Defense in depth-process of implementing security frequently

Assignment Help Basic Computer Science
Reference no: EM133190365

Assignment - Defense in Depth

The process of implementing security frequently opens one's eyes to other forms of security not previously considered. In this two-part assignment, you should experience just that. This assignment focuses on a model of implementing security in layers, which, in many cases, requires a network that is designed accordingly. The specific course learning outcome associated with this assignment is:

Recommend best security practices to achieve business objectives based on risk assumptions.

Instructions

Design a network that incorporates the following:

One corporate site (Chicago).

All servers exist here (web server, file server, print server, mail server, FTP server).

Connection to the Internet (50 MBps).

300 employees who only need access to local corporate resources and the Internet.

One remote site (8 miles away).

20 employees who need access to all resources at corporate, plus the Internet.

Connection to the Internet (3 MBps).

Part 1

Use Microsoft Visio or an open-source alternative, such as Dia Diagram Editor, to:

Create a network diagram with defense in depth in mind, citing specific, credible sources that support the design and depicting at least four-fifths of the following:

All necessary network devices (routers, switches and/or hubs, firewalls, VPNs, proxies, and others).

The interconnections between network devices.

Connections to end-user (client) devices (desktops, laptops).

Connections from the Internet cloud to the network input.

Part 2

Describe the flow of data through the network, citing specific, credible sources.

Assume data begins at the remote site.

Data flow may be monitored by an IDS.

Explain all three elements of the CIA triad and how isolating by network functions helps deliver a layered approach, citing specific, credible sources that support your assertions and conclusions.

Support your main points, assertions, arguments, or conclusions with at least four specific and credible academic sources synthesized into a coherent analysis of the evidence.

Reference no: EM133190365

Questions Cloud

What do you think the future of quality practice : What do you think the future of quality practice will be in regard to using data from HIM systems? Does it change your approach to care
Write a report on your observations of your Gemba : MHA 505 Systems Thinking in Health Care Environments Assignment Help and Solution - University of Phoenix - Homework Help - Report on your observations of Gemba
Examine and research chronic disease : Examine and research 1 chronic disease (e.g., heart disease, stroke, cancer, diabetes, arthritis, obesity) and write a paper
IT332-6-Differentiate in Various Computer Operating Systems : IT332-6-Differentiate between various computer operating systems. Quite a variety of operating systems are used in everyday devices and computer systems.
Defense in depth-process of implementing security frequently : The process of implementing security frequently opens one's eyes to other forms of security not previously considered.
Construct paper on cybersecurity awareness in healthcare : Construct a 2-3 page paper focusing on cybersecurity awareness in healthcare and ideas on how to reduce risk of data breaches
Explain the importance of validity and reliability : Explain the importance of validity and reliability in diagnostic testing or research. Describe how validity relates to sensitivity and specificity in diagnostic
Discuss the strengths of the current surveillance systems : Disease Surveillance in Public Health Discussion - Discuss the strengths of the current surveillance systems, the gaps you identified, and why these gaps occur
Difference between efficiency and effectiveness : Why does the project team require a project scope statement prior to planning procurements? What is the difference between efficiency and effectiveness?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Briefly mention the set of ai-based rules

You are to develop AI behind a generic Tic-Tac-Toe game, where a player can pay against computer. Briefly mention the set of AI-based rules that have to check on either side to decide the next move in a game. How would you determine a winner/cat's..

  Orientated nature of java with help of segments of codes

Explain your understanding of methods, objects, classes, and the object-orientated nature of Java with the help of segments of codes

  Security concerns highlighted by server sprawl

Discuss the security concerns highlighted by server sprawl and how you would propose to solve those in your (real or hypothetical) organization.

  Describe the seven primary categories of access

Describe the seven primary categories of access controls system options managers may choose to implement.

  IT infrastructure security policies

Participate in a discussion on best practices for IT infrastructure security policies in domains other than the User Domain.

  What would be the financial advantage of a malware designer

What would be the financial advantage of a malware designer to create lots of different malicious code instances that all exploit the same vulnerability yet have different malware signatures?

  Cell e2 that will calculate gross pay.

Part 1: Write a formula as if it were in Cell E2 that will calculate gross pay. Write the formula so that it may be copied to the other employees without modification.

  Depending on how you label the axes

Is it true that sometimes directly related variables will graph as an up sloping line and sometimes they will graph as a down sloping line depending

  Create the world for the biplane acrobatic air-show

When you have the fly Forward and barrel methods working, add fly Left and fly Right event handling methods for the left and right arrow keys to steer the biplane left or right.

  Input values for the projected cost of a vacation

Create the logic for a program that accepts input values for the projected cost of a vacation and the number of months until vacation. Pass both values to a method that displays the amount you must save per month to achieve your goal.

  Cloud computing are worth threats and vulnerabilities

Do you feel the benefits of cloud computing are worth the threats and vulnerabilities?

  Determining the common communication devices

What common communication devices are used in homes to connect to the internet and remote networks and what capabilities do these devices provide?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd