Detailed network security recommendations

Assignment Help Computer Network Security
Reference no: EM13727815

After transitioning out of the military, you were contracted by a medium-sized start-up company that processes credit card transactions on a daily basis. The Chief Executive Officer (CEO) and other business staff have no knowledge of network security or the threats they face. They have an open position for a Chief Information Security Officer (CISO), but have yet to fill it. Thus, they hire you for your expertise in network security, firewalls, and VPN solutions.


This is a short term engagement that lasts 30 days. As the company's subject matter expert/consultant, the CEO wants a 4-6 page report at the end of your assignment. The CEO tells you they will have remote users, so firewall and VPN technologies are needed. They provide you with the following report outline to use:

1.0 Introduction

2.0 Overview of network security fundamentals, security threats, and issues (discuss from a company wide standpoint).

3.0 Detailed network security recommendations

4.0 Summary

Note:

Section 3.0 should include:

  • Fundamentals of firewalls and VPNs
  • Recommendations for firewall and VPN solutions for the new company
  • Recommendations for implementing your proposed solutions
  • Practices that you will use to ensure security within the enterprise if they hire you long term. You may make these as sub-sections if you'd like (e.g., 3.1 Fundamentals of Firewalls and VPNs, 3.2 Recommended Firewall and VPN Solutions, etc.)


Section 4.0:

This section should be short, a paragraph or two.

Requirements:

  • Your submission should be 4 to 6 pages long (not including the title page and the reference page).
  • All sections are represented (Sections 1.0 - 4.0).
  • Paper is in APA format with proper citations and references.
  • 1" margins.
  • In Times New Roman or Arial font, font size 12.
  • Utilized correct grammar and spelling.
  • Include and cite references as needed.
  • The key to this assignment is to demonstrate your understanding of the topics, not to re-word the text or reference material.

Reference no: EM13727815

Questions Cloud

Explain the importance of making effective product : Explain the importance of making effective product decisions for an organisation, Explain the advantages/disadvantages of using the direct/indirect distribution
Discuss the three important techniques to promote creativity : Discuss the three important techniques that managers can use to promote creativity in group decision-making. As a manager, which of the three techniques do you feel you might use
What struck you in particular as you explored : What struck you in particular as you explored the course materials this week? What insights have you had? What have you been struggling with?
Overcome resistance to change : In your opinion, why do people resist change? How can leaders overcome resistance to change in their organization? What skills or character traits are helpful for leaders when managing the change process?
Detailed network security recommendations : As the company's subject matter expert/consultant, the CEO wants a 4-6 page report at the end of your assignment. The CEO tells you they will have remote users, so firewall and VPN technologies are needed.
How are leaders leading in the 21st century : Choose the CEO of one of the following organizations for this assignment: Google, Zappos, Southwest Airlines, Hewlett Packard, Xerox, W.L. Gore, DuPont, or Procter & Gamble. Use the Internet to investigate the leadership style and effectiveness of..
Identify the section of the constitution or its amendment : Identify the section of the Constitution or its amendment that you have chosen
What is the principal strategy the ceo of kfc is pursuing : What is the principal strategy the CEO of KFC is pursuing. What are its advantages. What are some potential disadvantages of pursuing this strategy? How might this hurt the company's competitive advantage in the future
Compare and contrast the teleological and deontological : Compare and contrast the teleological, deontological, virtue, and justice perspectives of moral philosophy, Analyze Kohlberg's stages of moral development and determine which stage best describes the majority of your coworkers (or classmates)

Reviews

Write a Review

Computer Network Security Questions & Answers

  Cluster architecture for the servers and databases

What type of OS to use along with the file system and why is this architecture is better than others? Will you use the same OS for servers and Desktops? Will your file system of choice provide security?

  Explain the meaning the terms granularity

In reference to access control explain the meaning the terms "granularity". Discuss the trade-off between granularity and efficiency.

  Compare x.509 pki and pgp pki in different aspects

Compare X.509 PKI and PGP PKI in different aspects, e.g. Certs format, user identification, key management, scalability, usage, applications, business models, etc.

  When deciding on the proper architecture to run an

the data that organizations gather about their users can vary between strictly commercial information what books did

  Encryption and decryption of the vigenere cipher

Implement both encryption AND decryption of the Vigenere cipher with 26 English letters and 1 space character "_" in its tableau as shown in class.

  A business wants to share its customer account database

a business wants to share its customer account database with its trading partners and customers while at the same time

  Identify the virus software running on your computer

Explain the origin and effects of at least 3 different types of viruses/malicious programs as well as how your computer can become vulnerable to these threats.

  Expected time to find all users passwords

Assume that eight more characters were added to the password and that the DES algorithm was changed so as to use all 16 password characters. What would be the expected time to find all users' passwords using a dictionary attack?

  Network security policy plan

Explain why you believe these are important, and include examples of security breaches that can occur if these items are not outlined and followed.

  List three key things employees remember on data privacy

List at three key things employees should remember on data privacy, security practices, and the legal implications of data privacy. The document should be something which draws someone to look at it while still maintaining professional appearan..

  Choose two firms which offer computer security outsourcing

you have been asked to help decide whether to outsource security or keep the security function within the firm. search

  Consider the following authentication protocol

Using RSA, perform an encryption then a decryption of the message M=5 using p=3, q=11, and e=7. (please add explanation, Show all your work, not just the final answer.)

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd