Explain the fundamentals of public key infrastructure

Assignment Help Computer Network Security
Reference no: EM131309940

Assignment: Designing Compliance within the LAN-to-WAN Domain

Note: Review the page requirements and formatting instructions for this assignment closely. Graphically depicted solutions, as well as the standardized formatting requirements, do NOT count toward the overall page length.

Imagine you are an Information Systems Security Officer for a medium-sized financial services firm that has operations in four states (Virginia, Florida, Arizona, and California). Due to the highly sensitive data created, stored, and transported by your organization, the CIO is concerned with implementing proper security controls for the LAN-to-WAN domain. Specifically, the CIO is concerned with the following areas:

• Protecting data privacy across the WAN

• Filtering undesirable network traffic from the Internet

• Filtering the traffic to the Internet that does not adhere to the organizational acceptable use policy (AUP) for the Web

• Having a zone that allows access for anonymous users but aggressively controls information exchange with internal resources

• Having an area designed to trap attackers in order to monitor attacker activities

• Allowing a means to monitor network traffic in real time as a means to identify and block unusual activity

• Hiding internal IP addresses

• Allowing operating system and application patch management

The CIO has tasked you with proposing a series of hardware and software controls designed to provide security for the LAN-to-WAN domain. The CIO anticipates receiving both a written report and diagram(s) to support your recommendations.

Write a three to five page paper in which you:

1. Use MS Visio or an open source equivalent to graphically depict a solution for the provided scenario that will:

a. filter undesirable network traffic from the Internet
b. filter Web traffic to the Internet that does not adhere to the organizational AUP for the Web
c. allow for a zone for anonymous users but aggressively controls information exchange with internal resources
d. allow for an area designed to trap attackers in order to monitor attacker activities
e. offer a means to monitor network traffic in real time as a means to identify and block unusual activity
f. hide internal IP addresses

2. Identify the fundamentals of public key infrastructure (PKI).

3. Describe the manner in which your solution will protect the privacy of data transmitted across the WAN.

4. Analyze the requirements necessary to allow for proper operating system and application patch management and describe a solution that would be effective.

5. Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Note: The graphically depicted solution is not included in the required page length.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

• Include charts or diagrams created in Visio or an equivalent such as Dia or OpenOffice. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

The specific course learning outcomes associated with this assignment are:

• Analyze information security systems compliance requirements within the Workstation and LAN Domains.

• Use technology and information resources to research issues in security strategy and policy formation.

• Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions.

Reference no: EM131309940

Questions Cloud

Define the efficient market hypothesis : Define the efficient market hypothesis (EMH).-  What are the implications of EMH for corporate managers?
Find the monthly cost of the daily spending : A typical pack-a-day smoker in Atlanta, GA spends $6.12 a day on cigarettes. Suppose the smoker invests this money at the end of each month in a saving account at 2.5% compounded monthly. What would the account be worth after 40 years? (HINT: you wil..
Difference between the = symbol in java and in mathematics : Explain the difference between the = symbol in Java and in mathematics.
Process of care measures : The CMS Hospital Compare website found at the Medicare website allows you to compare performance at hospitals throughout the United States. Go to this site and search for three hospitals in your state North Carolina. Which hospitals rate highest i..
Explain the fundamentals of public key infrastructure : Identify the fundamentals of public key infrastructure (PKI). Describe the manner in which your solution will protect the privacy of data transmitted across the WAN.
Expect risk adjusted performance of conglomerate firms : Over a long period of time would you expect the risk-adjusted performance of conglomerate firms to be significantly different from the risk-adjusted performance of a broad market index? Explain.
What were two results of the destruction of the french fleet : what were two results of the destruction of the french fleet?
Explain the difference between an object and a class : Give the Java code for constructing an object of class Rectangle, and for declaring an object variable of class Rectangle.
Assignment-discussion-integration of technology : Technology has changed the way we conduct business on a daily basis. A number of organizations have opted for integrating systems and sharing information with their counter parts.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Difference between legislation and other regulatory document

Compare and contrast the difference between legislation and other regulatory documents, i.e., guidance, standards, directives, executive orders, etc

  Secure the incident scene

Develop a detailed plan to approach and secure the incident scene based on the information you have from the scenario

  Using network policy servers to increase network security

Using Network Policy Servers to Increase Network Security

  Brief statement describing an it acquisition

Write a brief statement describing an IT acquisition by an organization about which you have knowledge. State whether the organization believes the acquisition met its objectives (e.g., improved the performance of the organization). State why you ..

  How to manage the file system encryption keys

Setup a 64MB encrypted file system in a file on a Flash drive so that it can be used with the cryptmount command.

  Write about a sophisticated computer or network

The goal of the Final Project is to research and write about a sophisticated computer/network intrusion set/event(s) that have occurred in the recent past, of which I will give you three options. The details on the intrusion set and the attack of ..

  What factors might an organization consider

What factors might an organization consider when choosing to implement an AD-integrated DNS zone versus a traditional zone? Describe a scenario in which it would be preferable

  Describe the function of a firewall

Describe the function of a firewall. (Minimum word count: 70) Which tunneling protocols are commonly used by VPNs? (Minimum word count: 25) Describe a differential backup.

  Create alternative message which has hash value

Generates the alternative message which has a hash value which collides with Bob's original hash value. Illustrate a message that Alice may have spoofed, and demonstrate that its hash value collides with Bob's original hash.

  Innovation and small business

Evaluate how networking can mitigate the issues small-business owners face regarding isolation so they can become more innovative.

  Groups of people involved with computer security

What are the many groups of people who are involved with computer security? Name the groups and elaborate on their functions.

  Differences between symmetric and asymmetric encryption

Describe the differences between symmetric and asymmetric encryption. Select the encryption method you believe is typically more reliable of the two and explain why. Determine if there are any situations where the typically less reliable method co..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd