How many firewalls should protect the application

Assignment Help Computer Engineering
Reference no: EM132117118

Question 1: Security Awareness Training

You will develop a security awareness training plan for a 1000-employee company. You are to determine:

What training new-employees should receive upon hire

What written materials should be issued to new employees

What materials should be available on an intranet site

What types of security awareness messages that should be issued to employees

What specialized training should be available to IT personnel

What recordkeeping for training should take place

Question 2: Observe a Defense in Depth Environment

Study the environment of any organization (For example: VIU); what assets are being protected? What controls can you find that are used to protect assets? Write down all of the controls that you can find and describe how they protect assets.

What additional controls can be found? Identify their type: detective, preventive, deterrent, compensating, recovery, corrective, or mitigating.

Identify any additional controls that could be implemented to further protect assets.

Question 3: Web Application Security Architecture

As a consultant with the Security Consulting Company, you have been hired to develop a secure application architecture for VIU' online Web application.

You are to determine:

Should the database server and the web server be on the same system?

How many firewalls should protect the application?

What forms of access controls should be used to protect the application and its database?

Question 4: Evaluate NIST 800-34

As a consultant with the Ace Security Consulting Co., you have been asked to evaluate the use of NIST 800-34 as a framework and guide to contingency planning for a medium sized business.

Answer the following questions:

Does NIST 800-34 adequately address the issue of protecting sensitive data during recovery operations?

Have any technology advances since the publication of this document made contingency considerations outdated?

Question 5: Make Encrypted Files Available to Employees in a Large Organization

As a consultant with the Ace Security Consulting Co., you have been asked to determine how encrypted documents containing sensitive information can be made available to several hundred office workers in the Very Good Software Company.

The encrypted files can be downloaded from an internal web site at Very Good Software.

What considerations and methods can be used to ensure easy downloading and reading of the encrypted documents while minimizing the risk of compromise?

Reference no: EM132117118

Questions Cloud

Capital budgeting decision : Sunk costs are associated with past expenditures and are therefore relevant to the capital budgeting decision. Can this statement be true?
Explain what is a process : A group diary and time management system is intended to support the timetabling of meetings and appointments across a group of co-workers.
What is the value of his account after making : What is the value of his account after making the fifth deposit?
What is the amount of the pretax profit on the sale : The firm no longer uses this property so is selling it today at a price of $13,500. What is the amount of the pretax profit on the sale?
How many firewalls should protect the application : What considerations and methods can be used to ensure easy downloading and reading of the encrypted documents while minimizing the risk of compromise?
Which command could you type to see your current user : You log in as different users from time to time. Which command could you type to see your current user identity?
Made an investment into a project : You have already made an investment into a project. This project is expected to earn you $500 at the end of the first year, $600
How much are his monthly payments expected to be : William just graduated Indiana University but had to take out a $50,000 student loan. His loan requires him to make monthly payments over a 10-year period at 4.
How much must you invest in your account today : How much must you invest in your account today if you want to pay yourself $230 at the end of each of the next 15 years?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd