Evaluate the remote access infrastructure

Assignment Help Computer Network Security
Reference no: EM131486595

Risk Assessment Paper

• From the devices and systems identified in the GFI Corporate Network Topology, conduct a thorough asset inventory, assign monetary values to each asset (quantitative), and assign a priority value for each asset (qualitative) that could be used to determine which assets are most critical for restoral in the event of a catastrophic event or attack.

• Evaluate the perimeter security, make a list of access points internal and external (remote), identify vulnerabilities and make suggestions for improvements to perimeter and network security.

• Evaluate the remote access infrastructure, identify vulnerabilities and suggest security improvements to mitigate risks to remote access.

• Address the COO's concern over the mobility security and design a secure mobile computing (smart phones, tablets, laptops, etc.) in terms of authentication technologies and data protection.

• Identify wireless vulnerabilities and recommend what safeguards, authentication technologies,and network security to protect data should be implemented.

• Evaluate the authentication protocols and methodologies within the wired, wireless, mobility and remote access environments and suggest improvements to secure authentication forGFI.

• Evaluate the web system protocols and vulnerabilities within the Intranet server and suggest secure protocol improvements to improve security for web authentication.

• Design a cloud computing environment for the company with a secure means of data protection at rest, in motion and in process.

• Assess all known vulnerabilities on each asset in this environment and impacts if compromised.

• Using the asset inventory and the assigned values (monetary and priority) conduct a quantitative and qualitative risk assessment of the GFI network.

• Recommend risk mitigation procedures commensurate with the asset values from your asset inventory. Feel free to redesign the corporate infrastructure and use any combination of technologies to harden the authentication processes and network securitymeasures.

• Provide an Executive Summary.

• You are welcome to make assumptions for any unknown facts as long as you support your assumptions.

• The Title Page, Table of Contents and References page(s) don't count in your 15 page minimum!!!

Attachment:- Risk_Assessment_Paper_Case_Study.pdf

Reference no: EM131486595

Questions Cloud

How do management information systems : How do management information systems (MISs) impact strategy implementation efforts?
Competences to exploit environmental opportunities : Then examine how Gallo used its distinctive competences to exploit environmental opportunities by founding Bartle's & Jaymes to enter the wine cooler industry.
Leadership style of gordon bethune : What are some similarities between the leadership style of Gordon Bethune
Selection of a new healthcare information system : One of the biggest decisions that any healthcare organization can make today is the selection of a new healthcare information system.
Evaluate the remote access infrastructure : Evaluate the remote access infrastructure, identify vulnerabilities and suggest security improvements to mitigate risks to remote access.
Organization design of multi-business organizations : In 3-4 pages discuss strategy and organization design of multi-business organizations, the mixed-model approach.
Production warehouse move project : You have kicked off the District 4 Production Warehouse Move project, your contractors are in place and working on receiving the proper building permits.
Calculate the earnings per share for national computers : Michelle Townsend owns stock in National Computers. Based on information in its annual report, National Computers reported after-tax earnings of $9,700,000.
What is the amount of the increase : Analysts that follow JPMorgan Chase, one of the nation's largest providers of financial services, estimate that the corporation's earnings per share.

Reviews

Write a Review

Computer Network Security Questions & Answers

  What percentage of the modules exceed the structure

Examine the product quality from the point of view of the customer and what percentage of the modules exceed the structure / architecture guidelines?

  Discuss hashing in the context of securing passwords

Encryption in Business Use- Discuss Hashing in the context of securing passwords in a company database for login credentials to standalone applications.

  Explain efficiency issues and alternate method

Bob sending an encrypted, signed message to Alice and Carol.

  What is the difference between war driving and war chalking

What is the difference between War Driving and War chalking? What do you get from a cloud provider when you sing up for an infrastructure as a service (laaS) cloud computing model?

  What encryption mechanism is used in the cquroam

What wireless security type does CQUniversity implement to enable roaming? Explain how this wireless security type work and what encryption mechanism is used in the CQURoam?  Explain  how this mechanism works

  Computer systems architecture

From a Windows comand line prompt execute a DIR command. Note and record how much space remains on your disk drive. Open NOTEPAD and create a new file that contains only a period and a carriage return. Save the file as "sample.txt". Use a DIR samp..

  Summarize the primary vulnerabilities and potential threats

Summarize the primary vulnerabilities and potential threats that exist for GCI related to the practice of storing sensitive data on laptops. In your opinion, which of the risks GCI faces are most significant to the company?

  Logical and physical topographical layout of planned network

Justify and support the relationship between infrastructure and security as it relates to this data-collection and analysis company. Present the rationale for the logical and physical topographical layout of the planned network

  Concentrate on the digital signatures and certificate chain

You will concentrate on the digital signatures and certificate chain. Try posting messages signed with your private key and ask your colleagues to verify whether your signature on the message is valid. The message should not be encrypted; that is,..

  Present the rationale for the logical topographical layout

Present the rationale for the logical and physical topographical layout of the planned network. Create and describe a comprehensive security policy for this data-collection and analysis company.

  Effects of security controls

The three effects of security controls are prevention, detection, and recovery. Briefly explain how these effects are related to the known good state

  Question about systems analysis

The owners of a store are looking for a lighted sign that could be mounted outside the store. The lights in the sign should be turned on when the outdoor light level falls given below a level defined through the owners.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd