Identify the fundamentals of public key infrastructure

Assignment Help Computer Engineering
Reference no: EM131993153

Question: Note: Review the page requirements and formatting instructions for this assignment closely. Graphically depicted solutions, as well as the standardized formatting requirements, do NOT count toward the overall page length.

Imagine you are an Information Systems Security Officer for a medium-sized financial services firm that has operations in four (4) states (Virginia, Florida, Arizona, and California). Due to the highly sensitive data created, stored, and transported by your organization, the CIO is concerned with implementing proper security controls for the LAN-to-WAN domain. Specifically, the CIO is concerned with the following areas:

• Protecting data privacy across the WAN

• Filtering undesirable network traffic from the Internet

• Filtering the traffic to the Internet that does not adhere to the organizational acceptable use policy (AUP) for the Web

• Having a zone that allows access for anonymous users but aggressively controls information exchange with internal resources

• Having an area designed to trap attackers in order to monitor attacker activities

• Allowing a means to monitor network traffic in real time as a means to identify and block unusual activity

• Hiding internal IP addresses

• Allowing operating system and application patch management

The CIO has tasked you with proposing a series of hardware and software controls designed to provide security for the LAN-to-WAN domain. The CIO anticipates receiving both a written report and diagram(s) to support your recommendations.

Write a three to five page paper in which you:

1. Use MS Visio or an open source equivalent to graphically depict a solution for the provided scenario that will:

1. filter undesirable network traffic from the Internet

2. filter Web traffic to the Internet that does not adhere to the organizational AUP for the Web

3. allow for a zone for anonymous users but aggressively controls information exchange with internal resources

4. allow for an area designed to trap attackers in order to monitor attacker activities

5. offer a means to monitor network traffic in real time as a means to identify and block unusual activity

6. hide internal IP addresses

2. Identify the fundamentals of public key infrastructure (PKI).

3. Describe the manner in which your solution will protect the privacy of data transmitted across the WAN.

4. Analyze the requirements necessary to allow for proper operating system and application patch management and describe a solution that would be effective.

5. Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Note: The graphically depicted solution is not included in the required page length.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

• Include charts or diagrams created in Visio or an equivalent such as Dia or OpenOffice. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

The specific course learning outcomes associated with this assignment are:

• Analyze information security systems compliance requirements within the Workstation and LAN Domains.

• Use technology and information resources to research issues in security strategy and policy formation.

• Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions.

Reference no: EM131993153

Questions Cloud

Analyze three economic factors that could lead the cio : Assess whether or not economic factors lead to the same level of IT outsourcing or offshoring decisions, despite the business or industry.
What is the yield on this five year corporate bond : A 5-year Treasury bond has a 4.2% yield. A 10-year Treasury bond yields 6.7%, What is the yield on this 5-year corporate bond?
Identify possible network infrastructure vulnerabilities : Address network vulnerabilities with the appropriate security measures. Ensure that consideration is given to virtualization and cloud technology.
Estimate the value of integral : MTH 4135 Homework - Use Monte Carlo simulation using 100,000 terms (that is, 100,000 pairs of Uniform (0, 1) samples) to estimate the value of this integral
Identify the fundamentals of public key infrastructure : Identify the fundamentals of public key infrastructure (PKI). Describe the manner in which your solution will protect the privacy of data transmitted.
Approaching warfare from a utilitarian perspective : Do you think this means that military strategists and commanders cannot avoid approaching warfare from a utilitarian perspective?
What are some of the characteristics of human languages : What are some of the characteristics of human languages? (Please provide specific examples.)
Describe the goals and objectives of the project : Describe the scope of the project and control measures. Describe the goals and objectives of the project.
How much interest will atlas pay on the loan in first year : The annual interest rate on the loan is 8.5%. How much interest will Atlas pay on the loan in the first year?

Reviews

Write a Review

Computer Engineering Questions & Answers

  What is the maximum delay in a ten-bit binary ripple counter

What is the maximum delay in a 10-bit binary ripple counter that uses these flip-flops? What is the maximum frequency the counter can operate reliably?

  Write a short explanationof each concept and be prepared

Write a short explanation (two to three sentences) of each concept and be prepared to discuss it with the class.

  Perform all semantic checks and execute the program

For this assignment, after parsing you must perform all semantic checks and execute the program. Please note that some of the checks can be performed statically (an empty string constant is an error, and using a variable before setting it is an er..

  Related to super and sub class

Write down a class definition for subclass LawSchool which consists of: A (default) constructor which invokes the superclass constructor along with the value 3 (law school is typically a three year program).

  Program that contains the time-conversion functions

build a library Time that contains the time-conversion functions (given a number of seconds, returns the equivalent number of minutes; given the number of minutes, returns the equivalent number of hours; given the number of hours, returns the equi..

  Is there a flaw in this scheme

Information & Network Security. Alice and Bob agree to communicate privately via email using a scheme based on RC4, but they want to avoid using a new secret key for each transmission.

  How to assign different attributes to an element in ansys

During a maintenance process on the three-dimensional truss in Problem, the AB member is replaced with a member with the following properties.

  Create a document retention policy for your college

Create a document retention policy for your College that complies with all state and Federal regulations

  Progarm converts a number from roman numerals to decimal

Write down a program that converts a number from Roman numerals to decimal. It needs to consist of a class, romanType.

  Write a process that the ccb activity will follow

Your assignment is to write a process that the configuration control board activity will follow during the maintenance period.

  Discuss primary advantages of gui over a textual interface

Discuss the primary advantages of GUI over a textual (command-line) interface in Linux system administration. Describe two (2) Fedora/Red Hat Enterprise Linux (RHEL) GUI desktop managers and explain how they generally function.

  What resources do need to conduct

What restraints are in your workplace that prevents the new computer system installation.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd