Identify the fundamentals of public key infrastructure

Assignment Help Other Subject
Reference no: EM131317531 , Length: 6

Assignment : Designing Compliance within the LAN-to-WAN Domain

Note: Review the page requirements and formatting instructions for this assignment closely. Graphically depicted solutions, as well as the standardized formatting requirements, do NOT count toward the overall page length.

Imagine you are an Information Systems Security Officer for a medium-sized financial services firm that has operations in four (4) states (Virginia, Florida, Arizona, and California). Due to the highly sensitive data created, stored, and transported by your organization, the CIO is concerned with implementing proper security controls for the LAN-to-WAN domain. Specifically, the CIO is concerned with the following areas:

Protecting data privacy across the WAN

Filtering undesirable network traffic from the Internet

Filtering the traffic to the Internet that does not adhere to the organizational acceptable use policy (AUP) for the Web

Having a zone that allows access for anonymous users but aggressively controls information exchange with internal resources

Having an area designed to trap attackers in order to monitor attacker activities

Allowing a means to monitor network traffic in real time as a means to identify and block unusual activity

Hiding internal IP addresses

Allowing operating system and application patch management

The CIO has tasked you with proposing a series of hardware and software controls designed to provide security for the LAN-to-WAN domain. The CIO anticipates receiving both a written report and diagram(s) to support your recommendations.

Write a three to five (5-6) page paper in which you:

1. Use MS Visio or an open source equivalent to graphically depict a solution for the provided scenario that will:

filter undesirable network traffic from the Internet

filter Web traffic to the Internet that does not adhere to the organizational AUP for the Web

allow for a zone for anonymous users but aggressively controls information exchange with internal resources

allow for an area designed to trap attackers in order to monitor attacker activities

offer a means to monitor network traffic in real time as a means to identify and block unusual activity

hide internal IP addresses

2. Identify the fundamentals of public key infrastructure (PKI).

3. Describe the manner in which your solution will protect the privacy of data transmitted across the WAN.

4. Analyze the requirements necessary to allow for proper operating system and application patch management and describe a solution that would be effective.

5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Note: The graphically depicted solution is not included in the required page length.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date.

The cover page and the reference page are not included in the required assignment page length.

Include charts or diagrams created in Visio or an equivalent such as Dia or OpenOffice. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

Reference no: EM131317531

Questions Cloud

Consider call option for an asset : Consider a call option for an asset with the following parameters: Determine the terminal distribution of the asset price (hint: use binom.dist function in excel)
Should government role in term of health insurance be differ : What role, if any, should the U.S. Government play in health care coverage for Americans? Should the government's role in terms of health insurance be different for those with jobs and for those without jobs?
Different types of consumers based on survey data : Market research has identified three different types of consumers based on survey data. The following schedule gives the reservation prices of these customers for the two most popular products you sell. Can you use a “mixed bundling” strategy effecti..
How have income inequalities changed to the present : Why do income inequalities exist? How are income inequalities measured? How have income inequalities changed from 1980 to the present?
Identify the fundamentals of public key infrastructure : Identify the fundamentals of public key infrastructure (PKI). Describe the manner in which your solution will protect the privacy of data transmitted across the WAN. Analyze the requirements necessary to allow for proper operating system and applic..
Aging schedule and average collection period : Business can use an Aging Schedule and Average Collection Period (ACP) to help keep track of their outstanding tax owed to the organization to help avoid the buildup of possible bad debts.
What is required policy mix use is-lm diagram : Now the government wants to change the composition of demand toward investment and away from consumption without, allowing aggregate demand to beyond full employment. What is required policy mix use IS-LM diagram to show your policy proposal?
Total interest will you paying over life of mortgage : You hope to buy your dream car 5 years from now. Today, that car costs $88,000 but you expect the price to increase by an average of 5% per year over the next five years. How much will your dream car cost by the time you are ready to buy it? Referrin..
Data exchange between dummy interface and ppp program : PPP Data Path Completion using Dummy Network Interface Term Project. Complete data path through PPP: Add/modify transmission/reception functions in dummy network interface. Implement data exchange between dummy interface and PPP program and Create a ..

Reviews

Write a Review

Other Subject Questions & Answers

  Disposal of high-level radioactive waste

At one time it was thought that the deep-ocean trenches at subduction zones would be a good place for disposal of high-level radioactive waste.

  Federal guidelines on procedural safeguards

Create a PowerPoint presentation of 15-25 slides, not including your title and reference slides, that outlines federal guidelines on procedural safeguards or rights of special needs' children and families.

  Causal and nomological explanations

I'm having a hard time understanding what a nomological explanation is and a causal explanation. Also, what are the problems with causal and nomological explanations?

  What type of utility analysis is most likely to be utilized

what kind of utility analysis is most likely to be utilized when the purpose is the answer some finance-related

  The human mind is pre-wired to learn language

The human mind is "pre-wired" to learn language. Deaf children of deaf signing parents follow different stages of language acquisition in the development of signing that children learning to speak. Children learn how to speak by storing sentences in ..

  Demonstrate an understanding of the organisational behaviour

Demonstrate an understanding of the organisational behaviour theories and concepts being discussed. be able to discuss clearly the relevant issues and theoretical material presented.

  Is hobbes commonwealth a totalitarian one

Do you agree with Hobbes' view that justice is not natural? Would we still be capable of knowing right from wrong if we lived away from civilization?What are the modern implications of these different views of justice? e.g. If justice only exists ..

  Assignment - history of dis ability response

Assignment - History of Dis/Ability Response.  Access "Parallels In Time: A History of Developmental Disabilities" using the following URLs: http://www.mnddc.org/parallels/index.html OR http://www.mnddc.org/parallels2/index.htm

  Prepare a feedback form

Prepare a feedback form that would best provide you with the information you would want to know in order to improve your presentation for next time.

  Distinguish the north africa-southwest asia realm

What do you think are the major elements that distinguish the North Africa-Southwest Asia Realm from other realms of the world? Give examples.

  Explore a career in health information management

To help you further explore a career in health information management complete the following assignment. Identify the education and/or credentialing that would make a person successful in each job.

  Terminology applied to the liquid-liquid extraction

Solvent extraction is the terminology applied to the liquid-liquid extraction, which is preferred for the separation of the components of liquids, when

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd