Risk management and Internal Audit

Assignment Help Computer Networking
Reference no: EM133127391

Question:

Based on your original design, Redesign a flat network with the following rules:

All you have to do is add the two new groups and answer the questions below:

You are expected to add access for two groups with appropriate security into the new network:

1) Risk management and Internal Audit (a single group) need full access to all systems on the network to be able to track all activity for risk management ad compliance checking purposes. However, their systems should be out of reach from anyone not in that group.

2) HR will operate fully remote - but need the ability to connect to guest wireless when they come in to the office space(s) and be able to use the office phones and printers (phones are all VoIP and hence the laptop needs to be able to link to the phone over the network).

What modifications/additions/enhancements are required to accommodate this? IF the network diagram will change, update the submitted diagram appropriately. Also, explain any additional controls (firewall rules, proxy configuration, IDS/IPS configuration or others) required to accomplish this enhancement securely.

2227_Network.jpg

Reference no: EM133127391

Questions Cloud

Romaniszyn acts on your recommendation : What course of action would make Romaniszyn better off? Why do you think so? How will others be impacted if Romaniszyn acts on your recommendation?
What will your monthly payment be : Suppose you want to buy a home for $950,000. The interest rate is 4.41% (APR, compounded semi-annually). What will your monthly payment be
How many cars must brooke motors sell each month : Brooke Motors also spends $13,000 each month for local advertisements. Its tax rate is 40%. How many cars must Brooke Motors sell each month
Potential to be best-in-class supplier : What indicators would you look for when visiting a supplier that the supplier is forward-looking and/or has the potential to be a best-in-class supplier?
Risk management and Internal Audit : Risk management and Internal Audit (a single group) need full access to all systems on the network to be able to track all activity for risk management
Dissemination of your evidence-based change proposal : Describe one internal and one external method for the dissemination of your evidence-based change proposal.
What is the effect on profit : Chris also spends $25,000 on product design each year and incurs $50,000 of facility-level costs. What is the effect on profit
Determine the effectiveness of your change : Determine the effectiveness of your change. Discuss one way you will be able to evaluate whether your project made a difference in practice.
Record in equation form the changes that occur in assets : Record in equation form the changes that occur in assets, liabilities, and owner's equity for the above transactions

Reviews

Write a Review

Computer Networking Questions & Answers

  What kind of dns namespace design

What kind of DNS namespace design would be sensible for a advertising company with 300 employees in two different locations (NY and LA) divided.

  Explain the use of virtual private networks

Write a paper in which you create a network security plan for a small business.Explain the use of virtual private networks .

  COMP1609 Network and Internet Technology and Design

COMP1609 Network and Internet Technology and Design Assignment Help and Solution, University of Greenwich - Assessment Writing Service

  Design a networking scheme

COM524: Data Communications and Networks - Design a networking scheme you have only been allocated 1 network address which is 192.168.0.X. Allow for 50 hosts on the Paris Router and 25 on the Warsaw Router.

  Find the destination ip address in its routing table

The router cannot find the destination IP address in its routing table. Fill in the fields (as much as you can) for the ICMP message sent.

  MN503 Overview of Internetworking Assignment

MN503 Overview of Internetworking Assignment help and solution, Melbourne Institute of Technology assessment writing - Network requirement analysis and plan

  What are the major network topologies

What are the major network topologies? Refer to the network diagrams you created as an illustration of the logical and physical topology you employed.

  Explain the network''s fundamental characteristics

Review the assignment instructions in the University of Phoenix Material: Integrative Network Design Project. Write a 2- to 4-page paper that includes the following based on your chosen Virtual Organization: Explain the network's fundamental characte..

  Networking with tcp/ip

Using Wireshark tool capture the packets at the same time that you download Lecture 1 from the COIT20229 Course Webpage. Before you undertake this task, you should have Wireshark installed in your home computer/notebook and connected to the Internet

  Analyze the characteristics of wireless lans

Analyze the characteristics of wireless LANs and assess the security concerns of this technology in organizations such as universities or hospitals. Identify additional areas of concern for organizations that implement a wireless LAN. Then, explai..

  Why is smf more efficient over long distances than mmf

Why do APC ferrules create less back reflection than do UPC ferrules?

  Denote any input symbol not equal to m

A paragraph of English text is to be scanned and the number of words beginning with "con" counted. Design a finite-state machine that will output a 1 each time.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd