Assignment on csci 620

Assignment Help Other Engineering
Reference no: EM13779730

Description
Please read carefully the case study that you have to solve. Your statements have to be logically justified.

Your diagrams have to be detailed and well explained. The case study is open ended, so you will have to make assumptions and consistently use them throughout the entire paper.

You can use the book, other network security related books, the presentations and the Internet as references. Any source used has to be referenced.

Case Study

You have been named the CIO administrator for a small size bank, which has nine branches and the headquarters which also works as a bank. Your responsibility is to come up with a plan for securing the network infrastructure, which includes number of servers,

network security devices, desktops, laptops and handheld devices. The plan should be carefully crafted to show all the necessary details in craftingthe security policies, and mechanisms to enforce the policies for the IT of the bank

 An understanding of the security issues the company is facing in order to conduct its business has to be reflected in the security aspects of the infrastructure (you should justify why a security measure is taken and how it will affect the business of the bank).

The bank network consists of a main site, a backup site and nine branch sites. Each branch network connects to the main site through a dedicated connection. The branches are each handling investment business as well as regular banking business. Three of the branches are located in the downtown area in very close proximity (two blocks apart, but the buildings are adjacent).

The branches need to have access to the central database of the bank besides their own databases. Each of the branches has roughly 50 employees except for the headquarters which has 150. Ten percent of the employees are investment bankers who need constant access to the internet for market updates. Given the nature of the business, all the employees require email access.

Internet access is also required. The bank uses customized software to interface to the databases and provides the customers with web access to their accounts as well as to other financial tools. Each branch has its own database but periodically the information from this database updates the main database. However, the management, which is located at the headquarters, must have access to all the information.

he bank also has a backup site. The Human Resources department has its own database and so does the payroll department. Each of these departments has a staff of 10 people and does not need access to the other databases.

The IT department employs roughly 80 people, 40 of which are located at the headquarters. The software development for the bank is partly done at the headquarters by a group of 10 developers and partly outsourced to a large software development firm.

Your plans should contain detailed information of how the access to networks at the branches, at the headquarters and at the backup site will be controlled. Physical security should also be addressed. Given the diverse staff employed by the firm,

it is necessary to have detailed policies regarding file access, system access, documents access, systems and network security. Choices of OS, security software and hardware have to be justified. Vulnerability analysis is also done every year.

Reference no: EM13779730

Questions Cloud

Explain indirect financial benefit from a bariatric center : Identify and explain the indirect financial benefit from a bariatric center of excellence to various hospital departments, which would result from this hospital based program.
Learning team internal policies : Your firm must establish internal policies regarding the creation of business contracts as well as electronic communications (e-mail) including document retention. Draft the internal policies as a team.
Assumptions interfere with critical thinking : What kinds of assumptions interfere with critical thinking? What are a few steps that can help you to refine your position on issues that meet the tests of logic?
Discuss obesity as a social problem : Based on your research, and personal reflection on which theoretical perspective is most like your own views, which theory does the best job at explaining the causes of obesity? Based on this analysis, explain why or why not the issue of obesity ..
Assignment on csci 620 : Your diagrams have to be detailed and well explained. The case study is open ended, so you will have to make assumptions and consistently use them throughout the entire paper.
Decision making for financial-environmental : Given the current pressures on China, Jamaica, and America expressed in the article, how would ethics play a role in decision making for financial, environmental, and cultural issues?
Self-disclosure, gender, and communication issues : Do you agree that self-disclosure is important and directly related to satisfaction in relationships? Why or why not?
Discuss the pros and cons of private vs public defense : Write paper about Discuss the pros and cons of private vs. public defense
How do you insert a text box : When changing themes the basic design of the layout is the same but some of the placeholders might be moved around in different positions.

Reviews

Write a Review

Other Engineering Questions & Answers

  How to prevent type of corrosion

Offer an explanation for why cracking might have occurred and provide at least three suggestion on how to prevent this type of corrosion.

  Formulate dr. konurs maximum-flow problem as a linear model

Represent Dr. Konur's problem on a network by defining the nodes, node values (if any), arcs, arc costs (if any), arc capacities (if any) and state it as a maximum-flow problem and mathematically formulate Dr. Konur's maximum-flow problem as a lin..

  Enmin 5120 tunnelling and mine development a continuous

a continuous miner has the following specifications ltbrgtcutter drum width 3.2m ltbrgtdrum diameter across the picks

  Write procedures to manipulate queues

Write a procedure (make-queue) that produces independent first-in-first-out queue objects, using a message-passing style.

  Project management for engineering

economic feasibility of the projec, restrictions are the economics of the project based,  technical feasibility for the project

  What age group is your website aimed at and why

The questions and answers are to be presented in a style suitable for a FAQ page.

  Describe the method of undertaking an anemometer traverse

Calculate the volumetric flow rate and the mass flow rate assuming that the air has a density of 1.2 kg/m3 and describe the method of undertaking an anemometer traverse for a mine airway

  Present a research paper on the topic - reservoir

present a research paper on the topic - reservoir characterisationgive preferences that will provides students with a

  Assignement on mars climate orbiter (mco)

The mission of the MCO was to gather Martian climate data and serve as a relay station for the Mars Planet Lander (MPL), which would follow shortly thereafter. For nine months the MCO traveled through space. Some unplanned course corrections were ..

  How is personal health record utilised in other organisation

Demonstrate effective communication by composing writing that communicates ideas, meaning and/or argument in a format that broadly follows conventions in the information systems field.

  Task 1part onea research strategy is a plan of action that

task 1part onea research strategy is a plan of action that gives direction to your efforts enabling you to conduct your

  Spatial and temporal analysis of travel patterns of no-car

spatial and temporal analysis of travel patterns of no-car householdsperth west australia is a low population density

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd