Conduct a security analysis baseline of the it systems

Assignment Help Computer Network Security
Reference no: EM132389706 , Length: 12

Step : Conduct a Security Analysis Baseline

In the first step of the project, you will conduct a security analysis baseline of the IT systems, which will include a data-flow diagram of connections and endpoints, and all types of access points, including wireless. The baseline report will be part of the overall security assessment report (SAR).

You will get your information from a data-flow diagram and report from the Microsoft Threat Modeling Tool 2016. The scope should include network IT security for the whole organization. Click the following to view the data-flow diagram:  [diagram and report]

Include the following areas in this portion of the SAR:

1. Security requirements and goals for the preliminary security baseline activity.

2. Typical attacks to enterprise networks and their descriptions. Include Trojans, viruses, worms, denial of service, session hijacking, and social engineering. Include the impacts these attacks have on an organization.

3. Network infrastructure and diagram, including configuration and connections. Describe the security posture with respect to these components and the security employed: LAN, MAN, WAN, enterprise. Use these questions to guide you:

a. What are the security risks and concerns?

b. What are ways to get real-time understanding of the security posture at any time?

c. How regularly should the security of the enterprise network be tested, and what type of tests should be used?

d. What are the processes in play, or to be established to respond to an incident?

e. Workforce skill is a critical success factor in any security program, and any security assessment must also review this component. Lack of a skilled workforce could also be a security vulnerability. Does the security workforce have the requisite technical skills and command of the necessary toolsets to do the job required?

f. Is there an adequate professional development roadmap in place to maintain and/or improve the skill set as needed?

g. Describe the ways to detect these malicious code and what tactics bad actors use for evading detection.

4. Public and private access areas, web access points. Include in the network diagram the delineation of open and closed networks, where they co-exist. In the open network and closed network portion, show the connections to the Internet.

5. Physical hardware components. Include routers and switches. What security weaknesses or vulnerabilities are within these devices?

6. Operating systems, servers, network management systems.

a. data in transit vulnerabilities

i. endpoint access vulnerabilities

ii. external storage vulnerabilities

iii. virtual private network vulnerabilities

iv. media access control vulnerabilities

v. ethernet vulnerabilities

7. Possible applications. This network will incorporate a BYOD (bring your own device) policy in the near future. The IT auditing team and leadership need to understand current mobile applications and possible future applications and other wireless integrations.

You will use some of this information in Project 2 and also in Project 5. The overall SAR should detail the security measures needed, or implementations status of those in progress, to address the identified vulnerabilities.

Include:

1. remediation
2. mitigation
3. countermeasure
4. recovery

Through your research, provide the methods used to provide the protections and defenses.

From the identification of risk factors in the risk model, identify the appropriate security controls from  NIST SP 800-53A  and determine their applicability to the risks identified.

The baseline should make up at least three of the 12 pages of the overall report.

When you have completed your security analysis baseline, move on to the next step, in which you will use testing procedures that will help determine the company's overall network defense strategy.

Attachment:- Outline.rar

Reference no: EM132389706

Questions Cloud

LAS450 Political Theory Assignment Problem : LAS450 Political Theory assignment help and solutions, National Louis University, assessment help - Develop a narrated visual presentation.
What is the apr on loan : Virginia has just been quoted what appears to be a very competitive loan for $2,000 to be paid back in 24 monthly payments of $96.66 with a finance charge of $2
What is the company''s cost of capital : What is the company's cost of capital k o? Provide your answer as a percentage to two decimal places. Do not enter the % sign.
What is the cost of capital for bank overdraft : What is the cost of capital for bank overdraft (kbo) if the overdraft rate is 8.8 % pa compounded 12 times a year
Conduct a security analysis baseline of the it systems : Conduct a security analysis baseline of the IT systems, which will include a data-flow diagram of connections and endpoints, and all types of access points.
What price will apc pick to maximize its profit : What price will APC pick to maximize its profit? What will be its profit at this price? What price will LPC pick to maximize its profits? What will be its prof
What are the 4 basic financial statements : What are the 4 basic financial statements? What information do they contain? How can they be use to improve decision-making?
What is the annual growth rate of the dividends : The current market price of the share is $16 and shareholders require a return of 10 % pa. What is the annual growth rate (g) of the dividends?
What is the long-term growth rate : What is the long-term growth rate and cost of capital of Federal Bank?

Reviews

len2389706

10/19/2019 3:40:06 AM

security assessment 12 pages is needed Lab report with all findings and screenshots is needed. Use screenshots from the lab. And a executive summary is needed. 3 different papers Step 1 There is a lab report 12 pages that I need Step 2 A executive summary Step 3 And a security assessment All is a project Also look at the excel spread sheet I sent you everything is there Security assessment is 12 pages Executive summary And lab report is however many pages you can make it also incorporate screen shots & Please add all references that is used this is very important

Write a Review

Computer Network Security Questions & Answers

  Identify suitable products that could used to resolve issues

Some issues may require the acquisition of new software and hardware; you should identify suitable products that could be used to resolve the issues.

  Recall that a computer virus is malware

Recall that a computer virus is malware that relies on someone or something (other than itself) to propagate from one system to another. Write a computer virus that can be written to other empty text documents by running the batch program.

  Prepare a presentation about wireless attacks

Prepare a Presentation about Wireless attacks. Detailed description of the area researched, Technology involved in the area and Future trends in the area.

  Classify vulnerability using the risos model

Classify this vulnerability using the RISOS model, classify this vulnerability using the PA model and justify your answer

  Discuss the approaches to physical security

While logical access to systems, in this internet age, is a very important subject, the control of physical access to the assets of the organization is also.

  Why do servers require configuration and logging

What would be the first argument of csc_abc_prepare() and what would be the first argument of csc_abc_dolt() - Why do servers require configuration and logging?

  How did you promote student readiness for learning

How did you promote student readiness for learning, a positive learning environment, supportive interactions, engagement, and enthusiasm?

  Can viruses be hidden in pdf files

Can viruses be hidden in PDF files? In what ways? What remediation steps would you recommend to a non-tech savvy user when dealing with viruses and malware?

  Report about performance optimization of voip network

Prepare report about performance optimization of VoIP network using riverbed Modeler - You need to prepare this report to this steps

  Explain the fundamentals of packet switching

Explain the fundamentals of Packet Switching and how it works and explain the fundamentals of Circuit Switching and how it works.

  New technologies using sophisticated anti-copying measures

Which is more probably to be effective in protecting intellectual property in digital media like CDs and DVDs: tougher copyright laws or new technologies incorporating more sophisticated anti-copying measures?

  Compare and contrast different approaches to system analysis

MN611 - System Architecture - Melbourne Institute of technology - Cloud Based Smart Application Management - Compare and contrast different approaches to system

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd