Perform online reconnaissance on xyz to see what

Assignment Help Computer Networking
Reference no: EM13466043

Objective:

ABC Invitation Design and XYZ Invitation Printing have decided to merge into one company, A2Z Invitations. ABC is a virtual company with a proprietary website that allows customers to do some preliminary work on invitations and then consult with a designer for the final product. XYZ is a traditional company with a system that allows customers to submit designs and track their orders. It also has a contact management and invoicing system. ABC will be moving its application into the XYZ data center and will be using all of XYZ\'s back end systems.

Both companies have experienced data breaches in the past and do not want to have them in the future. A2Z has hired you to do a security analysis of its new network and to recommend how it can be set up in a secure manner. It has budgeted for a capital expenditure (outside of man hours) of $250,000 for hardware and software and $25,000 every year for additional security measures.

Guidelines:

The Statement of Work objectives are:

Perform online reconnaissance on XYZ to see what information is available to an attacker. No social engineering of employees is allowed. Use the Week 1 You Decide as the data for this section.

Perform an analysis of the current XYZ network, using the current network diagram and nmap report Diagram; NMAP and files are below.

Check the user\'s password strength. Use the Week 3 You Decide as the data for this section.

Redesign of network. Current network below.

System hardening procedures for both IIS and Apache (even if they only use IIS).

Three complete security policies. Use the Week 5 writing assignment as your starter policy for this section.

Template for future security policies.

Your paper must conform to all requirements listed below.

Requirements:

  • Papers must be at least 5-10 pages in length, double-spaced.
  • Papers must include at least three references outside of the text.
  • Paper and references must conform to APA style

Reference no: EM13466043

Questions Cloud

What financial and economic issues will affect the health : 1 what financial and economic issues will affect the health care industry in the next 10 years?2 what role will
Determine which sources of law would be most relevant in : use the internet to research a situation where a business located in your state was involved in a lawsuit or draw from
Biomedical and psychotherapy are two approaches to treating : biomedical and psychotherapy are two basic approaches to treating psychological disorders. a number of approaches fall
Use your knowledge to develop the circumstances and details : required to support your views by citing your sources in all assignments. even if the question asks for your opinion
Perform online reconnaissance on xyz to see what : objectiveabc invitation design and xyz invitation printing have decided to merge into one company a2z invitations. abc
Describe at least two actions a manager can take to protect : describe at least two actions a manager can take to protect her- or himself and the organization she or he represents
Suppose carnack was able to determine at the time the : carnack contracts to sell his house and lot to willard for 100000. the terms of the contract call for willard to pay
How psychological disorders are categorized include role of : summarize how psychological disorders are classified. include the role of the dsm-iv-tr. your presentation must have at
What are the sources of the rules of international law are : what are the sources of the rules of international law? are those rules legally binding? do powerful states like the

Reviews

Write a Review

Computer Networking Questions & Answers

  What type of wan solution would you recommend and why

An organization called Ranbaxy Inc. has currently 3 divisions in 3 different locations within Sydney city. One of the divisions serves as the company headquarters.

  Explain system enforces both blp and biba properties

Integrity SL = security clearance for level L = integrity clearance for level L SC = security category set for cat. C = integrity category set for cat C. Prove that in this system subject can only read and write at his own level.

  Thesis statement pertaining to social networking

Develop a thesis statement pertaining to social networking. Identify writing strategies (mind mapping, brainstorming, and free writing)for developing the thesis and summarize experiences.

  Business processes ultimately drive type of cable media

Business processes and needs ultimately drive the type of cable media and hardware you select. What factors might determine how we select which ones are appropriate for our organization?

  Questionpart athe carbondale hospital is considering the

questionpart athe carbondale hospital is considering the purchase of a new ambulance. the decision will rest partly on

  Question 1a medical clinic recently conducted a patient

question 1a medical clinic recently conducted a patient satisfactory survey of a 100 patients. using the lickert scale

  Describe in detail all issues associated with layer 2 loops

after evaluating and completing support for high-definition ip cameras to enhance security for devry university you

  Choose to complete a research report

If you choose to complete a research report (not an implementation or a test of a security mechanism) for the assignment, the research report should be of at least 1500 words.

  Part aevery home football game for the last 8 years at

part aevery home football game for the last 8 years at eastern state university has been sold out. the revenues from

  Company-s interpretation of requirement of system

You have taken job with a software user who has contracted previous employer to develop a system for them. You discover that your company's interpretation of requirements is different from interpretation.

  How to select peer-to-peer-server-based or hybrid network

Individual employees also should be able to control resources their own machines. Would you select peer-to-peer, a server-based, or a hybrid network? Explain why?

  Cisco packet tracer

You can use Cisco Packet Tracer for this assignment (more information on use of Packet Tracer can be discussed with your Lecturer in Tutorial class).

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd