Identify wireless vulnerabilities

Assignment Help Management Information Sys
Reference no: EM131662586

ASSIGNMENTS

• From the devices and systems identified in the GFI Corporate Network Topology, conduct a thorough asset inventory, assign monetary values to each asset (quantitative), and assign a priority value for each asset (qualitative) that could be used to determine which assets are most critical for restoral in the event of a catastrophic event or attack.

• Evaluate the perimeter security, make a list of access points internal and external(remote), identify vulnerabilities and make suggestions for improvements to perimeter and network security.

• Evaluate the remote access infrastructure, identify vulnerabilities and suggest security improvements to mitigate risks to remote access.

• Address the COO's concern over the mobility security and design a secure mobile computing (smart phones, tablets, laptops, etc.) in terms of authentication technologies and dataprotection.

• Identify wireless vulnerabilities and recommend what safeguards, authentication technologies,and network security to protect data should be implemented.

• Evaluate the authentication protocols and methodologies within the wired, wireless, mobility and remote access environments and suggest improvements to secure authentication for GFI.

• Evaluate the web system protocols and vulnerabilities within the Intranet server and suggest secure protocol improvements to improve security for web authentication.

• Design a cloud computing environment for the company with a secure means of data protection at rest, in motion and in process.

• Assess all known vulnerabilities on each asset in this environment and impacts if compromised.

• Using the asset inventory and the assigned values (monetary and priority) conduct a quantitative and qualitative risk assessment of the GFI network.

• Recommend risk mitigation procedures commensurate with the asset values from your asset inventory. Feel free to redesign the corporate infrastructure and use any combination of technologies to harden the authentication processesand network security measures.

• Provide an Executive Summary.

• You are welcome to make assumptions for any unknown facts as long as you support your assumptions.

• The Title Page, Table of Contents and References page(s) don't count in your 15 page minimum!!!

Lets start with the executive summary. Write this last. Describe the purpose of the assessment, the scope, and the overall level of risk the customer has, as well as listing the risks.

The body of the risk assessment should have the details. For the essential elements of information you must provide for your report, see the grading rubric.

1) Inventory assets and prioritize them in the order of mission criticality - Identify all the components on the network. Which are most critical? Assign them a value from most critical to least critical

2) Evaluate enterprise topology and perimeter protection - Identify the topology and protections in place. Give a detailed description of the same, and describe weaknesses and strengths.

3) Evaluate remote access to the networks - Identify the different ways someone can enter the network remotely. Are there weaknesses that create risk.

4) Evaluate authentication protocols and methodologies - What does the company use? Are there weaknesses? Risks?

5) Evaluate web access protocols and vulnerabilities - What protocols are being used. List them. Are there vulnerabilities?

6) Assign asset values to organization assets for quantitative risk assessment - Perform the appropriate assessment. Table format works well for this type of data.

7) Assess vulnerabilities on each asset - Each asset is vulnerable to something. Out of date O/S, physical protections, improper use. Check the National Vulnerability Database, CVE databse, etc and provide the information

8) Recommend risk mitigation procedures commensurate with asset values - Once you identify a risk to an asset, how do you fix it. You can accept a risk, avoid a risk, limit risk, or transfer risk. Give your rationale for each risk you identify.

Each paper should be approximately 15 to 25 pages written, double space (but single space is ok), 12 pt font for the body of the text, not including figures or illustrations. APA format.

Attachment:- Case Study.rar

Reference no: EM131662586

Questions Cloud

Who filed a suit in a new york state court to obtain a key : His widow, Laurie, then changed the locks on the mausoleum and refused access to Julian, who filed a suit in a New York state court against her to obtain a key.
Motivate volunteers in your non-profit organization : How would you motivate volunteers in your non-profit organization, when monetary compensation is not an option?
Describe the diagnosis and staging of cancer : Describe at least three complications of cancer, the side effects of treatment, and methods to lessen physical and psychological effects
Briefly explain the intestacy laws : Intestacy Laws. In January 1993, three and a half years after Lauren and Warren Woodward were married, they were informed that Warren had leukemia.
Identify wireless vulnerabilities : Evaluate the perimeter security, make a list of access points internal and external(remote), identify vulnerabilities and make suggestions for improvements.
Solving problem related ot the property : Benjamin is a widower who has two married children, Edward and Patricia. Patricia has two children, Perry and Paul. Edward has no children.
Find an equation of the vertical line : Find an equation of the vertical line through left parenthesis negative 3 comma negative 4 right parenthesis (-3,-4) in the form axplus
Describe the frank-starling law that affect cardiac function : Describe how this effect is beneficial in something such as hemorrhage but futile in a disease process such as CHF
In how many ways can a doubles game : In how many ways can a doubles game of tennis be arranged from six boys and eleven girls if each side must have one boy and one girl?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Assignment on impression management

In what situation are you most likely to use impression management? What situation are you most likely not going to work to use impression management? What is the typical difference between these two situations?

  Determine why menu-driven interfaces continue to be popular

Evaluate the user dialog strategies used by a menu-driven interface. Determine why menu-driven interfaces continue to be popular in the modern computing age

  Why did most of the early pda companies fail

In what industries would you expect to see particularly short technology cycles? What factors do you think cause short technology cycles for these particular industries?

  Describe their role and responsibilities in hls

The Homeland Security Act of 2002 is divided into 17 titles while bringing together under one umbrella more than 22 federal agencies. Select one such agency and describe their role and responsibilities in HLS. Which agencies do you believe they wo..

  Report on supply chain managementscenario john and michael

report on supply chain managementscenario john and michael the owners of the stone horse supply company are very

  Academic computing environment - discuss or share any

academic computing environment - discuss or share any problems that you faced in accessing or using the academic

  Determine the production and subcontracting schedule

Determine the production and subcontracting schedule that will maximize profits, given that Rummel Electronics wishes its schedule to contain an integer number of units produced and subcontracted.

  1 describe some of the reasons that early dot-com companies

1. describe some of the reasons that early dot-com companies had an initial advantage over traditional companies in

  Controversy whirls around consumer product safety database

Controversy Whirls around the consumer product safety Database

  Prepare memos and sales agreements

Prepare memos and sales agreements, make presentations to clients, have access to their email and schedule, and attend meetings remotely.

  The purpose of the term project is to explore an it

The purpose of the term project is for you to explore an IT topic of your choice. You may choose any IT topic, subject to instructor's approval.

  Develop and communicate a cyber-security improvement plan

develop and communicate a cyber-security improvement plan in our case study assignment for PureLand Chemical.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd