Explain the backup and recovery services

Assignment Help Management Information Sys
Reference no: EM133796244

Information Systems Security

Report:

You are working in a financial company called Resimac.
"Resimac Group is a leading alternative lender for residential mortgages and
asset finance in Australia and New Zealand, with a broad suite of competitive, award-winning products that cater to diverse customer types and needs".
The company has a small data centre in its own premises.
The company uses the cloud services of AWS and Microsoft Azure. Moreover, they use Google services.
The company is connected with Macquarie bank for borrowing money and paying back the money loans. (site to site VPN)
The company has branches in New Zealand / Auckland, in Melbourne, in Tasmania and in Perth.
The branches are connected with each other using WAN connection.
A diagram shows the network map at the end of this document.
The company setup a separate VLAN for IP telephony, so they can connect their own branches over the WAN line.
There are some web app services running in-premises such as resimacvl.apexgroupportal.com.
Resimac implements Citrix Gateway as a Single Sign on to allow own customers accessing home loans held through other partners such as ING, AMS, StarNet, Adelaide Bank, LinkLoan and Volt.
Recently, you have been designated to work as a cybersecurity engineer. The company has already been certified with PCI-DSS, and now it is the time to certify itself with IS027001.

11. You have been asked to participate in the Business Continuity Plan documentations, and mainly in Risk Management.
12. The risk management and analysis will help the organization to get certified with IS027001.
13. There are around 35 PC's and 20 Laptops for the company's employees. The PC's are from (HP Z1 G9 Core i7 Workstation, 16GB 512GB 1TB Win10/11 Pro), while the laptops are: XPS 15 Laptop
14. Resimac has the following services on the cloud:

15. Resimac had the following major security incidents since 2018.

According to the above information, you need to write around 2000 words report about the security and privacy control for federal information system. You need to complete the followings:
Use the framework addressed in NIST SP 800-53 document to conduct access control, and Risk Assessment.
List all assets available in the organization.
Choose the appropriate Acs, between AC-1-AC-25.
Describe RA-3, RA-5, and RA-6 in details
Re-draw the network design with your recommendations. For example, ePO McAfee, Anti-Spam, second firewall, SD-WAN, Zero-trust gateway, SAML with SSO, two exchange emails instead of one, encrypting data.... etc Book your online assignment help today!
After drawing the suggested network plan, explain the new things that you added to the network.
Add extra security services to the cloud and give that in priorities. Fr example the first year, the second year...etc
Conduct a quantitative analysis to decide whether to replace WAN with SD-WAN or not. Currently WAN is connected to all branches and costs Resimac around $3500 / Month. The failure time since 2018 was a total of 13 days and 15 hours, which cost around $35,000
Explain the backup and recovery services by explaining the Identification of control and recovery strategies.

Reference no: EM133796244

Questions Cloud

Conduct a comprehensive evaluation of the key components : Conduct a comprehensive evaluation of the key components involved in the server-side of the architecture, such as the web server, application server
Which information should the nurse give the ap about purpose : An assistive personnel (AP) asks a nurse for information about the Health Insurance. Which information should the nurse give the AP about the purpose of HIPAA?
What is your first reaction to schemes and economic impacts : What is your first reaction to schemes and economic impacts. How does it impact government spending and you specifically as a purchaser of healthcare services?
Share a story of your experience of having an oral surgery : Share a story of your experience of having an oral surgery procedure if you have not had any oral surgery procedure done on yourself.
Explain the backup and recovery services : Explain the backup and recovery services by explaining the Identification of control and recovery strategies - write around 2000 words report about the security
What potential complications are most likely for the patient : What potential complications are most likely for this patient? Describe why they are at risk for each of these complications.
Which questions should the nurse ask the adolescent : A nurse is preparing to administer the Hep B vaccine to an adolescent. Which questions should the nurse ask the adolescent prior to administering the vaccine?
What is the best way for the nurse to respond? : A 14-year-old client has died from drowning. The client's parents have decided to donate the child's organs. What is the best way for the nurse to respond?
What should be done if patient is unable to sign documents : 3 examples of forms that are needed in a file are consent to treatment. What should be done if the patient/client is unable or unwilling to sign the documents?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd