Firewalls and risk management

Assignment Help Management Information Sys
Reference no: EM13764568

Firewalls and Risk Management

Firewalls are evolving into more sophisticated and advanced devices. Imagine you are working for a midsized organization whose 250 employees are located both remotely and in the corporate office in the U.S. The company specializes in providing multilanguage support for government agencies around the world.

For more information about firewall design, go to Cisco's Website, located at https://www.cisco.com/, and search for keyword: Firewall Design.

Write a four (4) page paper in which you:

1. Describe the main features and functions for three (3) of the latest series of firewalls and identify the potential weaknesses of each firewall.

2. Choose a firewall for your theoretical organization and provide a rationale for choosing this firewall.

3. Explain how you would optimize the implementation of the firewall you chose.

4. Identify three (3) foreseen problems and three (3) foreseen risks associated with the implementation of your selected firewall. Suggest strategies to solve the problems and mitigate the risks.

5. Describe how the different types of firewalls fit into a risk management approach within an organization. Determine the common risks that firewalls prevent or mitigate as well as the risks they do not prevent or mitigate.

6. Use the provided scenario to create a diagram depicting a network and firewall design, including a DMZ for your organization, using Microsoft Visio

Note: The graphically depicted solution is not included in the required page length.

7. Use at least four (4) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Reference no: EM13764568

Questions Cloud

Question regarding the enterprise resource planning : Reflect on the readings for this module as well as those from previous modules when you consider this module's discussion question. In your response, take into account the time constraints on modern businesses in terms of time to market and demand..
Social force that could be useful to guide the decision : Include any social force(s) that could be useful to guide the decision. Outline major philosophical arguments of the U.S. Supreme Court in such cases as Weeks v. United States and Mapp v. Ohio
The rise and fall of eastman kodak : Review Case "The rise and fall of Eastman Kodak: Will it survive beyond 2012?" located in the textbook. Assume that you have been hired by Kodak as a business consultant to recommend a new corporate-level strategy for the company to improve declin..
What happened to megs father : In the story "A wrinkle in time" by Madeleine L'Engle what happened to Meg's father? What does Mrs. Who say about Meg's father? How does meg feel about the townspeople's gossip with regard to her father?
Firewalls and risk management : Firewalls are evolving into more sophisticated and advanced devices. Imagine you are working for a midsized organization whose 250 employees are located both remotely and in the corporate office in the U.S. The company specializes in providing mul..
Explain the applicable rules of law : Identify the legal issue(s) for the questions, explain the applicable rules of law, and use the facts to reach a decision. You cannot receive full credit for an answer if it fails to discuss the law and to make a decision on the outcome of the ca..
Problem related to politics : which branch of government has reponsibility for checking and balancing the one that you have selescted?Explain.
Audit client considerations : LannyBeaudean joined the CPA firm of Cardinal & Coyote LLP in 2008 after working for two years for the IRS in Phoenix, Arizona. The firm is a second-tier CPA firm just below the Big Four in size.
Importance of recognizing the signs of stalking : Importance of recognizing the signs of stalking, Criminal definition of stalking for your jurisdiction (cite a relevant stalking statute), Key facts that you felt all office personnel should know about stalking, such as the remedies designed to help ..

Reviews

Write a Review

Management Information Sys Questions & Answers

  Technology use to solve business problems

Write paper on Technology use to solve business problems and increase efficiency

  The theory of constraints and the supply chainin 1000 words

the theory of constraints and the supply chainin 1000 words explain how the theory of constraints applies to a supply

  Discuss two major issues involved with acquiring systems

Discuss two major issues involved with acquiring systems and two major issues commonly faced when maintaining them. Address how each can be minimized or overcome

  Jakes computer repair service exerciseintroductionjakes

jakes computer repair service exerciseintroductionjakes computer repair service earned a small profit for the month of

  End user input in database design

To what extent should end users be involved in the design of a database? How have our ideas of agile development environments affected this traditionally non-user input environment?

  Human factor in technologywhat is understand by the human

human factor in technologywhat is understand by the human factor and why is this important in considering the impact of

  Research options for improving the current systems

Analyze the current business system in place: Who, what, when, how, and why? Research options for improving the current systems (including ERP, CRM & KM), and recommend additions to the system based on your assigned reading for this week

  Visits the federal trade commission''s

Focus on Technology - Phishing scams also victimize businesses. Visits the Federal Trade Commission's Website to learn how businesses can deal with this problem and discuss recommendations for marketers who face this threat.

  Explain your findings about data information and knowledge

Write a two-page paper in which you explain your findings about data, information, and knowledge

  Step-by-step answer to supply chain management

Step-by-step answer to Supply Chain Management - What are some of the challenges you experience in manufacturing

  How could the cyber attack be dettered

A recent malicious cyber attack that cyber deterrence was used . Pre-Emp Deterence CNE Cyber attacks. How could the Cyber Attack be dettered

  Prepare a value stream map

Supply Chain/Value Stream Map - Prepare a value stream map of the process and submit it with a report (900 words) with suggestions for removing the constraint.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd