Analyze and identify the fundamentals of pki

Assignment Help Computer Networking
Reference no: EM13805217

Assignment: Designing Compliance Within the LAN-to-WAN Domain

Imagine you are an Information Systems Security Officer for a medium-sized technology firm that has two (2) sites (one located in Virginia, and the second in California). Due to the highly sensitive data created, stored, and transported by your organization, the CIO is concerned with implementing proper security controls for the LAN-to-WAN domain. Specifically, the CIO is concerned with the following areas:

  • Protecting data privacy across the WAN
  • Filtering undesirable network traffic from the Internet
  • Filtering traffic to the Internet that does not adhere to the organizational AUP for the Web
  • Having a zone that allows access for anonymous users but aggressively controls information exchange with internal resources
  • Having an area designed to trap attackers in order to monitor attacker activities
  • Allowing a means to monitor network traffic in real time as a means to identify and block unusual activity
  • Hiding internal IP addresses
  • Allowing operating system and application patch management

The CIO has tasked you with proposing a series of hardware and software controls designed to provide security for the LAN-to-WAN domain. The CIO anticipates receiving both a written report and diagram(s) to support your recommendations.

Write a four to six (4-6) page paper in which you:

  1. Suggest a solution for the provided scenario that will:
    1. filter undesirable network traffic from the Internet
    2. filter Web traffic to the Internet that does not adhere to the organizational AUP for the Web
    3. allow for a zone for anonymous users but aggressively controls information exchange with internal resources
    4. allow for an area designed to trap attackers in order to monitor attacker activities
    5. offer a means to monitor network traffic in real time as a means to identify and block unusual activity
    6. hide internal IP addresses

Analyze and identify the fundamentals of PKI in writing and depict graphically using MS Visio or its open source alternative software. Note: The graphically depicted solution is not included in the required page length.

Examine and describe how your solution will protect the privacy of data transmitted across the WAN and why this solution would be effective.

Analyze the requirements necessary to allow for proper operating system and application patch management and describe a solution that would be effective.

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Reference no: EM13805217

Questions Cloud

Write an essay about freedom of speech and religion in us : Write an essay about Freedom of speech and religion in the United States.
How do unjust laws justify readers assertion to break law : From the resistance to Civil Government of The riverside reader. How do unjust laws justify his assertion to break the law?
Risk management and effective communication planning : Assignment: Risk Management and Effective Communication Planning, Imagine that you have been asked to participate as a project manager for a website renovation project for a clothing department store
Which ted talk have you liked the most and why : Which Ted talk have you liked the most and why? How did it "speak" to you and in what ways did it change or enhance your view?
Analyze and identify the fundamentals of pki : Analyze and identify the fundamentals of PKI in writing and depict graphically using MS Visio or its open source alternative software. Note: The graphically depicted solution is not included in the required page length
Training requirements in the hazard communication : Compare and contrast the training requirements in the Hazard Communication Standard (HAZCOM) (1910.1200) and the Lead Standard (1910.1025). If an employee is exposed to lead above the action level, would the training specified in the HAZCOM standa..
The significance of the slope coefficient. : Evaluating and reporting the value of the correlation coefficient (r); report on the statistical significance of the parameter and provide a scatterplot.
Corporate-level and international strategies : To support your work, use your course and text readings and also use outside sources. As in all assignments, cite your sources in your work and provide references for the citations in APA format. Length of this paper should contain a minimum of 40..
How did wal-mart corporation integrate mti and strategy : View the following video: A Brief History of Wal-Mart. Identify aspects of Porter's Five Forces that impacted Wal-Mart. How did Wal-Mart Corporation integrate M.T.I and strategy

Reviews

Write a Review

Computer Networking Questions & Answers

  Security model is required for protection of information

Examine each of the cells and write a brief statement on how you would address the three components represented in that cell.

  Describe the network management software components

Describe the network management software components. Side server components, middleware components and northbound interface.

  What is theoretical maximum channel capacity

What is the theoretical maximum channel capacity (Kbps) of traditional telephone lines (POTS)? Will that be the actual maximum channel capacity?

  Displays within the zenmap gui scan report

What interfaces on LAN Switch 1 and LAN Switch 2 are configured with Telnet, and which interfaces are configured with SSH for remote terminal connectivity?

  A review full headers of a sample email message you

a. review full headers of a sample email message you received in your gmail account create one if you dont have one

  Examine five issues that the it department is likely to face

Examine five issues that the IT department is likely to face when it comes to supporting virtual teams

  Designing an application server to host web sites

You have been tasked with researching and designing an application server to host Web sites, FTP sites, and streaming media. This server will be used for both internal and external access. In order to complete this task, you must answer the follow..

  Write three big problems with m-m-s process

Then he asks you if they require to make any modifications to their software development process. Write down name three big problems with M. & M.'s process. How would you fix those problems?

  In the early years of web authoring websites commonly

in the early years of web authoring websites commonly posted operating system browser and even resolution

  Explaining multiple mono-alphabetic substitution ciphers

Consider improved version of Vigenere cipher, where instead of using multiple shift ciphers, multiple mono-alphabetic substitution ciphers are used.

  What kind of security issues require to be considered when

q1. what are some of the reasons an organization might consider using a wireless lan?q2. what type of security issues

  Radius implementation

Suppose you are a Systems Administrator, and you have been tasked with implementing RADIUS to support authentication, authorization, and accounting in your organizations Windows network environment.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd