Illustrates the patch of network devices

Assignment Help Management Information Sys
Reference no: EM131876055

The security consulting firm that you work for has been awarded a contract to implement a new IT Security Infrastructure to secure the Information Technology data assets of a local government agency. This agency has many remote workers that are in the field and need to connect back to the agency's system servers.

The remote workers use a wireless network infrastructure to connect their electronic pads to servers located within the local government's facility. The remote workers have needs to access property records, cite zoning violations electronically, and validate building permits. The public demand to expand IT services has grown faster than its ability to provide an adequately secured infrastructure.

In fact, this government entity was previously featured on the news for having minimal security controls and methods for accessing property tax information of citizens. The inadequate security allowed many construction trade businesses to illegally access property records and zoning violations. Your role in this project is to enhance and optimize the security mechanisms for accessing these systems.

Write a four to five (4-5) page paper in which you:

1. Create an information flow diagram, using Visio or Dia, which:

a. Illustrates how remote users will securely connect to the government agency's network.

b. Illustrates the patch of network devices that data packets must travel to get from server to remote user's device and back to server.

Note: The graphically depicted solution is not included in the required page length.

2. Provide an equipment list of network security devices that would be needed to ensure the integrity and sensitivity of private information.

In this list:

a. Propose at least two (2) vendor brands per each device and the associate costs required to procure these items.

b. Identify the functionality each device serves and the expected benefits the government agency should experience upon the successful installation of this equipment.

3. Develop a maintenance plan that should be recommended to the government agency to ensure having the latest security measures available within the network in which you:

a. Describe the risks associated with not fulfilling the activities outlined within your maintenance plan.

b. Indicate specific activities, personnel / resources required, and frequency of execution.

4. Recommend at least four (4) physical security measures that could be developed to ensure the electronic perimeter of electronic assets.

5. Recommend at least two (2) physical security vendors that could achieve the four (4) security measures you identified. Justify your
recommendations with your response.

6. Evaluate and consider activities that the Human Resources Department could perform in order to complement and instill security from within the organization. Provide a rationale with your response.

7. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

Include charts or diagrams created in Visio or one of its equivalents such as Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

The specific course learning outcomes associated with this assignment are:

Describe and apply the 14 areas of common practice in the Department of Homeland Security (DHS) Essential Body of Knowledge.

Describe best practices in cybersecurity.

Describe system, application, network, and telecommunications security policies and response.

Evaluate the ethical concerns inherent in cybersecurity and how these concerns affect organizational policies.

Use technology and information resources to research issues in cybersecurity.

Write clearly and concisely about topics associated with cybersecurity using proper writing mechanics and technical style conventions.

Reference no: EM131876055

Questions Cloud

What is the significance of the division field : What is the significance of the division field? If you found that most of the past due accounts were related to a certain division
Would the ROP be larger-smaller or unaffected : Would a stock out risk of 2 percent require more or less safety stock than a 1 percent risk? Explain. Would the ROP be larger, smaller, or unaffected?
Discuss the different elements of music you can identify : Discuss the different elements of music you can identify. How is this music "typical" of Chopin (feel free to re-read about him in our textbook), etc.
Compute the break-even number of seats sold : Break-even sales and sales mix for a service company - Compute the break-even number of seats sold on a single round-trip flight for the overall product
Illustrates the patch of network devices : Illustrates the patch of network devices that data packets must travel to get from server to remote user's device and back to server.
What is the rate of return for the investment : An alternative development for the land is a parking lot. The land, clearing, and development costs are $200,000. It is anticipated that the land can be sold.
What is your recommendation for cokes communication strategy : What is your recommendation for Coke's communication strategy? Who are the key constituents? Could Coke India have avoided this crisis?
Design a logical and physical topographical layout : The infrastructure which encompasses the network solution and security considerations is a major consideration for your company.
Classify preceding costs as either fixed variale or mixed : Classify the preceding costs as either fixed, variale, or mixed. Use the following tabular headings and place an "X" in the appropriate column

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd