Identify the fundamentals of public key infrastructure

Assignment Help Computer Engineering
Reference no: EM132095507

Assignment 4: Designing Compliance within the LAN-to-WAN Domain

Note: Review the page requirements and formatting instructions for this assignment closely. Graphically depicted solutions, as well as the standardized formatting requirements, do NOT count toward the overall page length.

Imagine you are an Information Systems Security Officer for a medium-sized financial services firm that has operations in four (4) states (Virginia, Florida, Arizona, and California). Due to the highly sensitive data created, stored, and transported by your organization, the CIO is concerned with implementing proper security controls for the LAN-to-WAN domain. Specifically, the CIO is concerned with the following areas:

• Protecting data privacy across the WAN

• Filtering undesirable network traffic from the Internet

• Filtering the traffic to the Internet that does not adhere to the organizational acceptable use policy (AUP) for the Web

• Having a zone that allows access for anonymous users but aggressively controls information exchange with internal resources

• Having an area designed to trap attackers in order to monitor attacker activities

• Allowing a means to monitor network traffic in real time as a means to identify and block unusual activity

• Hiding internal IP addresses

• Allowing operating system and application patch management

The CIO has tasked you with proposing a series of hardware and software controls designed to provide security for the LAN-to-WAN domain. The CIO anticipates receiving both a written report and diagram(s) to support your recommendations.
Write a three to five page paper in which you:

1. Use MS Visio or an open source equivalent to graphically depict a solution for the provided scenario that will:

• filter undesirable network traffic from the Internet

• filter Web traffic to the Internet that does not adhere to the organizational AUP for the Web

• allow for a zone for anonymous users but aggressively controls information exchange with internal resources

• allow for an area designed to trap attackers in order to monitor attacker activities

• offer a means to monitor network traffic in real time as a means to identify and block unusual activity

• hide internal IP addresses

2. Identify the fundamentals of public key infrastructure (PKI).

3. Describe the manner in which your solution will protect the privacy of data transmitted across the WAN.

4. Analyze the requirements necessary to allow for proper operating system and application patch management and describe a solution that would be effective.

5. Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Note: The graphically depicted solution is not included in the required page length.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

• Include charts or diagrams created in Visio or an equivalent such as Dia or OpenOffice. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

The specific course learning outcomes associated with this assignment are:

• Analyze information security systems compliance requirements within the Workstation and LAN Domains.

• Use technology and information resources to research issues in security strategy and policy formation.

• Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions.

Reference no: EM132095507

Questions Cloud

How did you do with metaphor : How did you do with metaphor? Practice reframing metaphor from destructive into constructive or neutral expressions
What are the challenges faced by the organization : How to we determine the size and demands of a market that does not yet exist for a product that nobody knows about?
Does your organization support these efforts : Discuss the following "Does Rosabeth Moss Kante's article resonate in your experience? How, give examples?
How to we determine the size and demands of a market : How to we determine the size and demands of a market that does not yet exist for a product that nobody knows about?
Identify the fundamentals of public key infrastructure : Imagine you are an Information Systems Security Officer for a medium-sized financial services firm that has operations in four (4) states (Virginia, Florida).
What privacy issues are involved : You can transfer your health data to another personal health record provider such as Microsoft HealthVault.
Courts in downtown tucson and attend a hearing : Locate one of the following courts in Downtown Tucson and attend a hearing, trial, sentencing(s) or oral argument (the choice is yours) for at least one hour
Explain the systems analysis for the business systems : Explain the systems analysis for the selected business system. Explain the project scope and feasibility for the selected business system.
Describe your chosen architecture pattern : Describe your chosen architecture pattern. Describe any shortcomings associated with your chosen architecture pattern for the case study.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd