Reference no: EM132042875
Cyber Defense and Countermeasures.
Assignment 1 : Secure Infrastructure Design
Length: 4 pages, excluding the references page, and 6 slides.
Assessment Instructions
Part A: General Security Infrastructure Questions
Write 4-5 pages that examine secure infrastructure concepts. Address the following:
Differentiate between normal and suspicious network traffic signatures.
Evaluate the role of IDS/IPS signature analysis in developing a secure network infrastructure.
Identify the components of an intrusion detection system (IDS), including NIDS, HIDS, and IPS implementations.
Describe commonly used controls for separating internal and external networks.
Explain how port security contributes to an overall network security implementation.
Part B: Case Study: Presentation to the Board on Security Infrastructure
Use the organization and characteristics described in the Case Study: Global Widgets Inc. document found in the Required Resources as the context in which to address the following:
In your role as information security professional serving the CIO, you have been asked to make a presentation to the Global Widgets board that analyzes the current security infrastructure design and evaluates the security implications of moving IT functions to a cloud-based environment.
Create a 6-8 slide PowerPoint presentation that addresses the following:
Diagram the existing network security design.
Diagram the proposed network security design.
Evaluate the potential risks to organizational assets that might result from a move to a cloud-based environment.
Select information security controls that can be used to mitigate potential threats and vulnerabilities relative to the organizational move to a cloud-based infrastructure.
Evaluate whether adopting the CEO's proposal to move to the cloud will result in required changes to the network security design and architecture that will or will not enhance the overall security profile of the organization. Explain.
Attachment:- Case Study-Global Widgets Inc.rar
Modernism and the contemporary connections
: Two serious problems about modernism and the Contemporary Connections present these has a problem or suggest a solution, or is it simply a critique of modernism
|
What amounts will appear as sales revenue
: Thomas Company had sales of 4,000 units, 4,500 units, 6,000 units, What amounts will appear as sales revenue in the quarterly sales budgets for 2008
|
The scalpel and the silver bear
: What role does a client's environmental, economic and social reality play on their health?
|
Awareness activities throughout the school day
: Is it important for the teacher to provide opportunities for integrating phonological awareness activities throughout the school day?
|
Diagram the existing network security design
: IT-FP4070 -Evaluate the potential risks to organizational assets that might result from a move to a cloud-based environment.
|
What is the net present value of the investment
: An investment of $450,000 will generate returns of $100,000 per year in Years 1 and 2, what is the net present value of the investment
|
What are the steps of scholarly writing process
: What is the importance of receiving and responding to feedback on scholarly writing? What are the steps of scholarly writing process?
|
What patient education needs completed for intervention
: A patient complained of severe lower back pain. He states that the pain is from a car accident in 2012, and that it flairs up and he needs pain medications.
|
Area of concern that would benefit from research
: Considering your local schools or educational programs, discuss an area of concern that would benefit from research.
|