Examine whether your risk assessment methodology is

Assignment Help Computer Networking
Reference no: EM13477609

Global Finance, Inc. (GFI) network diagram. A hypothetical company, GFI has grown rapidly this past year and implemented a number of network devices as displayed in the diagram. The company invested in the network and designed it to be fault tolerant and resilient from any network failures. However, although the company's financial status has matured and its network has expanded at a rapid pace, its overall network security posture has not kept up with the company growth.

GFI's network has historically been fairly stable, and the company has not experienced many full scale network outages. GFI has hired three (3) network engineers to keep up with the network growth, as well as the bandwidth demand by the company employees and the clients. However, the company has not hired any security personnel who can take care of the operational security responsibility.

The trusted computing base (TCB) internal network within the Global Finance, Inc. Network Diagram hosts the company's mission critical systems that are vital to the company's operations that also affect the overall financial situation. The Oracle database and email systems are among the most intensively used application servers in the company. GFI cannot afford system or network outages, as its cash flow and financial systems heavily depend on the network stability and availability. GFI has experienced DoS network attacks twice this year, and its Oracle database and email servers had been down for a total of one (1) week as a result. The recovery process required GFI to utilize $25,000 to restore its operations to the normal operating baseline. GFI estimated the loss from these network attacks at more than $1,000,000, as well as lost customer confidence.

Write an eight to ten (8-10) page formal risk assessment proposal in which you:

1. Describe the company network, interconnection, and communication environment.

2. Assess risk based on the GFI, Inc. network diagram scenario. Note: Your risk assessment should cover all the necessary details for your client, GFI Inc., to understand the risk factors of the organization and risk posture of the current environment. The company management will utilize this risk assessment to determine what actions to take; therefore, it must be comprehensive for the business leaders to make data-driven decisions.

1. Defend your assumptions where pertinent information from the scenario isn't available.

2. Ascertain apparent security vulnerabilities, and analyze at least three (3) such vulnerabilities. Such analysis should entertain the possibility of faulty network design. Recommend mitigation processes and procedures for each of the identified vulnerabilities.

3. Justify your cryptography recommendations, based on security concerns and requirements, data-driven decision-making, and objective opinions.

3. Examine whether your risk assessment methodology is quantitative, qualitative, or a combination of these, and discuss the main reasons why you believe that the methodology that you utilized was the most appropriate.

4. Explain the way in which you would present your findings and assessment to the company's management and thus facilitate security buy-in and concentration.

5. Using Microsoft Visio or its open source equivalent, redraw the CFI diagram, depicted as a secure and risk-mitigating model. Note: The graphically depicted solution is not included in the required page length.

6. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources

Reference no: EM13477609

Questions Cloud

How is acetyl chloride produced if 915 gallons is produced : acetyl chloride is a colorless fuming liquid used primarily in the chemical industry.a how is acetyl chloride produced?
Your small community has a fire department but it does not : you are an ehamps professional returning home from your plant on a summer friday afternoon at about 4 p.m. you have
Find the extent to which exploration of your own indigenous : have you ever described a friend by using a quickly decodable description or characteristic? for example maybe you
In the management of cash and marketable securities explain : question 1 in the management of cash and marketable securities why should the primary concern be for safety and
Examine whether your risk assessment methodology is : global finance inc. gfi network diagram. a hypothetical company gfi has grown rapidly this past year and implemented a
Your local small business association is organizing the : your local small business association is organizing a workshop centered upon the impact of corporate culture on
If the firm has 4 million per day in collections and 3 : beths society clothiers inc. has collection centers across the country to speed up collections. the company also makes
Except for the psychology majors none of the other students : hypothesis generating interviews were undertaken with seven of the earliest cases reported by the emergency rooms and
Define the major components of a safety and health plan : state the major components of a safety and health plan describe each component and discuss how you would structure each

Reviews

Write a Review

Computer Networking Questions & Answers

  Describe original classful address scheme

In original classful address scheme, was it possible to find out the class of the address from address itself? Describe.

  Implement client and server programs on bank atm application

Implement client and server programs on bank ATM application. Give error checking if amount is legal and userID/password (created in the 1st time).

  Security primitivesaexplain the different roles between

security primitivesaexplain the different roles between hashing and message authentication codes mac. can a good hash

  Content validation-web pages before put in public domain

Do you believe that any form of document content validation must be applied to web pages before they are placed in  public domain? That is, some form of assurance that they don't contain completely incorrect information.

  Create ip addressing scheme for five departments

You are hired to create the IP addressing scheme for five departments which will give security and access to Internet. Each department needs between 1,500 - 2,000 IP addresses.

  Determine maximum value in ring if there is unique initiator

Design an algorithm that, under the standard set of assumptions (bidirectional links, total reliability, connectivity), determines maximum value in the ring assuming that there is a unique initiator.

  1 with what kind of network device router or switch do you

1 with what kind of network device router or switch do you replace device 1 device 2 and device 3? and why? notenbsp

  Where are wlan technologies going in the future

Where are WLAN technologies going in the future? Research what the next versions of the 802.11 standards are, and provide your educated opinion on how these technologies will be used.

  1 give an example to show that the group of permutations s5

1. give an example to show that the group of permutations s5 is not commutative.2. use ecb mode with block length 3 and

  Describe the network support the company-s needs

Describe the network you would recommend and how it would be con?gured with the goal of building a new network that will support the company's needs for the next 3 years with few additional investments.

  Write down changes does ftp make to ascii file

Write down changes does FTP make to ASCII file when you download it in ASCII mode to Windows machine from Linux server.

  An effective information technology manger must be as adept

an effective information technology manger must be as adept at the application of data storage techniques relative to

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd