Analyze the requirements necessary to allow for proper os

Assignment Help Computer Networking
Reference no: EM131187473

Assignment: Designing Compliance within the LAN-to-WAN Domain

Note: Review the page requirements and formatting instructions for this assignment closely. Graphically depicted solutions, as well as the standardized formatting requirements, do NOT count toward the overall page length.

Imagine you are an Information Systems Security Officer for a medium-sized financial services firm that has operations in four (4) states (Virginia, Florida, Arizona, and California). Due to the highly sensitive data created, stored, and transported by your organization, the CIO is concerned with implementing proper security controls for the LAN-to-WAN domain. Specifically, the CIO is concerned with the following areas:

• Protecting data privacy across the WAN
• Filtering undesirable network traffic from the Internet
• Filtering the traffic to the Internet that does not adhere to the organizational acceptable use policy (AUP) for the Web
• Having a zone that allows access for anonymous users but aggressively controls information exchange with internal resources • Having an area designed to trap attackers in order to monitor attacker activities
• Allowing a means to monitor network traffic in real time as a means to identify and block unusual activity
• Hiding internal IP addresses
• Allowing operating system and application patch management

The CIO has tasked you with proposing a series of hardware and software controls designed to provide security for the LAN-to-WAN domain. The CIO anticipates receiving both a written report and diagram(s) to support your recommendations.

Write a three to five page paper in which you:

1. Use MS Visio or an open source equivalent to graphically depict a solution for the provided scenario that will:

a. filter undesirable network traffic from the Internet

b. filter Web traffic to the Internet that does not adhere to the organizational AUP for the Web

c. allow for a zone for anonymous users but aggressively controls information exchange with internal resources

d. allow for an area designed to trap attackers in order to monitor attacker activities

e. offer a means to monitor network traffic in real time as a means to identify and block unusual activity

f. hide internal IP addresses

2. Identify the fundamentals of public key infrastructure (PKI).

3. Describe the manner in which your solution will protect the privacy of data transmitted across the WAN.

4. Analyze the requirements necessary to allow for proper operating system and application patch management and describe a solution that would be effective.

5. Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Note: The graphically depicted solution is not included in the required page length.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

• Include charts or diagrams created in Visio or an equivalent such as Dia or OpenOffice. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

The specific course learning outcomes associated with this assignment are:

• Analyze information security systems compliance requirements within the Workstation and LAN Domains.
• Use technology and information resources to research issues in security strategy and policy formation.
• Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions.

Reference no: EM131187473

Questions Cloud

Discuss telemarketing : Discuss telemarketing. - Should marketers be prohibited from using the telephone to solicit prospective customers? Why or why not?
Calculate freds net capital gain for the current year : HI6028 Taxation - Theory, Practice and Law - Calculate Freds net capital gain for the current year. Assume he also has a net capital loss from last year of $10,000 arising from the sale of shares.
How can a caregiver foster secure attachment : What behaviors in children are associated with being insecurely attached: avoidant, disorganized, and resistant? What are the short- and long-term effects of secure attachment?
Identify the key points you want to highlight : Your presentation Should: Identify the key points you want to highlight. Contain a minimum of three slides in the body of the presentation
Analyze the requirements necessary to allow for proper os : Analyze the requirements necessary to allow for proper operating system and application patch management and describe a solution that would be effective.
Propose the conflict management techniques : Propose the conflict management techniques that you believe would be most effective to achieve the desired outcome(s) of your recommendation.
How is moore''s law relevant to programmers : Suppose a transistor on an integrated circuit chip were 2 microns in size. According to Moore's Law, how large would that transistor be in 2 years? How is Moore's law relevant to programmers?
Discuss methods of measuring intellectual functioning : Provide a brief overview of at least two theories of intelligence related to the content of your selected articles to help your audience understand what intelligence testing accomplishes. Discuss methods of measuring intellectual functioning.
Evaluate the pros and cons of sealed bidding contracts : Evaluate the pros and cons of sealed bidding contracts and negotiated contracts, emphasizing which one would be best for this purchase

Reviews

Write a Review

Computer Networking Questions & Answers

  Explain the differences between the database administrator

write a 200- to 300-word short-answer response for the followingdescribe the differences between a database

  Calculate voip traffic load in access trunks to the internet

Calculate VoIP traffic load in access trunks to the Internet and Calculate the access bandwidth required and the number of SIP trunks needed for VoIP calls to the Internet

  Compare the multiplexing techniques tdma and fdma

What is the purpose of a mixer? Include a discussion of sidebands in your answer. Compare and contrast the multiplexing techniques TDMA and FDMA in the area of wireless networking.

  Different components difficult to incorporate into a network

Do you believe that a network with different types of computers, maybe different operating systems, or different components would be difficult to incorporate into a network. Why or why not.

  Determine five companies that provide p2p file-sharing

Find five companies that provide P2P file-sharing services. For each company, what kind of files (that is, content) do they handle

  Define ieee

Define TIA/EIA and briefly describe how it is relevant to the current topic. Define IEEE and briefly describe how it is relevant to the current topic.

  Create a final network diagram

Using Microsoft Visio or its open source alternative to create a final network diagram that incorporates all devices into the existing network and ensures the following: VPN sessions (from laptop) are only allowed to access the desktops in the IT d..

  Define the overall network architecture

Define the overall network architecture

  What alternatives telephone company use to increase capacity

This fiber-optic line has reached capacity. What alternatives can the telephone company consider to increase capacity?

  Describe the gui and command line utilities

Describe the GUI and command line utilities that you might use in creating and managing users, assigning them to global groups, assigning the global groups to domain local groups and granting domain local groups permissions, should Habibi's grow t..

  The link capacities are all 10 mbps except for the middle

the link capacities are all 10 mbps except for the middle link which has capacity 2 mbps. the top traffic stream and

  Systems analyst can help with project management tasks

Explain how systems analyst can help with project management tasks. Also, explain how new employee can contribute to tasks.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd