Explain the overview of network security fundamentals

Assignment Help Management Information Sys
Reference no: EM131993210

Case Study

The Scenario:

After transitioning out of the military, you were contracted by a medium-sized start-up company that processes credit card transactions on a daily basis.

The Chief Executive Officer (CEO) and other business staff have no knowledge of network security or the threats they face. They have an open position for a Chief Information Security Officer (CISO), but have yet to fill it. Thus, they hire you for your expertise in network security, firewalls, and VPN solutions.

This is a short term engagement that lasts 30 days. As the company's subject matter expert/consultant, the CEO wants a 4-6 page report at the end of your assignment. The CEO tells you they will have remote users, so firewall and VPN technologies are needed. They provide you with the following report outline to use:

1.0 Introduction

2.0 Overview of network security fundamentals, security threats, and issues (discuss from a company wide standpoint).

3.0 Detailed network security recommendations

4.0 Summary

Note:

Section 3.0 should include:

1. Fundamentals of firewalls and VPNs

2. Recommendations for firewall and VPN solutions for the new company

3. Recommendations for implementing your proposed solutions

4. Practices that you will use to ensure security within the enterprise if they hire you long term. You may make these as sub-sections if you'd like (e.g., 3.1 Fundamentals of Firewalls and VPNs, 3.2 Recommended Firewall and VPN Solutions, etc.)

Section 4.0:

This section should be short, a paragraph or two.

Requirements:

• Your submission should be 4 to 6 pages long (not including the title page and the reference page).

• All sections are represented (Sections 1.0 - 4.0).

• Paper is in APA format with proper citations and references.

• 1" margins.

• In Times New Roman or Arial font, font size 12.

• Utilized correct grammar and spelling.

• Include and cite references as needed.

• The key to this assignment is to demonstrate your understanding of the topics, not to re-word the text or reference material.

Reference no: EM131993210

Questions Cloud

Analyze the summary of your data : Change the column names of your data frame so that zcta becomes zipCode and meanhouseholdincome becomes income.
Which people would you collaborate with : Explain who would need to be involved if you wanted to conduct research in your school. Which people would you collaborate with?
True of company that uses absorption costing : Which of the following is true of a company that uses absorption costing?
Write an essay on the key challenges in workforce : Task Description - You will write an essay on the key challenges in attracting and retaining a workforce in your selected sector
Explain the overview of network security fundamentals : After transitioning out of the military, you were contracted by a medium-sized start-up company that processes credit card transactions on a daily basis.
What is the total price you must pay for the bond : what is the total price you must pay for the bond? The last coupon date was July 01, 2016 and the next coupon date is December 31,2016.
How was enrique as a child : 1. How was Enrique as a child? How did he change as a teenager? Adult? Why did he change so much?
Consequences of unprotected sex : Are there countries, other than the United States, that are having success with health policies to address the issue of unprotected sex and sexually transmitted
Examples of nonverbal and verbal communication : Discuss cases and examples of nonverbal and verbal communication. How are they different? How are they similar?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Describing functions of the chosen case tools

Choose one or more CASE tools that support system process definition. Write a short essay describing functions of the chosen CASE tools with advantages and disadvantages of each function

  What types of tools are used

Computer Forensics Presentation.Research the following topic:What types of tools are used?What techniques are used?

  Explain project management in the business world

Project management in the business world - describe project management and explain its importance to the business world and describe project life-cycle management and the benefits of project management to an organization.

  Is there any justification for traditional crm at amazon

Is there any justification for traditional CRM at Amazon? Why or why not? Is there any justification for social CRM at Boeing? Why or why not?

  What are the key components of information assurance

Information Assurance: IT549- What are the key components of information assurance as they relate to individual roles and responsibilities within the information assurance plan?

  Describe basic information technology terminology

The State of New Mexico Business Articulation committee provides the following common goals for this course for any university in New Mexico.

  What effect do you think linkedins failure to self-detect

Companies are often slow to self-detect data breaches so a cyberattack can occur without a company even knowing it has a problem.

  What is the future direction of the technology

What are some of real-world case studies of companies that have implemented and used the technology? What is the future direction of the technology?

  Identify an mis management issue

Consult your text, lectures, and or Google searching for MIS management issues. Once you identify an MIS management issue you are ready to get started. Do not hesitate to contact me for questions

  Develop your own data visualization that displays dimensions

Consider the historical data visualization developed by Charles Minard describing Napoleon's army march toward and eventual retreat from Moscow.

  Develop a risk management policy that addresses

Credit card information was compromised by an attack that infiltrated the network through a vulnerable wireless connection within the organization.

  List and describe the various types of buses

What is considered to be a major weakness of RAM? Why is it important that users fully understand this weakness? Explain the concepts of read and write as it relates to RAM. What are the two main factors that determine the size of ROM?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd