Evaluate the perimeter security

Assignment Help Computer Engineering
Reference no: EM132292211

ASSIGNMENTS

• From the devices and systems identified in the GFI Corporate Network Topology, conduct a thorough asset inventory, assign monetary values to each asset (quantitative), and assign a priority value for each asset (qualitative) that could be used to determine which assets are most critical for restoral in the event of a catastrophic event or attack.

• Evaluate the perimeter security, make a list of access points internal and external(remote), identify vulnerabilities and make suggestions for improvements to perimeter and network security.

• Evaluate the remote access infrastructure, identify vulnerabilities and suggest security
improvements to mitigate risks to remote access.

• Address the COO's concern over the mobility security and design a secure mobile computing (smart phones, tablets, laptops, etc.) in terms of authentication technologies and data protection.

• Identify wireless vulnerabilities and recommend what safeguards, authentication technologies, and network security to protect data should be implemented.

• Evaluate the authentication protocols and methodologies within the wired, wireless, mobility and remote access environments and suggest improvements to secure authentication for GFI.

• Evaluate the web system protocols and vulnerabilities within the Intranet server and suggest secure protocol improvements to improve security for web authentication.

• Design a cloud computing environment for the company with a secure means of data protection at rest, in motion and in process.

• Assess all known vulnerabilities on each asset in this environment and impacts if compromised.

• Using the asset inventory and the assigned values (monetary and priority) conduct a quantitative and qualitative risk assessment of the GFI network.

• Recommend risk mitigation procedures commensurate with the asset values from your asset inventory. Feel free to redesign the corporate infrastructure and use any combination of technologies to harden the authentication processesand network security measures.

• Provide an Executive Summary.

• You are welcome to make assumptions for any unknown facts as long as you support your assumptions.

Attachment:- Case study.rar

Reference no: EM132292211

Questions Cloud

Similarities between the family today compared to the 1950s : FC005 Introduction to Social Science Assignment, University of Nottingham International College, UK. Similarities between the family today compared to the 1950s
Find out the maximum sub-array : Find out the maximum sub-array of non negative numbers from an array.
Remove duplicates from sorted array : Given a sorted array, remove the duplicates in place such that each element appears only once and return the new length.
Characters in tin linear time complexity : Given a string S and a string T, find the minimum window in S which will contain all the characters in Tin linear time complexity.
Evaluate the perimeter security : CMIT425 - Advanced Information Systems Security - University of Maryland - Conduct a thorough asset inventory, assign monetary values to each asset
Understand the risks inherent in computer-based systems : Understand the risks inherent in computer-based systems/ERP, including e- commerce, the role of ethics and the various internal control processes that need
Why the companies you have selected are the best : Specific attention should be paid to: What does the company do, how do they make money, Peter Lynch's criteria for selecting a stock, the Warren Buffett theory.
Find the intersection of two sorted arrays : Given 2 sorted arrays, find all the elements which occur in both the arrays.
What is project management : What is Project Management. Why project management has become so popular in recent years across all industries? Please support you answers with relevant.

Reviews

len2292211

4/24/2019 3:36:45 AM

This assignment must pass plagiarism, must be 22 pages without cover page and reference page, and references must be in APA format. ADHERE STRICTLY TO THE INSTRUCTION AND PAY ATTENTION TO THE "RISK ASSESSMENT PAPER RUBRIC"

len2292211

4/24/2019 3:36:22 AM

Assess vulnerabilities on each asset and impacts if compromised.Assessed vulnerabilities on each asset and impacts if compromised; of complete inventory and addressed mission objectives. (10) Evaluate web access protocols and vulnerabilities and Cloud Computing Evaluated web access protocols and vulnerabilities and Cloud Computing and addressed mission objectives. (10)

len2292211

4/24/2019 3:36:02 AM

Assign asset values to organization assets for quantitative / qualitative risk assessment. Did not assign asset values to organization assets for quantitative / qualitative risk assessment. (0) Assigned asset values to organization assets for quantitative / qualitative risk assessment but incomplete. (3) Assigned asset values to organization assets in a complete inventory, but did not address mission objectives. (6) Assigned asset values to organization assets in a complete inventory, and addressed mission objectives. (10)

len2292211

4/24/2019 3:35:57 AM

Evaluate authentication protocols and methodologies. Did not evaluate authentication protocols and methodologies. (0) Evaluated authentication protocols, methodologies but with insufficient data or inadequate description. (3) Evaluated authentication protocols, methodologies with supporting data and description, but lacks mission objectives. (6) Evaluated authentication protocols, methodologies with supporting data, description; and addressed mission objectives. (10)

len2292211

4/24/2019 3:35:52 AM

Criteria Inventory assets and prioritize them in the order of mission criticality. Advanced Inventoried, prioritized assets and addressed mission objectives in their asset priority. (10) Evaluate enterprise topology and perimeter protection.Evaluate enterprise topology and perimeter protection.Evaluate remote access to the networks. Evaluate remote access to the networks.

len2292211

4/24/2019 3:35:31 AM

You are given a fictional scenario above describing security issues affecting organizational assets. You willidentify the risks associated with the assets, and recommend mitigating procedures. You will prepare a quantitative / qualitative risk assessment to address risk factors on organizational assets. Your final paper will be 15–25 pages long in a Word document (double-spaced with 12 point font) with APA citations for the resources you used in your research and will be graded using the following rubric.

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd