Analyze and identify the fundamentals of pki

Assignment Help Computer Networking
Reference no: EM13805217

Assignment: Designing Compliance Within the LAN-to-WAN Domain

Imagine you are an Information Systems Security Officer for a medium-sized technology firm that has two (2) sites (one located in Virginia, and the second in California). Due to the highly sensitive data created, stored, and transported by your organization, the CIO is concerned with implementing proper security controls for the LAN-to-WAN domain. Specifically, the CIO is concerned with the following areas:

  • Protecting data privacy across the WAN
  • Filtering undesirable network traffic from the Internet
  • Filtering traffic to the Internet that does not adhere to the organizational AUP for the Web
  • Having a zone that allows access for anonymous users but aggressively controls information exchange with internal resources
  • Having an area designed to trap attackers in order to monitor attacker activities
  • Allowing a means to monitor network traffic in real time as a means to identify and block unusual activity
  • Hiding internal IP addresses
  • Allowing operating system and application patch management

The CIO has tasked you with proposing a series of hardware and software controls designed to provide security for the LAN-to-WAN domain. The CIO anticipates receiving both a written report and diagram(s) to support your recommendations.

Write a four to six (4-6) page paper in which you:

  1. Suggest a solution for the provided scenario that will:
    1. filter undesirable network traffic from the Internet
    2. filter Web traffic to the Internet that does not adhere to the organizational AUP for the Web
    3. allow for a zone for anonymous users but aggressively controls information exchange with internal resources
    4. allow for an area designed to trap attackers in order to monitor attacker activities
    5. offer a means to monitor network traffic in real time as a means to identify and block unusual activity
    6. hide internal IP addresses

Analyze and identify the fundamentals of PKI in writing and depict graphically using MS Visio or its open source alternative software. Note: The graphically depicted solution is not included in the required page length.

Examine and describe how your solution will protect the privacy of data transmitted across the WAN and why this solution would be effective.

Analyze the requirements necessary to allow for proper operating system and application patch management and describe a solution that would be effective.

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Reference no: EM13805217

Questions Cloud

Write an essay about freedom of speech and religion in us : Write an essay about Freedom of speech and religion in the United States.
How do unjust laws justify readers assertion to break law : From the resistance to Civil Government of The riverside reader. How do unjust laws justify his assertion to break the law?
Risk management and effective communication planning : Assignment: Risk Management and Effective Communication Planning, Imagine that you have been asked to participate as a project manager for a website renovation project for a clothing department store
Which ted talk have you liked the most and why : Which Ted talk have you liked the most and why? How did it "speak" to you and in what ways did it change or enhance your view?
Analyze and identify the fundamentals of pki : Analyze and identify the fundamentals of PKI in writing and depict graphically using MS Visio or its open source alternative software. Note: The graphically depicted solution is not included in the required page length
Training requirements in the hazard communication : Compare and contrast the training requirements in the Hazard Communication Standard (HAZCOM) (1910.1200) and the Lead Standard (1910.1025). If an employee is exposed to lead above the action level, would the training specified in the HAZCOM standa..
The significance of the slope coefficient. : Evaluating and reporting the value of the correlation coefficient (r); report on the statistical significance of the parameter and provide a scatterplot.
Corporate-level and international strategies : To support your work, use your course and text readings and also use outside sources. As in all assignments, cite your sources in your work and provide references for the citations in APA format. Length of this paper should contain a minimum of 40..
How did wal-mart corporation integrate mti and strategy : View the following video: A Brief History of Wal-Mart. Identify aspects of Porter's Five Forces that impacted Wal-Mart. How did Wal-Mart Corporation integrate M.T.I and strategy

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd