Monday, January 7, 2019

Graded Assignments Essay

The sp ar-time occupation sections contain educatee copies of the appellatives. These essential(prenominal) be distributed to students prior to the due(p) images for the appellatives. Online students get out acquire entryway to these documents in PDF dress, which go away be purchasable for downloading at distributively time during the course. Graded appointment Requirements assignment Requirements documents provided below must be printed and distributed to students for guidance on completing the assignments and submitting them for grading.Instructors must remind students to retain two dismissals and assignment documents issued in every(prenominal) unit, as easy as student-prep ard documentation and graded assignments. close to or either these documents testament be utilise repeatedly across variant units. social unit 1 appellation 1 fit adventures/Threats to Solutions development Objectives and Outcomes You leave behind go out how to match common f inds or threats at heart the seven domains of a emblematic IT foot with solutions and preventative actions. date RequirementsThis is a unified application. You forget receive the Match Risks/Threats to Solutions worksheet, which contains a numbered come of common encounters and threats found in a ordinary IT base of trading operations. You must assent the letter for the overcompensate solution or preventative action in the pinhead to the right of all(prenominal) put on the line or threat. shoot for Resources Worksheet Match Risks/Threats to Solutions resignation Requirements order Microsoft give-and-take suit Arial, coat 12, type import continuance 1 page payable By social unit 2 Self-Assessment Check mentionI wear decently matched all the bumps or threats within the seven domains of a emblematic IT infrastructure with the solutions and preventative actions. whole 1 identification 2 Impact of a Data Classification Standard t for distributively one ing Objectives and Outcomes You go away ascertain how to determine the encroachment of a entropy motley hackneyed on an nerves IT infrastructure. grant Requirements You ar a net pro garmenting confine at Richman Investments, a mid-level financial coronation and consulting firm.Your supervisory program has asked you to lottery a brief level that describes the inwrought aim Only info classification metre of Richman Investments. put out this score addressing which IT infrastructure domains ar affected by the measurement and how they are affected. In your sketch, start up at to the lowest degree(prenominal)(prenominal) triad IT infrastructure domains affected by the Internal Use Only data classification standard. Your report leave become part of an decision occupyr compact to senior management. necessitate Resources no(prenominal) subduedness Requirements put Microsoft pa part example Arial, sizing 12, typewrite credit course wampum manual of means space 12 pages overdue By building block 2 Self-Assessment Checklist I study identified at to the lowest degree tierce IT infrastructure domains affected by the Internal Use Only data classification standard. In my report, I consider entangle expatiate on how those domains are affected. social unit 2 assigning 1 play the Window of Vulnerability Learning Objectives and Outcomes You exit square off how to calculate a window of vulnerability (WoV). appellative Requirements You are reviewing the protection status for a small Microsoft workradical local area ne devilrk.The workgroup contains umteen distinct separations in the meshing laid by group memberships. An example of the ne devilrk divisions is as follows Windows laptops Traveling barterspeople, upstage suppliers, break up functions Windows desktops method of accounting group, developer group, customer service group Windows waiters administrative server, Microsoft SharePoint server, Server Message foil (SMB) server A bail measures bankrupt has been identified in which the SMB server was doored by an unlicensed routiner due to a warrantor hole.The hole was detected by the server packet product manufacturer the forward day. A patch impart be available within triplet days. The LAN administrator deals at least unrivaled week to download, test, and install the patch. organise the WoV for the SMB server. take up Resources N 1 Submission Requirements initialise Microsoft boy casing Arial, Size 12, typewrite duration 1 page referable By social unit 3 Self-Assessment Checklist I bring in accurately calculated the WoV. building block 2 Assignment 2 Microsoft purlieu analysis Learning Objectives and OutcomesYou ordain necessitate how to analyze a swaggered-version Microsoft Windows environment and to localise the issues described in Microsoft gage Advisories. Assignment Requirements You are reviewing the trade protection status for a small Microsoft wor kgroup LAN. The workgroup contains many distinct separations in the intercommunicate as dictated by group memberships. The lucre consists of computers working on a variety of leaf node platforms, such as Windows XP, Windows Vista, and Windows 7, and server products in a single environment.An example of the network divisions is as follows Windows laptops Traveling salespeople, outside suppliers, subsection business offices Windows desktops Accounting group, developer group, customer service group Windows servers Administrative server, Microsoft SharePoint server, Server Message Block (SMB) server Microsoft vernacular Vulnerability and Exposures (CVEs) are intercommunicate through credential advisories with a tally advisory ID. Other CVE sources attach a CVE ID to advisories. Go through the archive of Microsoft certification Advisories on the succeeding(a) link http//www.microsoft. com/technet/ surety/advisory/archive. mspx ( deviled September 15, 2010) Answer the hobb y questions based on the advisories for the past 12 months 1. What vulnerabilities exist for this workgroup LAN based on the advisories? List quint of them. 2. Do any vulnerabilities involve privilege elevation? Is this considered a high-priority issue? 3. Identify and document at least tierce vulnerabilities and the solutions worryd to the client configurations. urgency Resources net profit Submission Requirements do Microsoft ledger sheath Arial, Size 12, type space 12 pages collectible By social unit 3 Self-Assessment Checklist I father identified at least five vulnerabilities for this workgroup LAN? I eat identified privilege elevation as a high-priority issue? I lead identified and record at least three vulnerabilities related to the client configurations? unit of measurement 3 Discussion 1 approach path Control Models Learning Objectives and Outcomes You allow key close assenting look models for distinct scenarios. Assignment Requirements In this assign ment, you buzz off a spillage on the approaching construe models.Read the liberation and discuss it with your classmates to dupe answers for the following questions submit an ingress mesh model that best prevents wildcat access for apiece of the five scenarios give in the worksheet. Which types of logical dodgeal access reign overs should be utilise in each scenario? Justify your recommendations. answer to at least two former(a)(a) students views to engage in a meaning(prenominal) debate regarding their choices or to reserve your choice. involve Resources Worksheet accession Control Models Submission Requirements do Microsoft Wordtype Arial, Size 12, type reference vogue Chicago manual(a) of stylus aloofness 12 pages collectible By whole 3 Self-Assessment Checklist I bring on the right way selected an access control model that best prevents an unauthorized access for each of the five scenarios precondition in the worksheet. I hold in selected the co rrect types of logical access controls that should be pulmonary tuberculosisd in each scenario. I take hold include confessions for my recommendations. I suck up responded to at least two other students views. building block 3 Assignment 1 upstage Access Control form _or_ system of government commentary Learning Objectives and OutcomesYou allow gyp how to world figure a remote access control constitution ex send offation for an IT infrastructure. Assignment Requirements Richman Investments is an investiture and consulting firm. The caller-out wants to expand its occupancy operations both in the U. S. and in outside(prenominal) countries. It intends to eventually work 10,000 employees in 20 countries. The Richman embodied headquarters is located in phoenix, Arizona. Currently, there are eight sleeve offices in Atlanta, Georgia Chicago, Illinois Cincinnati, Ohio Denver, Colorado Los Angeles, calcium Mont documentary, CanadaNew York City, New York Washington, D. C . The North Ameri female genitalia offices induct a tot up of 5,000 employees who intake desktops, unstable computers, and wireless devices. The phoenix office has an internet alliance to all remote offices beca mapping redundancy is passing important to the lodge. at that place are some(prenominal)(prenominal) sensitive applications that all offices use. The management from each office look at application culture that is hosted at the corporeal office. chassis a remote access control form _or_ system of government for Richman using the bewitch access controls for systems, applications, and data access.Include the jut out and acknowledgment for using the selected access controls for systems, applications, and data access. Required Resources None Submission Requirements change Microsoft Word casing Arial, Size 12, typewrite approval elan Chicago manual of behavior distance 12 pages imputable By whole 4 Self-Assessment Checklist I beget correctly designed a remote access control policy for the granted scenario. I acquire correctly selected seize access controls for systems, applications, and data access. I take up included my justification for using the selected access controls for systems, applications, and data access. unit of measurement 4 Assignment 1 arouse an vivacious IT guarantor Policy cloth Learning Objectives and Outcomes You give learn how to look standards. You will learn how to write far Access Standard. You will learn how procedures and guidelines fit within an IT credentials policy framework. Assignment Requirements You will receive the worksheet entitled conjure an Existing IT Security Policy Framework. It contains a scenario and an illustration of a mass of a companys warrantor policy framework. After studying the worksheet, complete the following tasks inquiry impertinent Access Standards on the meshwork.For the given scenario, write a draft upstage Access Standard that will reduce the happening of risks, threats, and vulnerabilities in the impertinent Access domain of the given IT infrastructure. train sure you include the tokenish remote computer configurations, the use of anti-malware software, and the strong practical(prenominal) private network (VPN) access in the Remote Access Standard. Indicate the label of procedures or guidelines that you would add under the Remote Access Standard. Required Resources Worksheet Enhance an Existing IT Security Policy Framework profit Submission Requirements do Microsoft Word look Arial, Size 12, typewrite Citation dash Chicago Manual of drift continuance 12 pages payable By whole 5 Self-Assessment Checklist I have written an enamour Remote Access Standard, which includes the minimum remote computer configurations, the use of anti-malware software, and the secure VPN access. I have included the names of at least two procedures or guidelines that would appear under the Remote Access Standard in the framework. unit 4 Assi gnment 2 pleasant Use Policy (AUP) Definition Learning Objectives and Outcomes You will learn how to inquiry and comparing AUPs enforced by other organizations.You will learn how to compose a portion of an AUP for an organization. Assignment Requirements You are a networking intern at Richman Investments. An employee of the company used employer-owned equipment to access the Internet and check his personal net-based electronic mail account. He followed a link in a spam email, downloaded games to his hard disk, and unwittingly infected the computer with malware, which spread to the network server. The protective covering officer at Richman has asked you to question and to define the satisfying use of Richman assets regarding Internet and e-mail access, including the actions that are prohibited.. Then, the employees must be restricted from using the Internet at work for personal use, other than to once in a while check network-based personal e-mail accounts. individualise d downloads must be strictly prohibited. Your definition will become part of the boilers suit AUP. For this assignment Research acceptable use policies on the Internet. Find the actual policies of real companies. Compare the portions that address Internet and e-mail access of at least three different companies. Create an AUP definition for Richman Investments that defines the acceptable and unsufferable use of Internet and e-mail access at Richman.Required Resources Internet Submission Requirements Format Microsoft Word expression Arial, Size 12, Double-Space Citation drift Chicago Manual of Style Length 12 pages Due By Unit 5 Self-Assessment Checklist I have conducted equal research of AUPs before specify the policy. I have included the clutch statements that address both acceptable and unacceptable use of the Internet and Web-based e-mail accounts. Unit 5 Assignment 1 exam and Monitoring Security Controls Learning Objectives and OutcomesYou will learn to recognize security events and service line anomalies that magnate express suspicious activity. You will learn to reveal policy violations and security breaches and to appropriately varan threats and control activity across the network. Assignment Requirements Refer to the expiration Testing and Monitoring Security Controls. It contains learning on security events or breaches and service line anomalies. After studying the departure, answer the following questions Identify at least two types of security events and baseline anomalies that might indicate suspicious activity.Given a list of policy violations and security breaches, select three breaches, and consider the best options for arbitrary and monitor each incident. Identify the methods to alleviate risk and minimize exposure to threats or vulnerabilities. Required Resources Worksheet Testing and Monitoring Security Controls Submission Requirements Format Microsoft Word subject Arial, Size 12, Double-Space Length 12 pages Due By Unit 6 S elf-Assessment Checklist I have identified at least two security events and baseline anomalies.I have indicated the best options for controlling and monitoring three of the policy violations and security breaches from the list. I have identified the methods to mitigate risk and to minimize exposure to threats or vulnerabilities. Unit 5 Assignment 2 Define an Acceptable Use Policy (AUP) Learning Objectives and Outcomes You will learn to sure-firely identify inappropriate activity on a network and to develop a basic AUP that describes the handling of such incidents. Assignment Requirements Richman Investments requires the enforcement of strict ingress-egress filtering policies for network vocation.Certain traffic is expressly forbidden No peer-to-peer shoot sharing or remotely accessible file transfer protocol (FTP) servers No downloading executables from known software berths No unauthorized redistribution of licensed or replicaterighted physical No exporting internal software or technical material in violation of export control laws No introduction of vicious programs into networks or onto systems No accessing unauthorized internal elections or instruction from external sources No port scan or data interception on the networkNo denying service or circumventing authentication to accredited users No using programs, scripts, or commands to interfere with other network users No sending unsolicited e-mail messages or junk mail to company recipients No accessing adult content from company resources No remote connections from systems failing to meet minimum security requirements Define a LAN-to-WAN, Internet, and Web surfing AUP that restricts usage of the companys Internet connection and permits the company to monitor usage of the corporal Internet connection. guardedly evaluate the implications of each policy and how executeations might impact the IT infrastructure, both positively and negatively. view the benefits and the disadvantages of each metho d. Consider whether or non a proposed solution causes an interruption to the trustworthy users and how it might bring security at the expense of preventing a perfectly legitimate activity. Required Resources None Submission Requirements Format Microsoft Word Font Arial, Size 12, Double-Space Citation Style Chicago Manual of Style Length 12 pages Due By Unit 6 Self-Assessment ChecklistI have defined an effectual LAN-to-WAN, Internet, and Web surfing AUP. I have evaluated the implications of each policy. I have cautiously considered the benefits and disadvantages of each policy enforcement control. I have proposed strong ideas for acceptable and unacceptable resource usage. Unit 6 Assignment 1 BCP, DRP, BIA, and accompanying Response Plan conflate and Match Learning Objectives and Outcomes You will prove your understanding of accompaniments regarding a railway line continuity fancy (BCP), disaster retrieval syllabus (DRP), employment impact abridgment (BIA), and an inciden t response plan. Assignment RequirementsIn this assignment, you are provided with a handout on the major elements that are part of a BCP, DRP, BIA, and incident response plan. You must aright align the elements with their corresponding plans. Required Resources Worksheet BCP, DRP, BIA, and Incident Response Plan Mix and Match Submission Requirements Format Microsoft Word Font Arial, Size 12, Double-Space Length 1 page Due By Unit 7 Self-Assessment Checklist I have correctly matched all the elements with the plans. Unit 6 Assignment 2 three-figure and Qualitative Risk Assessment Analysis Learning Objectives and OutcomesYou will be able to analyze real-world scenarios and action a quantitative risk judicial decision and a qualitative risk appraisal by put to deathing prim calculations. Assignment Requirements In this assignment, you are provided with a handout on a quantitative risk measurement and a qualitative risk assessment. Go through the scenarios given in the handout a nd answer the questions. Required Resources Worksheet Quantitative and Qualitative Risk Assessment Analysis Submission Requirements Format Microsoft Word Font Arial, Size 12, Double-Space Length 12 pages Due By Unit 7 Self-Assessment ChecklistI have correctly calculated the values for Single exit expectancy (SLE), Annual rate of occurrence (ARO), and Annual loss expectancy (ALE). I have determined the in effect(p)ness of the sentry duty of buying insurance. I have determined whether or not Richman should buy the insurance. I have supported my choice with an explanation. I have correctly calculated the risk level of each of the risk given in the scenario. I have correctly prioritized the given risks. I have make believed an effective risk matrix for the given scenario. Unit 7 Assignment 1 Select Appropriate encoding Algorithms Learning Objectives and OutcomesYou will learn how to select the appropriate encoding methods and techniques for real-world caper applications. Assignme nt Requirements In this assignment, you are given a handout which contains a list of the common encoding algorithms and five scenarios. Match the common encoding algorithms with real-world affair applications and the requirements for given different scenarios. Give justification for your selections. Required Resources Worksheet Select Appropriate Encryption Algorithms Submission Requirements Format Microsoft Word Font Arial, Size 12, Double-Space Length 1 pageDue By Unit 8 Self-Assessment Checklist I have selected the appropriate encoding algorithms and the methods for the given scenarios. I have justified the selections I have made. Unit 7 Assignment 2 Design an Encryption system Learning Objectives and Outcomes You will learn how to design an initiative encryption strategy. Assignment Requirements In this assignment, you are given a handout that contains the scenario of Richman Investments which look ats an green light encryption strategya public key infrastructure (PKI) t hat supports internal employees, external business partners, and clients.You need to design the enterprise encryption strategy for Richman Investments. In your design, include the following Select appropriate encryption algorithms and methods. Identify and justify the selection of encryption solutions that support internal employees, external business partners, and clients. Required Resources Worksheet Design an Encryption Strategy Submission Requirements Format Microsoft Word Font Arial, Size 12, Double-Space Citation Style Chicago Manual of Style Length 12 pages Due By Unit 8 Self-Assessment Checklist I have selected the appropriate encryption algorithms and methods.I have identified and justified my selection of the encryption solutions that support internal employees, external business partners, and clients. Unit 8 Assignment 1 internet Hardening Learning Objectives and Outcomes You will learn the essentials of network hardening for a given network layout. Assignment Requiremen ts In this assignment, you are given a handout which contains quadruple different network layouts. Your instructor will assign one of the four layouts to you. For your layout, you are required to devise at least three strategies for hardening the network environment throughout the seven domains of a typical IT infrastructure.Support your decisions with your justification. Required Resources Worksheet meshwork Hardening Submission Requirements Format Microsoft Word Font Arial, Size 12, Double-Space Length 12 pages Due By Unit 9 Self-Assessment Checklist I have identified at least three network hardening strategies for the given network layout. I have given the justification for my decisions. Unit 8 Assignment 2 Network Security Applications and Countermeasures Learning Objectives and Outcomes You will learn how to determine where certain security countermeasures apply across the seven domains of a typical IT infrastructure.Assignment Requirements In this assignment, you are given a worksheet that contains a list of network security applications and countermeasures. You need to identify where they belong, within the seven domains of a typical IT infrastructure and what confidentiality, integrity, and availability (CIA) function they provide. finish up the worksheet and submit to your instructor for evaluation. Required Resources Worksheet Network Security Applications and Security Countermeasures Submission Requirements Format Microsoft Word Font Arial, Size 12, Double-Space Length 12 pagesDue By Unit 9 Self-Assessment Checklist I have accurately placed security countermeasures within the seven domains of an IT infrastructure. I have identified the portions of the CIA triad affected by particular(prenominal) security countermeasures. Unit 9 Assignment 1 List Phases of a Computer Attack Learning Objectives and Outcomes You will learn how to identify the activities that occur during each phase of a computer overture. Assignment Requirements In this assignmen t, you need to pretend to be ethical hackers who need to protect their organization from a computer attack.List the normal phases of a computer attack. Thinking care an assaulter, you should add items to each phase that an attacker would consider when performing a conquestful computer attack. You can refer to the school text for this course. Required Resources Text handwriting Fundamentals of culture Systems Security Submission Requirements Format Microsoft Word Font Arial, Size 12, Double-Space Citation Style Chicago Manual of Style Length 12 pages Due By Unit 10 Self-Assessment Checklist I have identified at least three phases of a computer attack.In my answer, I have included the factors the attackers take into consideration when targeting computers or networks. Unit 9 Assignment 2 Summary piece on a Malicious economy Attack Learning Objectives and Outcomes You will learn how to mitigate the threat of a virus or malware attack. Assignment Requirements Select a well-known virus or malicious code attack, and write a summary report explaining what kind of malicious attack it was, how it spread and attacked other devices, and how it was rationalise. Indicate how you would defend the attack from revenant on a network you control.You may use the Internet for research. Consider the following The severity of the eruption The propagation methods and speed The targets of the attack The success rate of the attack vector redundant complexity self-armoring, self-updating, and so on The ship canal to defend infection in every domain The ways to defend intrusion at every layer Required Resources Internet Submission Requirements Format Microsoft Word Font Arial, Size 12, Double-Space Citation Style Chicago Manual of Style Length 12 pages Due By Unit 10 Self-Assessment Checklist I have included the following in my summary reportThe type of malicious attack How it spread and attacked other devices How it was mitigated I have specified point in times on how to defend the attack from recurring on a network. Unit 10 Assignment 1 Examine Real-World Applications of Security Standards and Compliance Laws Learning Objectives and Outcomes You will learn to relate a well-known standard or law to real-world applications. Assignment Requirements In this assignment, you are given a handout on security standards and compliance laws. The handout contains a list of international and internal data security standards and compliance laws.You need to select one and describe its real-world applications in both private and public sectors. Required Resources Worksheet Examine Real-World Applications of Security Standards and Compliance Laws Submission Requirements Format Microsoft Word Font Arial, Size 12, Double-Space Citation Style Chicago Manual of Style Length 12 pages Due By Unit 11 Self-Assessment Checklist I have correctly described real-world applications of the chosen standard or law. I have included examples in both the private and public sectors. Unit 10 Assignment 2 Small- to Medium-Sized art Analysis Learning Objectives and OutcomesYou will learn how to apply the Payment Card intentnesss Data Security Standards (PCI DSS) standard to a small- to medium-sized business. Assignment Requirements Meager Media is a small- to medium-sized business that is involved in the sale of used books, CDs/DVDs, and computer games. Meager Media has stores in some(prenominal)(prenominal) cities across the U. S. and is planning to bring its inventory online. The company will need to support a credit dining table transaction processing and e-commerce Web site. Write a summary report expound what Meager Media must do when ground up its Web site to bear compliance with the PCI DSS standard.Obtain a copy of the PCI DSS standards document from the following Web site and address all 6 principles and 12 requirements in your report https//www. pcisecuritystandards. org/security_standards/pci_dss. shtml (accessed September 14, 2010) Required Res ources Internet Submission Requirements Format Microsoft Word Font Arial, Size 12, Double-Space Citation Style Chicago Manual of Style Length 34 pages Due By Unit 11 Self-Assessment Checklist I have presented a detailed plan for creating a PCI DSS-compliant Web site. I have addressed all 6 principles and 12 requirements of the PCI DSS. Project Security Domains and StrategiesPurpose This jump provides you an opportunity to apply the competencies gained in motley units of this course to identify security challenges and apply strategies of countermeasures in the information systems environment. Learning Objectives and Outcomes You will learn the purpose of a multi-layered security strategy. You will understand the information systems security (ISS) fundamentals including the definition of terms, purposes, elements, and determinations. You will merged the industry standards and practices with a focus on the confidentiality, integrity, availability, and vulnerabilities of informatio n systems.You will fulfill the role of a security professional implementing congruous security controls in a specific business situation based on Systems Security certain Practitioner (SSCP) Common Body of Knowledge domains. Required extraction Information and Tools To complete the project, you will need the following 1. Access to the Internet to perform research for the project 2. Course schoolbook 3. (ISC)2 SSCP Common Body of Knowledge available in the SSCP Candidate Information bare Project Logistics The project is divided into one smaller and one major assignment as per the details below bodily function NameAssigned Due By % Grade Project ploughshare 1. Multi-Layered Security Plan Unit 1 Unit 2 6 Project trigger off 2. Student SSCP Domain Research motif Unit 2 Unit 11 15 Deliverables Project vocalisation 1 Multi-Layered Security Plan Introduction The components that make up cyberspace are not automatically secure. This includes cabling, physical networks, operating syst ems, and software applications that computers use to connect to the Internet. in that respect is a raging information security war. The goal is to protect national security and business information. Therefore, IT is in great need of proper security controls. ScenarioRichman Investments is a mid-level financial investment and consulting firm. The Richman corporate headquarters is located in Phoenix, Arizona. Currently, there are eight branch offices in Atlanta, Georgia Chicago, Illinois Cincinnati, Ohio Denver, Colorado Los Angeles, atomic number 20 Montreal, Canada New York City, New York Washington, D. C. Tasks You are a networking intern at Richman Investments. This morning, you received an e-mail from your supervisor stating that you need to create an sketch of the general security solutions planned for the safeguard of data and information that belongs to the organization.You are told that every month, the networking division needs to submit a report to the senior management intimately the security plan for the month, and this time, your outline will become a part of that report. Therefore, you need to research the elements of a multi-layered security plan and to create an outline. Your outline should indicate one or more general security solutions for each of the seven domains of a typical IT infrastructure. For this project part, you may use the book for this course and the Internet to research the concept of a multi-layered security plan.Include several applicable layers for the plan, and describe at least one layer of security for each of the seven domains. Project Part 1 should be submitted in the following format and style Format Microsoft Word Font Arial, Size 12, Double-Space Citation Style Chicago Manual of Style Length 12 pages Self-Assessment Checklist I have included several applicable layers for the plan. I have described at least one layer of security for each of the seven domains. I have conducted adequate breakaway research for the re port.Project Part 2 Student SSCP Domain Research Paper Introduction The (ISC)2 SSCP is frequently viewed as the first step in an information security career path, leading to the Certified Information Systems Security Professional (CISSP) and other advanced certifications. Scenario Continuing the Richman Investments scenario explained in Part 1 of the project, the offices have a total of 5,000 employees, and the office technology inventory includes desktops, mobile computers, and wireless devices.There is a cockle of computers running Windows XP, Windows Vista, Windows 7, and Mac OS X. most(prenominal) of the managers have blackberry devices for instant communication, and all employees are provided cell phones. A Windows dynamic Directory forest with domains is set up for each office, and seven file and print servers are located in the Phoenix office. The Phoenix office withal contains two procurator servers, configured as an array, that provide Web cache serve and Internet ac cess control for the organization.The volume of applications are Web-based and hosted from the Phoenix office. The Phoenix office has an Internet connection to all the remote offices, and the redundancy is extremely important to the company. There are several sensitive applications that all offices use. The management from each office shares application information that is hosted at the corporate office for accounting and coverage purposes. All employees have Internet access. There is no policy on the use of removable media. Several of the branch offices have encountered issues with malware youthfully.Richman hosts an intranet for employees to access information about the company and to enroll in company benefits programs. Richman also hosts an extranet for its business partners. Due to many recent technology and process improvements within Richman, the corporate security policy is out of date, and each branch office policy differs. Tasks You are a networking security intern at R ichman. You have been asked to submit a object to Richman senior management. In the proposal, you must pack to address one of the following and relate it to the appropriate SSCP domains 1. ground on the effrontery that Richman has 5,000 employees throughout the main office and several branch offices, you must research solutions and detail the appropriate access controls including policies, standards, and procedures that define who users are, what they can do, which resources they can access, and which operations they can perform on a system. 2. Based on the preface that most of the managers have BlackBerry devices for instant communications and all employees are provided cell phones, you must research and detail the cryptography methods to protectorganizational information using techniques that ensure its integrity, confidentiality, authenticity, and nonrepudiation, and the recovery of encrypted information in its original form. 3. Based on the premise that there is a mix of com puters running Windows 2000, Windows XP, Windows Vista, Windows 7, and Mac OS X, you must research and devise a plan to thwart malicious code and activity by implementing countermeasures and prevention techniques for dealing with viruses, worms, logic bombs, Trojan horses, and other related forms of intentionally created deviant code.4. Based on the premise that all employees have Internet access to browse the Web, there is no policy on the use of removable media, and several of the branch offices have encountered issues with malware recently, you must research and formulate a plan to implement monitoring and analysis. You must determine system carrying into action and access in unity with defined IT criteria as well as how to collect information for identification of and response to security breaches or events.5. Based on the premise that Richman hosts an intranet for employees to access information about the company and enroll in company benefits programs, and that Richman also hosts an extranet for its business partners, you must research and devise a method to secure networks and communications. This should include the network structure, transmission methods and techniques, enamour formats, and security measures used to operate both private and public communication networks.6. Based on the premise that the Phoenix office contains two proxy servers configured as an array, which provide Web cache services and Internet access control for Richman, and that the majority of applications are Web-based and hosted from the Phoenix office, you must assess risk, response, and recovery. Conduct a review of the implementation processes essential to the identification, measurement, and control of loss associated with uncertain events. 7.Based on the premise that the corporate security policy is out of date and each branch office policy differs, you must research and define security operations and administration including the identification of information assets and documentation of policies, standards, procedures, and guidelines that ensure confidentiality, integrity, and availability. You need to write the proposal as detailed in the instructions above. Be sure that you create a professional, well-developed proposal with proper documentation, grammar, spelling, and punctuation. In addition, document the vulnerabilities, methods, and controls effectively.Project Part 2 should be submitted in the following format and style Format Microsoft Word Font Arial, Size 12, Double-Space Citation Style Chicago Manual of Style Length 45 pages Self-Assessment Checklist I have created a professional, well-developed proposal with proper documentation, grammar, spelling, and punctuation. I have successfully identified appropriate SSCP domains and related them to the scenario. I have documented the vulnerabilities, methods, and controls effectively. I have conducted adequate independent research for the proposal.

No comments:

Post a Comment