Conduct a security analysis baseline of the it systems

Assignment Help Computer Network Security
Reference no: EM132389706 , Length: 12

Step : Conduct a Security Analysis Baseline

In the first step of the project, you will conduct a security analysis baseline of the IT systems, which will include a data-flow diagram of connections and endpoints, and all types of access points, including wireless. The baseline report will be part of the overall security assessment report (SAR).

You will get your information from a data-flow diagram and report from the Microsoft Threat Modeling Tool 2016. The scope should include network IT security for the whole organization. Click the following to view the data-flow diagram:  [diagram and report]

Include the following areas in this portion of the SAR:

1. Security requirements and goals for the preliminary security baseline activity.

2. Typical attacks to enterprise networks and their descriptions. Include Trojans, viruses, worms, denial of service, session hijacking, and social engineering. Include the impacts these attacks have on an organization.

3. Network infrastructure and diagram, including configuration and connections. Describe the security posture with respect to these components and the security employed: LAN, MAN, WAN, enterprise. Use these questions to guide you:

a. What are the security risks and concerns?

b. What are ways to get real-time understanding of the security posture at any time?

c. How regularly should the security of the enterprise network be tested, and what type of tests should be used?

d. What are the processes in play, or to be established to respond to an incident?

e. Workforce skill is a critical success factor in any security program, and any security assessment must also review this component. Lack of a skilled workforce could also be a security vulnerability. Does the security workforce have the requisite technical skills and command of the necessary toolsets to do the job required?

f. Is there an adequate professional development roadmap in place to maintain and/or improve the skill set as needed?

g. Describe the ways to detect these malicious code and what tactics bad actors use for evading detection.

4. Public and private access areas, web access points. Include in the network diagram the delineation of open and closed networks, where they co-exist. In the open network and closed network portion, show the connections to the Internet.

5. Physical hardware components. Include routers and switches. What security weaknesses or vulnerabilities are within these devices?

6. Operating systems, servers, network management systems.

a. data in transit vulnerabilities

i. endpoint access vulnerabilities

ii. external storage vulnerabilities

iii. virtual private network vulnerabilities

iv. media access control vulnerabilities

v. ethernet vulnerabilities

7. Possible applications. This network will incorporate a BYOD (bring your own device) policy in the near future. The IT auditing team and leadership need to understand current mobile applications and possible future applications and other wireless integrations.

You will use some of this information in Project 2 and also in Project 5. The overall SAR should detail the security measures needed, or implementations status of those in progress, to address the identified vulnerabilities.

Include:

1. remediation
2. mitigation
3. countermeasure
4. recovery

Through your research, provide the methods used to provide the protections and defenses.

From the identification of risk factors in the risk model, identify the appropriate security controls from  NIST SP 800-53A  and determine their applicability to the risks identified.

The baseline should make up at least three of the 12 pages of the overall report.

When you have completed your security analysis baseline, move on to the next step, in which you will use testing procedures that will help determine the company's overall network defense strategy.

Attachment:- Outline.rar

Reference no: EM132389706

Questions Cloud

LAS450 Political Theory Assignment Problem : LAS450 Political Theory assignment help and solutions, National Louis University, assessment help - Develop a narrated visual presentation.
What is the apr on loan : Virginia has just been quoted what appears to be a very competitive loan for $2,000 to be paid back in 24 monthly payments of $96.66 with a finance charge of $2
What is the company''s cost of capital : What is the company's cost of capital k o? Provide your answer as a percentage to two decimal places. Do not enter the % sign.
What is the cost of capital for bank overdraft : What is the cost of capital for bank overdraft (kbo) if the overdraft rate is 8.8 % pa compounded 12 times a year
Conduct a security analysis baseline of the it systems : Conduct a security analysis baseline of the IT systems, which will include a data-flow diagram of connections and endpoints, and all types of access points.
What price will apc pick to maximize its profit : What price will APC pick to maximize its profit? What will be its profit at this price? What price will LPC pick to maximize its profits? What will be its prof
What are the 4 basic financial statements : What are the 4 basic financial statements? What information do they contain? How can they be use to improve decision-making?
What is the annual growth rate of the dividends : The current market price of the share is $16 and shareholders require a return of 10 % pa. What is the annual growth rate (g) of the dividends?
What is the long-term growth rate : What is the long-term growth rate and cost of capital of Federal Bank?

Reviews

len2389706

10/19/2019 3:40:06 AM

security assessment 12 pages is needed Lab report with all findings and screenshots is needed. Use screenshots from the lab. And a executive summary is needed. 3 different papers Step 1 There is a lab report 12 pages that I need Step 2 A executive summary Step 3 And a security assessment All is a project Also look at the excel spread sheet I sent you everything is there Security assessment is 12 pages Executive summary And lab report is however many pages you can make it also incorporate screen shots & Please add all references that is used this is very important

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd