How data flows within the business application system

Assignment Help Computer Network Security
Reference no: EM133394330

Assignment:

Understanding how data flows within the system is one of the key aspects for knowing how to secure and segment the data based on the classification level. Create a system design diagram that demonstrates how data flows within the system, and include a network diagram that has all the required regulatory security controls, network security devices, and the systems' interconnection for (Livy Medical hospital).

Part 1: Network Diagram and Data Flow Diagram

Illustrate how data flows within the business application system. Within the system and network portal diagram, you will show how the web portal is compliant. Be sure to address the following in the diagrams:

  • Display the organization's (Livy Medical Hospital) technical requirements.
  • Display the compliance of associated servers, routers, access-control components, data storage, internal and external data communication, data backup, email servers, point of sales, thin clients, and so forth.
  • Identify related systems and assets, regulatory requirements, and overall risk approach.
  • Demonstrate each IT task to the next as aligned to regulations/compliance. For example, start with the user logging in and then go through each step and validate it.
  • Evaluate the implications of the system connectivity to the internet.
  • Evaluate if the systems have a data classification and how data is protected in transit, processing, and at rest.

Part 2: Explanation

Explain the network diagram and how you addressed the diagram components listed in Part 1.

Reference no: EM133394330

Questions Cloud

What point will the firm hit law of diminishing returns : What is the annualized loss expectancy (ALE)? In designing a solution to the problem, at what point will the firm hit the law of diminishing returns?
Discuss the secure software development life cycle : Secure software development and the secure software development life cycle (S-SDLC). For my assignment, I need detailed checklist of the phases of the SDLC.
Describe a feasible attack : Describe a feasible attack that the person who compromised the private key could carry out.
Should richard make sure that attachment is not malicious : What steps should Richard take to verify the authenticity of Kate's new email ID? How should Richard make sure that the attachment is not malicious?
How data flows within the business application system : How data flows within the business application system. Within the system and network portal diagram, you will show how the web portal is compliant.
Which layer of wireless security might the users of wireless : In which layer of wireless security might the users of wireless devices maintain the most responsibility for security?
What is stakeholder theory : What is stakeholder theory? How does it drive requirements to spend money on cybersecurity products & services?
How imports outsourcing of their payroll management : Summarize how XYZ Imports' outsourcing of their payroll management to ADP will help with improving the firm's efficiency.
Explain the proposed cybersecurity policy statement : Explain the proposed cybersecurity policy statement and reasons why it may be considered controversial.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Create random secret one-time pad key ka and xors

Creates random secret one-time pad key KA and XORs it with K. She sends M1 = KA K to Bob. Bob creates random secret one-time pad key KB, XORs what he gets with it to compute M2 = M1 KB.

  Troubleshoot the problem using the five-step method

Today, employees are having performance issues with services hosted on internal servers. You confirm that all servers are running slower than normal.

  Discuss a situation where you received security education

You have probably received some form of information security education, either in your workplace, school, or other settings. Discuss a situation where you received security education. How was it delivered?

  Analyse and evaluate risks and security concerns

Analyse and evaluate risks and security concerns with cloud computing discuss strategies for addressing them

  Functions of the transport and network layers

What are some immediate differences in the two protocols? Does IPv6 provide operational improvement, as well as increased address space? How has/will IPv6 impact organizations, the Internet, and you at home?

  Concepts of it security and privacy

The principles and concepts of IT security and privacy; How key events in history that have contributed to modern IT security and privacy;

  For this application you will determine how your computer

for this application you will determine how your computer is connected through a network. you do not have to actually

  Difference between cyber-related crimes and cyber crimes

Summarize the difference between cyber-related crimes and cyber crimes. On cyber crimes, define cyber trespass, cyber vandalism and cyber privacy. On cyber-related crimes describe the difference between cyber-assisted and cyber-enhanced crimes.

  What is software firewalls

Using the Web, search for "software firewalls". Examine the various alternatives available and compare their functionality, cost, features, and type of protection.

  Disaster recovery and business continuity plan

Prepare a 2- to 2.5-page Disaster Recovery and Business Continuity Plan in Microsoft Word for your company - Recover your databases and telecommunications

  Discuss about the information privacy and surveillance

Introduce the benefits and problems associated with Information Privacy and Surveillance in general and then you will introduce a particular problem.

  Describing a potential computer security problem

Please identify a computer system you have recently had experience with (at home, work,etc.); prepare an attached PowerPoint presentation (minimum 8 slides).

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd