Assignment 4: Designing Compliance Within the LAN-to-WAN Domain Imagine you are an Information Systems Security Officer for a medium-sized technology firm that has two (2) sites (one located in Virginia, and the second in California). Due to the highly sensitive data created, stored, and transported by your organization, the CIO is concerned with implementing proper security controls for the LAN-to-WAN domain. Specifically, the CIO is concerned with the following areas:Protecting data privacy across the WANFiltering undesirable network traffic from the InternetFiltering traffic to the Internet that does not adhere to the organizational AUP for the WebHaving a zone that allows access for anonymous users but aggressively controls information exchange with internal resourcesHaving an area designed to trap attackers in order to monitor attacker activitiesAllowing a means to monitor network traffic in real time as a means to identify and block unusual activityHiding internal IP addressesAllowing operating system and application patch managementThe CIO has tasked you with proposing a series of hardware and software controls designed to provide security for the LAN-to-WAN domain. The CIO anticipates receiving both a written report and diagram(s) to support your recommendations.Write a four to six (4-6) page paper in which you:Suggest a solution for the provided scenario that will:filter undesirable network traffic from the Internetfilter Web traffic to the Internet that does not adhere to the organizational AUP for the Weballow for a zone for anonymous users but aggressively controls information exchange with internal resourcesallow for an area designed to trap attackers in order to monitor attacker activitiesoffer a means to monitor network traffic in real time as a means to identify and block unusual activityhide internal IP addressesNote: The graphically depicted solution is not included in the required page length.Analyze and identify the fundamentals of PKI in writing and depict graphically using MS Visio or its open source alternative software. Note: The graphically depicted solution is not included in the required page length.Examine and describe how your solution will protect the privacy of data transmitted across the WAN and why this solution would be effective.Analyze the requirements necessary to allow for proper operating system and application patch management and describe a solution that would be effective.Use at least three (4) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.Your assignment must follow these formatting requirements:Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.Include charts or diagrams created in Excel, Visio, MS Project, or one of their equivalents such as Open Project, Dia, and OpenOffice. The completed diagrams / charts must be imported into the Word document before the paper is submitted.The specific course learning outcomes associated with this assignment are:Analyze information security systems compliance requirements within the Workstation and LAN Domains.Use technology and information resources to research issues in security strategy and policy formation.Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions.
by admin | Sep 23, 2022 | Information Systems | 0 comments
Assignment 4: Designing Compliance Within the LAN-to-WAN Domain Imagine you are an Information Systems Security Officer…
A professional Academic Service Provider
Distinguished Writers Ensure Accountability, Confidentiality, High-Quality, and Timely Execution
Distinguished Writers comprises of well-trained professionals striving to give our clients an awesome experience. We engage with our customers throughout the learning process to ensure they are comfortable with both their classwork and homework in order to achieve excellent grades. The team is well-balanced across different fields to suit our clients. Our diversified fields include article writing, thesis proposals, project management, coursework, essay writing, and dissertations among others.Fundamental Values
1. Accountability: The company values professionalism in all our undertakings. As such, we interact transparently with our customers.
2. Confidentiality: The company does not disclose anything to third-parties, and our interactions with customers remain confidential.
3. High-Quality The products are thoroughly proofread and counter-checked to ensure they meet the expected quality levels.
Guarantees
4. Quality is a Guarantee: Our writers are accurately matched with their area of expertise to ensure proper quality is maintained. We are also equipped with adequate software to guarantee error-free products.
5. Money Back Policy: As a client-oriented service, we offer 100% refund for the following: if we received a double payment from you; if you placed similar orders twice (or more) and paid for all of them; the writer has not been assigned; you asked to cancel the order within 20 minutes after placing it; an e-Check payment has been sent (the Dispute Manager will contact you accordingly). Other cases involve a comprehensive investigation by the Dispute Department and feedback given within 24 hours. We value our customers; therefore, the process will be fair, fast, and precise.
5 .Free Revisions: You can request for revisions at no additional cost. Nonetheless, this does not include complete change of the initial order instructions and if it is not past ten days upon your approval.
6. 24/7 Customer Support: Our support staff are always online to provide any assistance when needed
Ordering Process
NOTE: If you have any question, always contact our support team before the commencement of your project. ALL THE BEST”:
Recent Comments