Reference no: EM132292211
ASSIGNMENTS
• From the devices and systems identified in the GFI Corporate Network Topology, conduct a thorough asset inventory, assign monetary values to each asset (quantitative), and assign a priority value for each asset (qualitative) that could be used to determine which assets are most critical for restoral in the event of a catastrophic event or attack.
• Evaluate the perimeter security, make a list of access points internal and external(remote), identify vulnerabilities and make suggestions for improvements to perimeter and network security.
• Evaluate the remote access infrastructure, identify vulnerabilities and suggest security
improvements to mitigate risks to remote access.
• Address the COO's concern over the mobility security and design a secure mobile computing (smart phones, tablets, laptops, etc.) in terms of authentication technologies and data protection.
• Identify wireless vulnerabilities and recommend what safeguards, authentication technologies, and network security to protect data should be implemented.
• Evaluate the authentication protocols and methodologies within the wired, wireless, mobility and remote access environments and suggest improvements to secure authentication for GFI.
• Evaluate the web system protocols and vulnerabilities within the Intranet server and suggest secure protocol improvements to improve security for web authentication.
• Design a cloud computing environment for the company with a secure means of data protection at rest, in motion and in process.
• Assess all known vulnerabilities on each asset in this environment and impacts if compromised.
• Using the asset inventory and the assigned values (monetary and priority) conduct a quantitative and qualitative risk assessment of the GFI network.
• Recommend risk mitigation procedures commensurate with the asset values from your asset inventory. Feel free to redesign the corporate infrastructure and use any combination of technologies to harden the authentication processesand network security measures.
• Provide an Executive Summary.
• You are welcome to make assumptions for any unknown facts as long as you support your assumptions.
Attachment:- Case study.rar
Similarities between the family today compared to the 1950s
: FC005 Introduction to Social Science Assignment, University of Nottingham International College, UK. Similarities between the family today compared to the 1950s
|
Find out the maximum sub-array
: Find out the maximum sub-array of non negative numbers from an array.
|
Remove duplicates from sorted array
: Given a sorted array, remove the duplicates in place such that each element appears only once and return the new length.
|
Characters in tin linear time complexity
: Given a string S and a string T, find the minimum window in S which will contain all the characters in Tin linear time complexity.
|
Evaluate the perimeter security
: CMIT425 - Advanced Information Systems Security - University of Maryland - Conduct a thorough asset inventory, assign monetary values to each asset
|
Understand the risks inherent in computer-based systems
: Understand the risks inherent in computer-based systems/ERP, including e- commerce, the role of ethics and the various internal control processes that need
|
Why the companies you have selected are the best
: Specific attention should be paid to: What does the company do, how do they make money, Peter Lynch's criteria for selecting a stock, the Warren Buffett theory.
|
Find the intersection of two sorted arrays
: Given 2 sorted arrays, find all the elements which occur in both the arrays.
|
What is project management
: What is Project Management. Why project management has become so popular in recent years across all industries? Please support you answers with relevant.
|