Your ciso asks you to review the seven domains of the

Assignment Help Computer Engineering
Reference no: EM13465959

A) Your CISO asks you to review the seven domains of the typical IT infrastructure, and describe how you will 1) reduce the attack surface with what hardening steps and network security management best practices, 2) ensure secure authentication, authorization, and accounting, and 3) prevent or respond to intrusions.

B) Your CISO was very happy with the recommendations that you made above. They have accepted your recommendations as valid, but have requested additional information on the firewall solution. The CISO is now asking for 1) firewall best practices that you will implement to ensure confidentiality, integrity, and availability, 2) the best firewall to support his requirement for detailed logging, 3) the firewall type, and 4) your plan for managing it.

C) Two more weeks have passed and your CISO is excited about implementing the new controls and solutions that you've recommended above. Your detailed analysis of the operational environment and alignment of security solutions to the business mission and goals was spot on! You have gained confidence in the CISO and board of directors, and they've identified additional funding that may be applied towards security. You have asked to implement VPNs year over year, and the CISO proudly tells you that it is now possible with the additional funding. He asks you to describe the best practiA.) Your CISO asks you to review the seven domains of the typical IT infrastructure, and describe how you will 1) reduce the attack surface with what hardening steps and network security management best practices, 2) ensure secure authentication, authorization, and accounting, and 3) prevent or respond to intrusions.

1. Describe VPN "best practices"

2. Describe the issues involved with deployment, placement, and implementation of a VPN.

3. Describe the threats and attacks against VPNs.

4. Contrast hardware and software VPN solutions.

5. Describe VPN protocols, their uses, features, and problems.

6. Describe methods to manage firewall performance.

7. Define what would go in a firewall policy.

8. Describe various firewall security strategies.

9. Define the pros and cons of reverse proxy and port forwarding.ces that you will use to implement the VPN solution, threats and exploits, and the technology that you recommend implementing.

Reference no: EM13465959

Questions Cloud

Discuss which performance management process you will use : write a six to eight 8-10 page paper in which you1. determine which performance management process you will employ to
Community health education and promotion assessment - this : research projectin preparation for this semester long research project students are to select a community for this
You are the information security officer at a medium-sized : you are the information security officer at a medium-sized company 1500 employees. the cio asks you to explain why you
Explain and discuss how the 2002 recordkeeping rules : explain and discuss how the 2002 recordkeeping rules affect issues dealing with specific disorders and other issues
Your ciso asks you to review the seven domains of the : a your ciso asks you to review the seven domains of the typical it infrastructure and describe how you will 1 reduce
Do you believe this would be good way to analyze your : consider a research topic you are interested in by now you should have a firm idea of what you want your research
Identify major forces that drive reverse logistics systems : as the head of purchasing and procurement you must draft a memo that discusses important elements of logistics
Prepare and describe an sfas matrix and a tows matrix for : prepare and describe an sfas matrix and a tows matrix for your selected company. costco data presented in tables do not
How can hr staff work with organizational managers to make : how can hr staff work with organizational managers to create an effective incentive and motivation plan to make

Reviews

Write a Review

Computer Engineering Questions & Answers

  File descriptor

A file whose file descriptor is fd consists of the following sequence of bytes: 2, 7, 1, 8, 2, 8, 1, 8, 2, 8, 4. The following system calls are made: seek( fd, 3, SEEK_SET ); read( fd, &buffer, 4 );

  Advantages of technologies

List some of the advantages of some of current technologies explained in our reading this week involving VoIP, Virtual Private Networks, Unified Communications, Wi-Fi and wireless technologies such as RFID.

  Minimum size of instruction

An imaginary computer has the 16 data registers (R0 to R3), 1024 words in memory, and the 16 different instructions (add, subtract, etc.). Explain the minimum size of the instruction in bits.

  Determining the better internet browser

Which among the following is better software tool: Mozilla Firefox, Internet Explorer, or Google Chrome? Supplement your argument with evidence, and signify whether or not you alter your position based on the discussion.

  Provide users optimum signal strength and availability

Name one major advantage and one major disadvantage of "Simple Network Management Protocol (SNMP)" and describe a short scenario in that a company would find this tool the ideal choice for monitoring their WLAN.

  Generates a random number in the range of 1

Write down a pseudocode statement that generates a random number in the range of 1 through 100 and assigns it to a variable named rand.

  Developing erd on basis of crows foot model

Develop an ERD based on Crow’s Foot model, utilizing the following requirements. An INVOICE is written by a SALESREP. Each sales representative may write several invoices, however each invoice is written by the single sales representative.

  How to calculate the cost of 1 mbyte of main memory

how to Calculate the cost of 1 MByte of main memory.

  Define how architectural and protocol changes occur

express how architectural and protocol changes occur, the administrative organization that oversees the technical development of the Internet, and the process that each protocol must undergo to become an Internet Standard.

  Find out the correct solution

if the percentage of the correct answers is 75% of the 10 questions, then it would take us to the next level from 7 to 9. it continues to next level from 10 to 60 and thne next level from 70 to 90.

  Representing text and numbers problem 11 latin alphabetic

representing text and numbers problem 1.1 latin alphabetic characters can be represented using their ascii equivalents.

  Which scanning applicationis better for performing a network

Which scanning applicationis better for performing a network discovery reconnaissance probing of an IP network infrastructure?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd