Reference no: EM133637818
Question: Understanding how data flows within the system is one of X the key aspects for knowing how to secure and segment the data based on the classification level. Create a system design diagram that demonstrates how data flows within the system, and include a network diagram that has all the required regulatory security controls, network security devices, and the systems' interconnection for the organizations you selected.
Part 1: Network Diagram and Data Flow Diagram
Illustrate how data flows within the business application system using Visio or similar diagramming software.
Within the system and network portal diagram, you will show how the web portal is compliant. Be sure to address the following in the diagrams:
Display the organization's technical requirements.
Display the compliance of associated servers, routers, access-control components, data storage, internal and external data communication, data backup, email servers, point of sales, thin clients, and so forth.
Identify related systems and assets, regulatory requirements, and overall risk approach.
Demonstrate each IT task to the next as aligned to regulations/compliance. For example, start with the user logging in and then go through each step and validate it.
Evaluate the implications of the system connectivity to the internet.
Evaluate if the systems have a data classification and how data is protected in transit, processing, and at rest.
Part 2: Explanation
In 250-500 words, explain the network diagram and how you addressed the diagram components listed in Part 1.
Submit the diagram and explanation on one document.
Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center.
Determine what services of your blue team
: Determine what services of your blue team (e.g. IPS monitoring, firewall monitoring, etc.) that you partner with the MSSP or MDR provider on
|
Identify any wbs tasks to be outsourced
: utilize a Table of Contents, headings, citations, etc. as appropriate. You are purposefully being given some latitude here to solve this problem just
|
Developing innovative new products and services
: Developing innovative new products and services is expensive, time consuming, and extremely risky. Most studies have indicated that the majority of development
|
Hypothesis test to see if their claim has merit
: Suppose that the founders of the course want to carry out a hypothesis test to see if their claim has merit. State the null hypothesis
|
Illustrate how data flows within the business application
: Illustrate how data flows within the business application system using Visio or similar diagramming software. Within the system and network portal diagram
|
Analyzing cybersecurity in the healthcare industry
: Analyzing cybersecurity in the healthcare industry. With the following information, It describes how you will test the hypothesis or assess your research
|
How would you describe the current national
: How would you describe the current national (United States Cybersecurity policy on AI, why is it good and what should be done to better bolster our policy
|
Describe how the attacker was able to get in and out
: Describe how the attacker was able to get in and out of the system, as well as the threat vector. Examine and explain the effects of the attack on the various
|
War between israel-hamas impacting the palestinian people
: Art addressing Anti Asian Hate, the war in Ukraine and most recently the war between Israel and Hamas impacting the Palestinian people.
|