Identify the fundamentals of public key infrastructure

Assignment Help Management Theories
Reference no: EM131601222

Question: Designing Compliance within the LAN-to-WAN Domain

Note: Review the page requirements and formatting instructions for this assignment closely. Graphically depicted solutions, as well as the standardized formatting requirements, do NOT count toward the overall page length.

Imagine you are an Information Systems Security Officer for a medium-sized financial services firm that has operations in four (4) states (Virginia, Florida, Arizona, and California). Due to the highly sensitive data created, stored, and transported by your organization, the CIO is concerned with implementing proper security controls for the LAN-to-WAN domain. Specifically, the CIO is concerned with the following areas:

- Protecting data privacy across the WAN

- Filtering undesirable network traffic from the Internet

- Filtering the traffic to the Internet that does not adhere to the organizational acceptable use policy (AUP) for the Web

- Having a zone that allows access for anonymous users but aggressively controls information exchange with internal resources

- Having an area designed to trap attackers in order to monitor attacker activities

- Allowing a means to monitor network traffic in real time as a means to identify and block unusual activity

- Hiding internal IP addresses

- Allowing operating system and application patch management

The CIO has tasked you with proposing a series of hardware and software controls designed to provide security for the LAN-to-WAN domain. The CIO anticipates receiving both a written report and diagram(s) to support your recommendations.

Write a three to five page paper in which you:

1) Use MS Visio or an open source equivalent to graphically depict a solution for the provided scenario that will:

a. filter undesirable network traffic from the Internet

b. filter Web traffic to the Internet that does not adhere to the organizational AUP for the Web

c. allow for a zone for anonymous users but aggressively controls information exchange with internal resources

d. allow for an area designed to trap attackers in order to monitor attacker activities

e. offer a means to monitor network traffic in real time as a means to identify and block unusual activity

f. hide internal IP addresses

2) Identify the fundamentals of public key infrastructure (PKI).

3) Describe the manner in which your solution will protect the privacy of data transmitted across the WAN.

4) Analyze the requirements necessary to allow for proper operating system and application patch management and describe a solution that would be effective.

Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Reference no: EM131601222

Questions Cloud

Discuss what motivates you in general to be innovative : Discuss what motivates you in general to be innovative. Be creative, innovative, and entrepreneurial in your self-assessment.
Draft an executive summary to the dr plan : Consider a scenario where the contingency planning management team (CPMT) of your organization has designated you as the disaster recovery team leader.
Discuss criminal justice professionals should utilize force : Police officers and law enforcement professionals are afforded the ability to exercise significant discretion when performing their day to day duties
Describe individual and their position within the company : Describe individual and their position within the company, and briefly describe the organization. Explain incident where this individual had to solve a problem.
Identify the fundamentals of public key infrastructure : Review the page requirements and formatting instructions for this assignment closely. Graphically depicted solutions, as well as the standardized formatting.
Describe what they are : How they work (how and by what means is it launched and against what; if it is something else, whowhat uses it and how is it implemented)
Types of data are particularly suited for soap : What types of data are particularly suited for SOAP? Give a scenario/example of when you would use SOAP and how you would implement it.
What is the journal entry made to work in progress : Last period the company had the follwoing results: What is the Journal entry made to Work in Progress, and Materials Quantity Variance
The evolutionary perspective of psychology : Dr. Jakel is a psychologist who studies basic topics in psychology, such as learning, memory, sensation, and perception.

Reviews

Write a Review

Management Theories Questions & Answers

  Learning in action

Learning contract proposal that will form the basis of your learning contract report.

  Change is the only constant

"Change is the only constant " Evaluate the different types of change that have occurred in Sony.

  How do advertisers try to use group influence

How do advertisers try to use group influence?  Will you find any specific examples and explain the relevant theory of group behavior and influence?

  Case study:saving sony

You have been appointed by Sony as a consultant on change management. Advise Sony on how they could implement the change by using the various theories of change you have learnt.

  How the stock market works

The purpose of this project is to help you to gain an understanding of how the stock market works and of the relationship between theory and practice.

  Find the optimal production quantities

Find not only the optimal production quantities, but also the optimal total cost.

  Describe the management process

Describe the management process and identify the skills required to manage business organizations.

  Case study : bert''s bonsai and aquatic sport museum

Case Study : Bert's Bonsai and Aquatic Sport Museum Prepare a knowledge management system.

  Knowledge management techniques

Demonstrate understanding of the many-sided nature of knowledge management

  Theory of transtheoretical model

Demonstrate understanding of the many-sided nature of knowledge management

  Write a paper on historical trends of management

Write a paper on Historical Trends of Management.

  Theory of reasoned action

Theory of Planned Behavior and Integrated Behaviors Model

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd