Describe the manner in which your solution will protect

Assignment Help Management Information Sys
Reference no: EM131739017

Assignment : Designing Compliance within the LAN-to-WAN Domain

Note: Review the page requirements and formatting instructions for this assignment closely. Graphically depicted solutions, as well as the standardized formatting requirements, do NOT count toward the overall page length.

Imagine you are an Information Systems Security Officer for a medium-sized financial services firm that has operations in four (4) states (Virginia, Florida, Arizona, and California). Due to the highly sensitive data created, stored, and transported by your organization, the CIO is concerned with implementing proper security controls for the LAN-to-WAN domain.

Specifically, the CIO is concerned with the following areas:

  • Protecting data privacy across the WAN
  • Filtering undesirable network traffic from the Internet
  • Filtering the traffic to the Internet that does not adhere to the organizational acceptable use policy (AUP) for the Web
  • Having a zone that allows access for anonymous users but aggressively controls information exchange with internal resources
  • Having an area designed to trap attackers in order to monitor attacker activities
  • Allowing a means to monitor network traffic in real time as a means to identify and block unusual activity
  • Hiding internal IP addresses
  • Allowing operating system and application patch management

The CIO has tasked you with proposing a series of hardware and software controls designed to provide security for the LAN-to-WAN domain.

The CIO anticipates receiving both a written report and diagram(s) to support your recommendations.

Write a three to five page paper in which you:

1. Use MS Visio or an open source equivalent to graphically depict a solution for the provided scenario that will:

a. filter undesirable network traffic from the Internet

b. filter Web traffic to the Internet that does not adhere to the organizational AUP for the Web

c. allow for a zone for anonymous users but aggressively controls information exchange with internal resources

d. allow for an area designed to trap attackers in order to monitor attacker activities

e. offer a means to monitor network traffic in real time as a means to identify and block unusual activity

f. hide internal IP addresses

2. Identify the fundamentals of public key infrastructure (PKI).

3. Describe the manner in which your solution will protect the privacy of data transmitted across the WAN.

4. Analyze the requirements necessary to allow for proper operating system and application patch management and describe a solution that would be effective.

5. Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Note: The graphically depicted solution is not included in the required page length.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

• Include charts or diagrams created in Visio or an equivalent such as Dia or OpenOffice. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

Reference no: EM131739017

Questions Cloud

Cpas satisfy the independence standard to audit mortis : Does Ernst and Notold, CPAs satisfy the independence standard to audit Mortis? And Explain?
Explain the significance of polarity on the world system : Drawing on the Cold War and US invasions of Afghanistan and Iraq, explain the significance of polarity on the world system
Profitable action for the dealer bank : Overnight repo agreement and finance the bonds using borrowed money for a year. Why might this be a profitable action for the dealer bank?
Describe the current issues in patent law : You discover a new type of basketball "dunk" that no one has ever thought of before. Can you patent it so that only you can use it? Analyze.
Describe the manner in which your solution will protect : Describe the manner in which your solution will protect the privacy of data transmitted across the WAN.
Using asset market equilibrium conditions : Using asset market equilibrium conditions explain how changes in output, Y , affect exchange rate.
The best science fiction is usually about our relationship : we tend to humanize it more and more - but the robot doesn't actually change or start seeming more human
Major impacts has email had on interpersonal communication : What two major impacts has email had on interpersonal communication?
What users do to protect themselves against antivirus scams : What can users do to protect themselves against antivirus scams and against unethical manufacturers of antivirus programs?

Reviews

Write a Review

Management Information Sys Questions & Answers

  What are my key development needs in my current role

What are my key development needs in my current role? As I consider my long term aspirations, what are my key development areas I should address now to move ahead?

  Question about organizational paradigms

Question about Organizational Paradigms - impact the relationship between the organizations, its environment, and the organizational workers.

  Academic response to operations management

Academic response to Operations Management - Could you please specify separate recommended decisions for software design

  Apply ethics to information systems

Write an analysis of ethical considerations for maintaining privacy and confidentiality of customer data within your organization. Address the following issues in your analysis: Define ethics. Apply ethics to information systems

  How they can be used to facilitate organizational purposes

Politics of Information - some of the "Politics of Information" and how they can be used to facilitate organizational purposes?

  Briefly describe how fuzzy membership functions

Briefly describe how fuzzy membership functions and fuzzy rules could be automatically constructed from a large set of data such as that given in the table above.

  Fundamentals of analytics and business intelligence

Fundamentals of Analytics and Business Intelligence - Provide the answer to any one (1) of the questions from the Questions for Discussion OR Exercises section of chapter 13 (Make sure to identify the section and the question number).

  Describe possible lan topologies that could be used

Explain troubleshooting approaches to network problems for informing potential solutions to network errors and ensuring rapid resolution.

  Discuss the advantages of a database management

Discuss the advantages of a database management approach to the file processing approach? Give examples to illustrate your answer.

  Briefly describe a health care provider of your choice

Briefly describe a health care provider of your choice and determine the best method(s) to gather and respond to market intelligence on opportunities and threats specific to that organization. Explain your rationale.

  Evaluate the challenges associated with each trend

Healthcare Reform and 21st Century Healthcare Information Systems, Analyze and evaluate the implications of 3-5 major initiatives associated with healthcare reform on the designing and planning of 21st century healthcare information systems

  Geographic location of job salary included

geographic location of job salary included, does this job interest you? why/whynot and why are health informatician position such as the one you found critical to health care organization, to the community and to individuals

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd