remote locations
3) Reduce Costs in IT by consolidating
4) Privacy for their clients information
Task 1: Design a Secure Network using either Visio, Paint, Word, etc showing the All locations.
Task 2: Design and provide the IP Scheme for the network
Task 3: Establish a VPN between the All offices and allow the ability to work from home.
Task 4: Allow all employees the ability to access servers at the other locations
Task 5: Show and/or document all necessary security controls and its configuration. And allocate rules (format for rules should be same as attached file 2 )
Task 6: Update the firewalls to ensure security policy is enforced
Task 7: Show the DMZ on the diagram and placement of servers and Eliminate Outsourcing
Additionally, a new database (DB) system has been implemented in the Philadelphia office that is accessible by all locations. The DB holds client data that is confidential, and needs to be properly protected. The DB system also tracks attorney hours and allows the attorneys to charge the right customers. Many attorneys have been issued laptops and now have the ability to VPN from home.
What circumstances should the state increase restrictions
: Should the United States adopt information-control regulations similar to Britain's Official Secrets Act?What are the policy implications of permitting journalists to have the same degree of access to information as occurred during the Vietnam War?
|
Important contributor to incident management process
: Penetration testing is a particularly important contributor to the incident management process. Explain why that is the case, and provide examples of how penetration test results can be used to improve the incident response process.
|
How long can the air freshener provide fragrance
: What is the initial rate of aroma delivery to the surrounding in grams/hour?- How long can the air freshener provide fragrance?
|
How should i handle the given situation
: When confronted, Sarah admitted to the breach of confidentiality. She hasn't made any other mistakes, though, and I really depend on her. How should I handle this situation?
|
Design and provide the ip scheme for the network
: Design a Secure Network using either Visio, Paint, Word, etc showing the All locations. Design and provide the IP Scheme for the network. Establish a VPN between the All offices and allow the ability to work from home
|
Exception error and explain potential implications
: Select a Java program that contains an exception error. The exception error can be one that you have encountered yourself or one you located using the Internet. Describe your chosen exception error and explain potential implications.
|
Design an autoassociator for these patterns
: What response does the network give to the test input pattern, p, shown to the left?
|
How common is the problem
: introduce this topic (i.e., introduce the topic to a casual reader), being sure to present evidence (from the literature) that supports your conclusion that the problem is worthy of concern (How serious is the problem? How common is the problem? ..
|
Identify various threats to the validity of a proposed topic
: In this assignment, you will identify the various threats to the validity of a proposed research topic. The different types of threats to validity and a brief explanation of the threats that are appropriate for your research design.
|