Make a list of access points internal and external

Assignment Help Computer Network Security
Reference no: EM132137568

Assignment -

GLOBAL FINANCE, INC. (GFI) - Global Finance, Inc. (GFI) is a financial company that manages thousands of accounts across Canada, the United States, and Mexico. A public company traded on the NYSE, GFI specializes in financial management, loan application approval, wholesale loan processing, and investment of money management for their customers.

ASSIGNMENTS -

  • From the devices and systems identified in the GFI Corporate Network Topology, conduct a thorough asset inventory, assign monetary values to each asset (quantitative), and assign a priority value for each asset (qualitative) that could be used to determine which assets are most critical for restoral in the event of a catastrophic event or attack.
  • Evaluate the perimeter security, make a list of access points internal and external(remote), identify vulnerabilities and make suggestions for improvements to perimeter and network security.
  • Evaluate the remote access infrastructure, identify vulnerabilities and suggest security improvements to mitigate risks to remote access.
  • Address the COO's concern over the mobility security and design a secure mobile computing (smart phones, tablets, laptops, etc.) in terms of authentication technologies and data protection.
  • Identify wireless vulnerabilities and recommend what safeguards, authentication technologies, and network security to protect data should be implemented.
  • Evaluate the authentication protocols and methodologies within the wired, wireless, mobility and remote access environments and suggest improvements to secure authentication for GFI.
  • Evaluate the web system protocols and vulnerabilities within the Intranet server and suggest secure protocol improvements to improve security for web authentication.
  • Design a cloud computing environment for the company with a secure means of data protection at rest, in motion and in process.
  • Assess all known vulnerabilities on each asset in this environment and impacts if compromised.
  • Using the asset inventory and the assigned values (monetary and priority) conduct a quantitative and qualitative risk assessment of the GFI network.
  • Recommend risk mitigation procedures commensurate with the asset values from your asset inventory. Feel free to redesign the corporate infrastructure and use any combination of technologies to harden the authentication processes and network security measures.
  • Provide an Executive Summary.
  • You are welcome to make assumptions for any unknown facts as long as you support your assumptions.

Note - The Title Page, Table of Contents and References page(s) don't count in these 22 pages.

Attachment:- Assignment File.rar

Verified Expert

In order to protect the data, verious technologies are available. The study has peoperly depicted those technologies and their importance to resolve the data managemnt issues. This study has enlightened organization namely GLOBAL FINANCE, INC (GFI) to asess necessary security functions and it also discussed network management requirements. A new IT system has been proposed to mitigate the issue of data breach.

Reference no: EM132137568

Questions Cloud

What factors must be assessed : What factors must be assessed when critically appraising quantitative studies (e.g., validity, reliability, and applicability)? Which is the most important? Why
What are some methods to protect personal rights : Conducting research projects while ensuring the protection of human subjects is necessary. What are some methods to protect personal rights of someone.
What are two ways to address the problem : Consider an obstacle or barrier to the implementation of evidence-based practice you identified in last week's discussion.
Summarize all of the research studies used as evidence : Summarize all of the research studies used as evidence. The essential components of each study need to be described so that readers can evaluate its scientific.
Make a list of access points internal and external : Evaluate the perimeter security, make a list of access points internal and external(remote), identify vulnerabilities and make suggestions for improvements
Explain the expected outcomes of the project : Organization Culture: Explain the way(s) in which the proposed solution is consistent with the organization or community culture and resources.
Describe the setting and access to potential subjects : Describe the setting and access to potential subjects. If there is a need for a consent or approval form, then one must be created.
Running a tox screen for a digital system : COS721 - Determine whether the idea shows promise that could be developed further. Alternatively, one may start by reflecting on the obstacles that may render
What paradigm does the nurse leader have : What paradigm does the nurse leader have that the nurse practitioner may not have? Why is the focus of the nurse Practioner so different and is that good.

Reviews

urv2137568

12/17/2018 2:40:37 AM

My teacher said that not a single guideline was missing from the research project and even the content was 100% original and authentic. The presentation and writing skills were very eminent. You surely are the best mates!!

len2137568

10/10/2018 11:47:35 PM

Risk Assessment Paper Rubric - You are given a fictional scenario above describing security issues affecting organizational assets. You will identify the risks associated with the assets, and recommend mitigating procedures. You will prepare a quantitative / qualitative risk assessment to address risk factors on organizational assets. Your final paper will be 15-25 pages long in a Word document (double-spaced with 12 point font) with APA citations for the resources you used in your research and will be graded using the following rubric.

len2137568

10/10/2018 11:47:29 PM

Inventory assets and prioritize them in the order of mission criticality. Inventoried, prioritized assets and addressed mission objectives in their asset priority. Evaluate enterprise topology and perimeter protection. Evaluated enterprise topology, perimeter protection measures, and addressed mission objectives. Evaluate remote access to the networks. Evaluated remote access protocols, security safeguards to the network, and addressed mission objectives. Evaluate authentication protocols and methodologies. Evaluated authentication protocols, methodologies with supporting data, description; and addressed mission objectives.

len2137568

10/10/2018 11:47:23 PM

Assign asset values to organization assets for quantitative / qualitative risk assessment. Assigned asset values to organization assets in a complete inventory, and addressed mission objectives. Assess vulnerabilities on each asset and impacts if compromised. Assessed vulnerabilities on each asset and impacts if compromised; of complete inventory and addressed mission objectives. Evaluate web access protocols and vulnerabilities and Cloud Computing Evaluated web access protocols and vulnerabilities and Cloud Computing and addressed mission objectives.

len2137568

10/10/2018 11:47:18 PM

Recommend risk mitigation procedures commensurate with asset values. Recommended risk mitigation procedures commensurate with asset values of complete inventory, and addressed mission objectives. Formulate 15-25 pages of a quantitative or qualitative risk assessment in APA format. Followed proper quantitative or qualitative risk assessment format and conformed to APA in a sufficient reference list and page count. Executive summary of risk assessment. Included an executive summary in details, and addressed mission objectives.

Write a Review

Computer Network Security Questions & Answers

  Identify a recently announced security vulnerability

Identify a recently announced security vulnerability and write a profile of the threat. The profile should contain the name of the threat, the systems it attacks, how it performs its attack and the mitigation strategies.

  Describe data link control

Describe data link control

  Identify steps required for implementing a security program

Identify three steps required for implementing a physical and environmental security program. Explain how you would factor risk management practices into the development of the policies you constructed above.

  Research on the internet what is health data stewardship

research on the internet what is health data stewardship? why does it matter in the discussion of a national health

  What actions did the botnet owners perform

What is the number of the line in search.php that contains the vulnerability - what type of vulnerability does this line contain - What actions did the botnet owners perform to regain control of the botnet from the researchers?

  Propose a detailed plan that focuses on password policies

Propose a detailed plan that focuses on password policies and authentication methods to protect the project from becoming public during the research and development phase.

  Assignment on email harassment

Suppose you are an internal investigator for a large software development company. The Human Resources Department has requested you investigate the accusations that one employee has been harassing another over both the corporate Exchange email sys..

  Important feature of information systems

Security is an important feature of information systems. Often, text is encrypted before being sent, and then decrypted upon receipt. We want to build a class (or several classes) encapsulating the concept of encryption.

  Evaluate remote access to the networks

Evaluate remote access to the networks - Inventory assets and prioritize them in the order of mission criticality - Make a list of access points internal and external

  Develop a powerpoint presentation on it physical security

Develop a PowerPoint presentation on IT physical security referencing your textbook concerning the many things you would want your subordinates to be aware of

  Passive eavesdropper observes single execution of protocol

Show that a passive eavesdropper that observes a single execution of the protocol can recover key s and impersonate the tag.

  What is locking and how is it resolved

Describe the issues that arise from concurrency.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd