Evaluate the perimeter security

Assignment Help Computer Engineering
Reference no: EM132292211

ASSIGNMENTS

• From the devices and systems identified in the GFI Corporate Network Topology, conduct a thorough asset inventory, assign monetary values to each asset (quantitative), and assign a priority value for each asset (qualitative) that could be used to determine which assets are most critical for restoral in the event of a catastrophic event or attack.

• Evaluate the perimeter security, make a list of access points internal and external(remote), identify vulnerabilities and make suggestions for improvements to perimeter and network security.

• Evaluate the remote access infrastructure, identify vulnerabilities and suggest security
improvements to mitigate risks to remote access.

• Address the COO's concern over the mobility security and design a secure mobile computing (smart phones, tablets, laptops, etc.) in terms of authentication technologies and data protection.

• Identify wireless vulnerabilities and recommend what safeguards, authentication technologies, and network security to protect data should be implemented.

• Evaluate the authentication protocols and methodologies within the wired, wireless, mobility and remote access environments and suggest improvements to secure authentication for GFI.

• Evaluate the web system protocols and vulnerabilities within the Intranet server and suggest secure protocol improvements to improve security for web authentication.

• Design a cloud computing environment for the company with a secure means of data protection at rest, in motion and in process.

• Assess all known vulnerabilities on each asset in this environment and impacts if compromised.

• Using the asset inventory and the assigned values (monetary and priority) conduct a quantitative and qualitative risk assessment of the GFI network.

• Recommend risk mitigation procedures commensurate with the asset values from your asset inventory. Feel free to redesign the corporate infrastructure and use any combination of technologies to harden the authentication processesand network security measures.

• Provide an Executive Summary.

• You are welcome to make assumptions for any unknown facts as long as you support your assumptions.

Attachment:- Case study.rar

Reference no: EM132292211

Questions Cloud

Similarities between the family today compared to the 1950s : FC005 Introduction to Social Science Assignment, University of Nottingham International College, UK. Similarities between the family today compared to the 1950s
Find out the maximum sub-array : Find out the maximum sub-array of non negative numbers from an array.
Remove duplicates from sorted array : Given a sorted array, remove the duplicates in place such that each element appears only once and return the new length.
Characters in tin linear time complexity : Given a string S and a string T, find the minimum window in S which will contain all the characters in Tin linear time complexity.
Evaluate the perimeter security : CMIT425 - Advanced Information Systems Security - University of Maryland - Conduct a thorough asset inventory, assign monetary values to each asset
Understand the risks inherent in computer-based systems : Understand the risks inherent in computer-based systems/ERP, including e- commerce, the role of ethics and the various internal control processes that need
Why the companies you have selected are the best : Specific attention should be paid to: What does the company do, how do they make money, Peter Lynch's criteria for selecting a stock, the Warren Buffett theory.
Find the intersection of two sorted arrays : Given 2 sorted arrays, find all the elements which occur in both the arrays.
What is project management : What is Project Management. Why project management has become so popular in recent years across all industries? Please support you answers with relevant.

Reviews

len2292211

4/24/2019 3:36:45 AM

This assignment must pass plagiarism, must be 22 pages without cover page and reference page, and references must be in APA format. ADHERE STRICTLY TO THE INSTRUCTION AND PAY ATTENTION TO THE "RISK ASSESSMENT PAPER RUBRIC"

len2292211

4/24/2019 3:36:22 AM

Assess vulnerabilities on each asset and impacts if compromised.Assessed vulnerabilities on each asset and impacts if compromised; of complete inventory and addressed mission objectives. (10) Evaluate web access protocols and vulnerabilities and Cloud Computing Evaluated web access protocols and vulnerabilities and Cloud Computing and addressed mission objectives. (10)

len2292211

4/24/2019 3:36:02 AM

Assign asset values to organization assets for quantitative / qualitative risk assessment. Did not assign asset values to organization assets for quantitative / qualitative risk assessment. (0) Assigned asset values to organization assets for quantitative / qualitative risk assessment but incomplete. (3) Assigned asset values to organization assets in a complete inventory, but did not address mission objectives. (6) Assigned asset values to organization assets in a complete inventory, and addressed mission objectives. (10)

len2292211

4/24/2019 3:35:57 AM

Evaluate authentication protocols and methodologies. Did not evaluate authentication protocols and methodologies. (0) Evaluated authentication protocols, methodologies but with insufficient data or inadequate description. (3) Evaluated authentication protocols, methodologies with supporting data and description, but lacks mission objectives. (6) Evaluated authentication protocols, methodologies with supporting data, description; and addressed mission objectives. (10)

len2292211

4/24/2019 3:35:52 AM

Criteria Inventory assets and prioritize them in the order of mission criticality. Advanced Inventoried, prioritized assets and addressed mission objectives in their asset priority. (10) Evaluate enterprise topology and perimeter protection.Evaluate enterprise topology and perimeter protection.Evaluate remote access to the networks. Evaluate remote access to the networks.

len2292211

4/24/2019 3:35:31 AM

You are given a fictional scenario above describing security issues affecting organizational assets. You willidentify the risks associated with the assets, and recommend mitigating procedures. You will prepare a quantitative / qualitative risk assessment to address risk factors on organizational assets. Your final paper will be 15–25 pages long in a Word document (double-spaced with 12 point font) with APA citations for the resources you used in your research and will be graded using the following rubric.

Write a Review

Computer Engineering Questions & Answers

  Write a program to implement bubble sort

Write a program to implement bubble sort, insertion sort, selection sort, merge sort and quick sort (pivot = first index) algorithms.

  Draw a block diagram indicating the system functions

Draw a block diagram indicating the system functions. Draw blocks for the system controller, the steering servo, and the car dynamics.

  How the main memory address format look

How the main memory address format look.

  Choose an erp package or module from one of the 3 top

1. select an erp packagemodule from one of the 3 top companies to create detailed analysis paper.2. visit 2 to 3 sites

  Disadvantages of using unix versus microsoft windows server

Prepare a critique that addresses the benefits and disadvantages of using UNIX or Linux versus Microsoft Windows Server within the organization.

  Describe how you would plan an iis7 application hosting and

explain how you would plan an iis7 application hosting and what you would take into consideration to tailor it to

  Create testing cases with cartesian

My task for this exercise is to usage Equivalence Class partitioning and Boundary Value Analysis (which means to test the input at the boundary of the equivalence class partition) to analyze the valid and invalid inputs for Microsoft WinWord or an..

  What tools you would need to conduct the site

what tools you would need to conduct the site survey and why each is required.

  Social bookmarking is one of the new web 20 applications

assignment 1 technology sharing knowledge with social bookmarkingsocial bookmarking is one of the new web 2.0

  Make a table in microsoft word

build a table in Microsoft Word or Excel that lists the strengths and challenges of each of the following four system development life cycles presented in the text.

  Make a c++ program containing a class fraction

construct a C++ program containing a class Fraction. The class data should have two variables numerator and denominator, both of type integer, to represent the fraction numerator/denominator.

  Centralized and distributed data processing

Discuss in detail the difference between the centralized and the distributed data processing.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd