Make a list of access points internal and external

Assignment Help Computer Network Security
Reference no: EM132137568

Assignment -

GLOBAL FINANCE, INC. (GFI) - Global Finance, Inc. (GFI) is a financial company that manages thousands of accounts across Canada, the United States, and Mexico. A public company traded on the NYSE, GFI specializes in financial management, loan application approval, wholesale loan processing, and investment of money management for their customers.

ASSIGNMENTS -

  • From the devices and systems identified in the GFI Corporate Network Topology, conduct a thorough asset inventory, assign monetary values to each asset (quantitative), and assign a priority value for each asset (qualitative) that could be used to determine which assets are most critical for restoral in the event of a catastrophic event or attack.
  • Evaluate the perimeter security, make a list of access points internal and external(remote), identify vulnerabilities and make suggestions for improvements to perimeter and network security.
  • Evaluate the remote access infrastructure, identify vulnerabilities and suggest security improvements to mitigate risks to remote access.
  • Address the COO's concern over the mobility security and design a secure mobile computing (smart phones, tablets, laptops, etc.) in terms of authentication technologies and data protection.
  • Identify wireless vulnerabilities and recommend what safeguards, authentication technologies, and network security to protect data should be implemented.
  • Evaluate the authentication protocols and methodologies within the wired, wireless, mobility and remote access environments and suggest improvements to secure authentication for GFI.
  • Evaluate the web system protocols and vulnerabilities within the Intranet server and suggest secure protocol improvements to improve security for web authentication.
  • Design a cloud computing environment for the company with a secure means of data protection at rest, in motion and in process.
  • Assess all known vulnerabilities on each asset in this environment and impacts if compromised.
  • Using the asset inventory and the assigned values (monetary and priority) conduct a quantitative and qualitative risk assessment of the GFI network.
  • Recommend risk mitigation procedures commensurate with the asset values from your asset inventory. Feel free to redesign the corporate infrastructure and use any combination of technologies to harden the authentication processes and network security measures.
  • Provide an Executive Summary.
  • You are welcome to make assumptions for any unknown facts as long as you support your assumptions.

Note - The Title Page, Table of Contents and References page(s) don't count in these 22 pages.

Attachment:- Assignment File.rar

Verified Expert

In order to protect the data, verious technologies are available. The study has peoperly depicted those technologies and their importance to resolve the data managemnt issues. This study has enlightened organization namely GLOBAL FINANCE, INC (GFI) to asess necessary security functions and it also discussed network management requirements. A new IT system has been proposed to mitigate the issue of data breach.

Reference no: EM132137568

Questions Cloud

What factors must be assessed : What factors must be assessed when critically appraising quantitative studies (e.g., validity, reliability, and applicability)? Which is the most important? Why
What are some methods to protect personal rights : Conducting research projects while ensuring the protection of human subjects is necessary. What are some methods to protect personal rights of someone.
What are two ways to address the problem : Consider an obstacle or barrier to the implementation of evidence-based practice you identified in last week's discussion.
Summarize all of the research studies used as evidence : Summarize all of the research studies used as evidence. The essential components of each study need to be described so that readers can evaluate its scientific.
Make a list of access points internal and external : Evaluate the perimeter security, make a list of access points internal and external(remote), identify vulnerabilities and make suggestions for improvements
Explain the expected outcomes of the project : Organization Culture: Explain the way(s) in which the proposed solution is consistent with the organization or community culture and resources.
Describe the setting and access to potential subjects : Describe the setting and access to potential subjects. If there is a need for a consent or approval form, then one must be created.
Running a tox screen for a digital system : COS721 - Determine whether the idea shows promise that could be developed further. Alternatively, one may start by reflecting on the obstacles that may render
What paradigm does the nurse leader have : What paradigm does the nurse leader have that the nurse practitioner may not have? Why is the focus of the nurse Practioner so different and is that good.

Reviews

urv2137568

12/17/2018 2:40:37 AM

My teacher said that not a single guideline was missing from the research project and even the content was 100% original and authentic. The presentation and writing skills were very eminent. You surely are the best mates!!

len2137568

10/10/2018 11:47:35 PM

Risk Assessment Paper Rubric - You are given a fictional scenario above describing security issues affecting organizational assets. You will identify the risks associated with the assets, and recommend mitigating procedures. You will prepare a quantitative / qualitative risk assessment to address risk factors on organizational assets. Your final paper will be 15-25 pages long in a Word document (double-spaced with 12 point font) with APA citations for the resources you used in your research and will be graded using the following rubric.

len2137568

10/10/2018 11:47:29 PM

Inventory assets and prioritize them in the order of mission criticality. Inventoried, prioritized assets and addressed mission objectives in their asset priority. Evaluate enterprise topology and perimeter protection. Evaluated enterprise topology, perimeter protection measures, and addressed mission objectives. Evaluate remote access to the networks. Evaluated remote access protocols, security safeguards to the network, and addressed mission objectives. Evaluate authentication protocols and methodologies. Evaluated authentication protocols, methodologies with supporting data, description; and addressed mission objectives.

len2137568

10/10/2018 11:47:23 PM

Assign asset values to organization assets for quantitative / qualitative risk assessment. Assigned asset values to organization assets in a complete inventory, and addressed mission objectives. Assess vulnerabilities on each asset and impacts if compromised. Assessed vulnerabilities on each asset and impacts if compromised; of complete inventory and addressed mission objectives. Evaluate web access protocols and vulnerabilities and Cloud Computing Evaluated web access protocols and vulnerabilities and Cloud Computing and addressed mission objectives.

len2137568

10/10/2018 11:47:18 PM

Recommend risk mitigation procedures commensurate with asset values. Recommended risk mitigation procedures commensurate with asset values of complete inventory, and addressed mission objectives. Formulate 15-25 pages of a quantitative or qualitative risk assessment in APA format. Followed proper quantitative or qualitative risk assessment format and conformed to APA in a sufficient reference list and page count. Executive summary of risk assessment. Included an executive summary in details, and addressed mission objectives.

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd