Categories
Writers Solution

Network security firm as a professional security engineer

Consider the following scenario: You work for a network security firm as a professional security engineer. You are asked to provide a security and testing assessment document for one of the firm’s customers. The customer is a local fulfillment company that deals with confidential customer information. The fulfillment company has two locations: a headquarters office downtown and a branch office in another city.
The fulfillment company has the following equipment:
-12 Windows XP and 25 Windows 7 workstations connected to a Windows Server 2008 domain controller and file server (The Windows XP personal computers [PCs] are mostly used in the warehouse connected to high-speed printers for employees to spool and print jobs.),
– one Windows Server 2008 R2 RRAS server accessed by home workers after hours,
-one Windows Server 2003 print server,
-one Linux database server running an open source of MySQL,
-one Apache Web server for customers to check status of their jobs/orders online,
-a seven-year-old firewall connecting the headquarters’ network perimeter to a T3 internet line and virtual private network (VPN) connecting to the branch office,
-a 10-year-old firewall in the branch office connecting to the Internet and headquarters via a T1 link,
-15 Windows XP workstations in the branch office connecting to the headquarters office via VPN to the Windows Server 2008 R2 domain controller file and print server.
At the headquarters location, the servers are located in a locked server room that only authorized users can enter. The server room has a four-digit combination lock for security. Both locations have numerous security cameras, including cameras in the computer room.
The network manager has informed you that the fulfillment company has an IT security policy that all employees are required to read and sign when they are hired by the company. The network manager wants to ensure that the network is secure and asks you to provide a statement of work or rules of engagement (ROE) professional security engineer document for a network security assessment.
**Create a document following the Appendix B Template (attached) based on the scenario provided. Your document must be at least three pages in length.
Refer to the NIST Publication for additional information

SEE SOLUTION BELOW

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

  1. Introduction

With the growing of the use of internet in almost all aspects of business operation, personal and company information continue to become less private and accessible to the public when it is not well protected.  It thus becomes important for companies to set up a security system that can put company privacy safe and protect the company and customer from unforeseen fraud or employees from viruses that would eventually destroy the whole network. It thus becomes inevitable for companies to hire internet privacy consultants to ensure security of their networks are protected.

1.1. Purpose

The main purpose of this document is to come to develop the rules of engagement document that will ensure the security of the company’s network, in addition, the document will contain a security and testing assessment procedures that will ensure the customer private information is protected at all times.

1.2. Scope

To come up with the network security for the company, the activity will involve coming up with a documented system inventory including establishing and listing all the user system boundaries. There will also be documentation of the procedures and policies in regard to the company network operations. The consultant will also identify the list of threats and vulnerabilities in terms of the client privacy and user privacy, including the likelihood and the impact of occurrence.  As part of the scope there consultant will also provide the client with a list that will control and safeguard the security threats and effects of such vulnerabilities. Later the consultant will then provide the client with a list of recommended security implementation that will lead to the reduction of the said risk.  This will also provide information about the level of each security risk and the level of each residual risk including recommended changes(Wheeler, 2011). 

Apart from this, this ROE is also going to reflect on the different security objectives and policies with regard to the firm’s management of information technology.  This will be presented in the recurrent meetings with the technical worker and the users in the network among other members of the firm’s team.

1.3. Assumptions and Limitations

Identifies any assumptions made by the organization and the test team.  These may relate to any aspect of the test to include the test team, installation of appropriate safeguards for test systems, etc.  

1.4. Risks

Some of the inherent risks during the time of engagement will include:

The security administrators accidentally forgets to log off to the main system thus putting the whole network under threat.

Shared password might make the whole system weak.

The security system pairs with other system making it easy to hack in and steal private information.

Disloyal stuff may also distribute private information to the wrong publics.

Actions

Each member of staff will be required to sign a confidentiality clause about passwords and other private information in the network.

There will be a reminder in the system for all the computers to log off. In addition an automatic log off with be mandatory when the computer system has been idle for more than 2 minutes. This will reduce incidences of security threats.

Administrative password will not be shared with all supervisors and shall be changed after every one week.

Updates in regard to antivirus and anti malware will be done on a daily basis after the offices close down during shut down.

 

  • Document Structure

This section provide the rules of engagement that will be followed………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………. Network security firm as a professional security engineer …………

NOTE THAT WHAT YOU HAVE JUST READ IS A SAMPLE PAPER ABOUT THE TOPIC. CLICK THE ORDER BUTTON TO ORDER YOUR OWN PAPER

Get Professionally Written Papers From The Writing Experts 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays  

Categories
Writers Solution

network reliability testing

Research the Web, and select and discuss 3 tools that can be used to test network reliability.
Discussion Board Assignment Guidelines

Research network reliability tools, and select 3 of them to analyze.
Answer the following questions:

What is the objective of each tool?
How does each tool function with regard to network reliability testing?

How would network reliability tools be used, and when?

How are these tools used specifically to improve performance?

What challenges might be faced when trying to apply network reliability tools when using cloud computing, wireless, or other topologies?

Use APA references and citations to support your assertions.
Do not include a table of contents or abstract.

SEE SOLUTION BELOW

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

Testing network reliability

Network reliability tools are used by network administrators in many organizations to ensure that intranet and internet are working smoothly. They are used for interactive monitoring, configuration and control of various network infrastructures such as QoS, LANand routing (Stanford Linear Acceleration Center, 2017). The reliability tools are used in tracking the performance of devices and in traffic and flow analysis.

The tools enhance performance by ensuring that the network does not malfunction but works as intended. This is by tracking the network use and mitigating and or reporting to the administrator detected issues regarding network faults, attacks (e.g. DDoS) and misuse(Stanford Linear Acceleration Center, 2017).

One network reliability tool is Axence nVision. This tool monitors network infrastructure including Windows, networking applications, TCP/IP services, servers and URLs(Axence, 2017). Through monitoring routers and switches it ensures that the connected computers, network traffic and the interface status are working as desired. Axence nVision alerts the network administrator when a new program is installed or a remote node experiences a configuration change. The tool enables remote access of computers and monitors user activity.

Another tool is Genie-Monitoring. This is a monitoring and reliability tool that collects large-scale data and is used by telecommunication companies and service providers. Using various protocols such as telnet, SQL and SSH, it can monitor multiple parameters on hundreds of thousands nodes in very short cycles(Jilroy, undated). Genie-Monitoring uses conditions and correlation rules to perform actions that mitigate any network unreliability. Its built-in reporting system generates network and the tool can be used as a stand-alone or connect to such management platforms like Tivoli and HP BTO.

OpenNMS is an open source network management tool that can also scale to hundreds of thousands of nodes from a single instance(OpenNMS, 2017). This integrated tool manages network service availability, collects performance using such protocol as JMX and SNMP, and manages internal, external and custom events via XML/TCP interface and TL1. It also has event de-duplication and notifications through various protocols. Being open source, the tool is available for free and the developers also offer support, consultancy and training.

Challenges in applying network reliability tools

A challenge in application of network reliability tools when using cloud computing, wirelessor other topologies is locating the problem when the network is unreliable because the traffic passes through multiple locations, some not under the direct control of the network administrator(TechTarget, 2010).This challenge is compounded in very large networks with millions of nodes that cannot be handled by most of the reliability tools.

Proxies-in-the-cloud via such protocols as SaaS, IaaS and PaaS pose challenges in that they complicate analysis when mixing and matching records (TechTarget, 2010). This is exacerbated by the fact that network flows between proxies are ineffective.

Privacy is also another challenge when using modern protocols. Network administrators have to limit their activities to meet privacy regulations…………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………….. … network reliability testing ………………..

NOTE THAT WHAT YOU HAVE JUST READ IS A SAMPLE PAPER ABOUT THE TOPIC. CLICK THE ORDER BUTTON TO ORDER YOUR OWN PAPER

Get Professionally Written Papers From The Writing Experts 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays  

Categories
Writers Solution

Security mechanisms would you use to secure information on the network

Can-D is a fairly large company headquartered in Orlando, Florida. There are 3,000 employees located at their headquarters. The company produces canned video content for popular entertainment ventures. Recently, they partnered with another local company (Video-Cam Corporation) who will be setting up an office at Can-D headquarters. There are some concerns regarding access to information between the various departments involved. As the network administrator, it is your responsibility to develop and propose a solution to address these security concerns. What specific security mechanisms would you use to secure information on the network, and why?
Prepare a 2-3 page Word document that summarizes your proposal to address security concerns. Explain the technologies appropriate for this situation, describe your reasons for using them, and explain configuration issues.
Be sure to cite all references using APA style.
For more information on APA, please visit the Library and click on Citation Resources link.

SEE SOLUTION BELOW

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

Network security solution

Network security is concerned with the policies and practices that prevent and monitor unauthorized access, misuse, modification and or denial of an information network and network devices. Network security also involves the authorization of access to data and programs in a network through an authentication methodLafuente, (Smith, 2013).

For Can-D and Video-Cam Corporation, it is important to haveat least two network access servers, with one being back up. These will perform authentication, authorization and accounting functions by verifying the logon details of potential users. The servers will also define layers of access for authorized users, determining what each users can do while connected to the network depending on their defined profile and posture (Smith, 2013). Programs that control network threats such as antiviruses, firewalls and spyware and malware detection can also be installed on the servers. That it is a large company means that the installed anti-threat programs should be advanced to be able to deal with the potential of many and sophisticated passive and active malicious attacks (Lafuente, 2015). The programs can be custom-made for the company or bought off the shelf (e.g. Cisco network security programs) and customized.

Access control policies, mechanisms and models are important considerations in implementing the network security system. Access control policies will specify how to manage access and who to grant access to what and when. The policies can be based on resource use, authority, obligation or confidentiality. An Access Control List can be the mechanism used to translate the access request. Security model will present the security properties of the access control system (Smith, 2013).

A Network Access Control (NAC) would need to be implemented for interpretation and checking of pre-admission and post-admission security policies. The policies can be regarding levels of anti-virus protection, system update and configuration. NAC solution will enable network security by describing device access to network nodes. It can be used to fix non-compliant nodes in the system enabling network infrastructure such as routers and switches to seamlessly and securely connect back office servers and end user devices. The NAC should also allow scalability to cater for the deployment scenario of a large, growing company that has fluctuating number of users, BYOD policy and remote access (Morrow, (2012).A NAC with 802.1X wired and wireless can be used for rigid control of the network system for Can-D and Video-Cam.“NIST IR 7874-Guidelines for Access…………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………….. secure information on the network ……………………

NOTE THAT WHAT YOU HAVE JUST READ IS A SAMPLE PAPER ABOUT THE TOPIC. CLICK THE ORDER BUTTON TO ORDER YOUR OWN PAPER

Get Professionally Written Papers From The Writing Experts 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays  

Categories
Writers Solution

Secure information on the network

Can-D is a fairly large company headquartered in Orlando, Florida. There are 3,000 employees located at their headquarters. The company produces canned video content for popular entertainment ventures. Recently, they partnered with another local company (Video-Cam Corporation) who will be setting up an office at Can-D headquarters. There are some concerns regarding access to information between the various departments involved. As the network administrator, it is your responsibility to develop and propose a solution to address these security concerns. What specific security mechanisms would you use to secure information on the network, and why?
Prepare a 2-3 page Word document that summarizes your proposal to address security concerns. Explain the technologies appropriate for this situation, describe your reasons for using them, and explain configuration issues.
Be sure to cite all references using APA style.
For more information on APA, please visit the Library and click on Citation Resources link.

SEE SOLUTION BELOW

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

Get Professionally Written Papers From The Writing Experts 

Network security solution

Network security is concerned with the policies and practices that prevent and monitor unauthorized access, misuse, modification and or denial of an information network and network devices. Network security also involves the authorization of access to data and programs in a network through an authentication methodLafuente, (Smith, 2013).

For Can-D and Video-Cam Corporation, it is important to haveat least two network access servers, with one being back up. These will perform authentication, authorization and accounting functions by verifying the logon details of potential users. The servers will also define layers of access for authorized users, determining what each users can do while connected to the network depending on their defined profile and posture (Smith, 2013). Programs that control network threats such as antiviruses, firewalls and spyware and malware detection can also be installed on the servers. That it is a large company means that the installed anti-threat programs should be advanced to be able to deal with the potential of many and sophisticated passive and active malicious attacks (Lafuente, 2015). The programs can be custom-made for the company or bought off the shelf (e.g. Cisco network security………………………………………………………………………………………………………………………………………………………………………………………………………………………………….

Secure information on the network………………………………………………………………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………………………………………………………………………………………………………………………….

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays  

Categories
Writers Solution

Network technologies can be employed in various ways to meet business needs.

Network technologies can be employed in various ways to meet business needs. Developing a solution begins with a set of requirements that must be understood and met. Following is a scenario that requires the use of a variety of network components and technologies. When working on developing a solution, all requirements may not be explicitly stated. When in doubt, post targeted questions. When making assumptions, be sure to include them in your design document. 
The construction industry has struggled over the past years due to the economy. Nearly a dozen companies, including builders and subcontractors, banned together to develop a strategy to increase their business in the greater Washington, D.C. area. This consortium of builders and subcontractors called themselves BLDRS-DC. 
BLDRS-DC engaged a well-known marketing company that recommended that they use a Web site to exhibit their services, capabilities, and availability. Other social media sites would be represented in the final solution as well. This site would tie together their sales and scheduling information. They also identified the need for the project managers to have access to project details from the construction sites. This remote access would ensure tasks were completed correctly and decrease construction time considerably.
In addition to engaging a marketing firm, BLDRS-DC hired a company that develops and manages Web sites. The Web site management company would be responsible for developing the software to connect sales materials and scheduling information to the Web site. Fortunately, all the companies involved use the same scheduling software and database software for sales material. 
As the network specialist selected to plan and coordinate all of the activities, you need to develop a design document that outlines the technologies needed at each company to connect their unique information to the Web site. Specify the necessary network components that each company would need to enable customer access and scheduling. 
In addition, you need to identify a solution for allowing construction managers to securely access drawings and other pertinent construction details remotely. 
Prepare a Word document that is approximately 3–5 pages in APA format.
Be sure to include the following. •Title page •Introduction •Description of the network components needed to allow access to marketing materials and scheduling information •Specified technologies needed to allow construction foremen remote access to construction details •Explanation of any challenges or considerations uncovered from the research conducted 

IT Management: Network Design Document For BLDRS-DC

…………………………………………………………………………………………………

SEE SOLUTION BELOW

ASSIGNMENT COMPLETED AT https://capitalessaywriting.com

MAKE YOUR ORDER AND GET THE COMPLETED ORDER

NO PLAGIARISM

(Course Instructor)

(University Affiliation)

(Student’s Name)

Introduction

            Having coordinated activities in the construction industry is important in ensuring efficiency and effective construction process. However, having a set of technologies is important in ensuring effective coordination of the activities. Assuming I am a design specialist for BLDRS-DC, the following is an outline of the technologies that are needed in the individual companies to connect their information their website. The necessary network components needed by the individual construction company to enable customer access and scheduling are discussed. Finally, any challenges and considerations uncovered from the research that was conducted are discussed.

The Network Components Needed To Allow Access to Marketing Materials and Scheduling Information           The first network component that is essential for all the companies is the virtual private network. The Virtual Private Network (VPN) is a private network that employs public network (the internet) (Cisco, 2008). Thus, this allows for an easy access to marketing materials and scheduling of information. The BLDRS-DC has a number of employees, who would wish to connect remotely to the company LAN remotely in their variou………………………………………………………………………………………………………………………………………………………………………………………….

GET THE COMPLETED ASSIGNMENT

ASSIGNMENT COMPLETED AT CapitalEssayWriting.com

MAKE YOUR ORDER AND GET THE COMPLETED ORDER

CLICK HERE TO ORDER THIS PAPER AT CapitalEssayWriting.com

NO PLAGIARISM 

Categories
Writers Solution

Process used to fix a network connection

Today, networks are found everywhere. Whether you are grabbing a cup of coffee or awaiting your airplane to depart for a business trip, you can usually connect to a network. Sometimes there are issues so troubleshooting is an essential skill to have This week, you have had an opportunity to work with tools in your simulated environment to fix a network connection. 
Discuss with the class the process used to fix a network connection. Describe any challenges or issues experienced in the lab. Feel free to share your thoughts regarding the lab activities. 
Review the posts of your classmates, follow up on their thoughts about your experiences, and add your perspective to their views.

……………………………………………………………………………………………………

SEE SOLUTION BELOW

ASSIGNMENT COMPLETED AT https://capitalessaywriting.com

MAKE YOUR ORDER AND GET THE COMPLETED ORDER

NO PLAGIARISM

Information Management: The Processes of Troubleshooting Network Connection

(Course Instructor)

(University Affiliation)

(Student’s Name)

The Processes of Troubleshooting Network Connection

            Whether networks are wireless or wired, sometimes some issues can arise that makes it hard to use the network (Besnard & Bastien-Toniazzo, 1999). Network troubleshooting aims to resolve problems and restore the normal network operations within a network. The following processes describe troubleshooting of network connection. The first step would be to check the condition of the physical connection, and this involves checking the cable connectivity. Sometimes, a network connection is lost because the cable connection is loose or has been removed. Moreover, the cable should be checked for any cuts and that they click upon their insertion into the network port. This should include checking if the right type of cable was used for the network connectivity.           Secondly, the data link layer is checked especially the Address Resolution Protocol. The data link layer is where local communications occur through network port hardware addresses. A determination should be done to find out if IP addresses……………………………………..………………………………………………………………………………………………………………………………………………………………………………………….

GET THE COMPLETED ASSIGNMENT

ASSIGNMENT COMPLETED AT CapitalEssayWriting.com

MAKE YOUR ORDER AND GET THE COMPLETED ORDER

CLICK HERE TO ORDER THIS PAPER AT CapitalEssayWriting.com

NO PLAGIARISM

Categories
Writers Solution

Network Design Document For BLDRS-DC

Network technologies can be employed in various ways to meet business needs. Developing a solution begins with a set of requirements that must be understood and met. Following is a scenario that requires the use of a variety of network components and technologies. When working on developing a solution, all requirements may not be explicitly stated. When in doubt, post targeted questions. When making assumptions, be sure to include them in your design document. 
The construction industry has struggled over the past years due to the economy. Nearly a dozen companies, including builders and subcontractors, banned together to develop a strategy to increase their business in the greater Washington, D.C. area. This consortium of builders and subcontractors called themselves BLDRS-DC. 
BLDRS-DC engaged a well-known marketing company that recommended that they use a Web site to exhibit their services, capabilities, and availability. Other social media sites would be represented in the final solution as well. This site would tie together their sales and scheduling information. They also identified the need for the project managers to have access to project details from the construction sites. This remote access would ensure tasks were completed correctly and decrease construction time considerably.
In addition to engaging a marketing firm, BLDRS-DC hired a company that develops and manages Web sites. The Web site management company would be responsible for developing the software to connect sales materials and scheduling information to the Web site. Fortunately, all the companies involved use the same scheduling software and database software for sales material. 
As the network specialist selected to plan and coordinate all of the activities, you need to develop a design document that outlines the technologies needed at each company to connect their unique information to the Web site. Specify the necessary network components that each company would need to enable customer access and scheduling. 
In addition, you need to identify a solution for allowing construction managers to securely access drawings and other pertinent construction details remotely. 
Prepare a Word document that is approximately 3–5 pages in APA format.
Be sure to include the following. •Title page •Introduction •Description of the network components needed to allow access to marketing materials and scheduling information •Specified technologies needed to allow construction foremen remote access to construction details •Explanation of any challenges or considerations uncovered from the research conducted 

……………………………………………………………………………………………………

SEE SOLUTION BELOW

ASSIGNMENT COMPLETED AT https://capitalessaywriting.com

MAKE YOUR ORDER AND GET THE COMPLETED ORDER

NO PLAGIARISM

IT Management: Network Design Document For BLDRS-DC

(Course Instructor)

(University Affiliation)

(Student’s Name)

Introduction

            Having coordinated activities in the construction industry is important in ensuring efficiency and effective construction process. However, having a set of technologies is important in ensuring effective coordination of the activities. Assuming I am a design specialist for BLDRS-DC, the following is an outline of the technologies that are needed in the individual companies to connect their information their website. The necessary network components needed by the individual construction company to enable customer access and scheduling are discussed. Finally, any challenges and considerations uncovered from the research that was conducted are discussed.

The Network Components Needed To Allow Access to Marketing Materials and Scheduling Information

            The first network component that is essential for all the companies is the virtual private network. The Virtual Private Network (VPN) is a private network that employs public network (the internet) (Cisco, 2008). Thus, this allows for an easy access to marketing materials and scheduling of information. The BLDRS-DC has a number of employees, who would wish to connect remotely to the company LAN remotely in their various locations. The VPN needs a connection to an internet service provider, to provide internet dial-up account for successful use of the VPN.           The other network component that allows access to marketing………………………………………………………………………………………………………………………………………………………………………………………………………………………………………….

GET THE COMPLETED ASSIGNMENT

ASSIGNMENT COMPLETED AT CapitalEssayWriting.com

MAKE YOUR ORDER AND GET THE COMPLETED ORDER

CLICK HERE TO ORDER THIS PAPER AT CapitalEssayWriting.com

NO PLAGIARISM

Categories
Writers Solution

A publicly traded home builder has hired you to install a new wireless network Secure Service

First Section 

In a 350- to 500-word essay, address the 4 questions. 

Case study: A publicly traded home builder has hired you to install a new wireless network. The company currently has a wireless network that is a few years old. The problem with the current wireless network is that it was built using proprietary standards instead of 802.11. This current wireless network does not have an upgrade path to 802.11.

On the new wireless network, the corporate office wants a system that allows construction workers to enter progress reports into the system in order to stay up-to-date with all the different community building sites. Each community has a model home that will need Wi-Fi to connect back to the corporate office in order to enter these reports. The construction workers will be using iPads to enter the information. The company currently has 32 sites across the country that will need Wi-Fi. 

In each of these sites, there will be two sales employees that will need to have Wireless IP Phones so that customers can get in touch with them easily. The sales employees will also have laptops, as well as two sales kiosks that allow customers to browse the different options to choose from for their new home build. The kiosks will connect to the Internet, and when the customer chooses their options, the information will be entered into a database. Once the customer chooses the options they want, the sales person will pull up the report on their laptops to print for the construction workers. 

Directions: Looking at the current wireless network and what the home builder would like to accomplish with the new network, explain to the company why the current wireless network will have to be replaced before you can begin the project. The Chief Information Officer (CIO) has asked you to come up with a plan to implement this new wireless network. Include in your report:

1. A brief description of the problem with the current wireless network

2. The benefits of global/industry standards vs. proprietary standards

3. What types of problems exist with mixed standards 

4. A plan to correct the problems with the current wireless network

__________________________________________________________________________________

 Second section…. 

1. PROJECT SCOPE –

Project scope

2. FEASIBILITY STUDY –

Objectives of the Network:

1. Secure Service – What is the main objective of this network? 

2. Integration and Updates –What needs to be done to get the current network up-to-date?

3. Versatile Information Process –What does the network need to be able to do? For example, applications, devices, computers, laptops, etc. 

4. Collaboration – How will the network be used to collaborate with other offices? Other users in a different location?

5. Scalability – How will the network be able to adapt to change?

Intended Users –What type of mobility requirements, client device requirements, and signal coverage requirements are needed?

Design Assumptions – State the assumptions for unknown factors that could affect the project. 

Equipment Needs and Proposed Budget

Categories
Writers Solution

Information technology (IT) intern working for Health Network, Inc. (Health Network)

 Purpose

This project provides an opportunity to apply the competencies gained in the lessons of this course to develop a risk management plan for a fictitious organization to replace its outdated plan.

Learning Objectives and Outcomes

You will gain an overall understanding of risk management, its importance, and critical processes required when developing a formal risk management plan for an organization.

Required Source Information and Tools

The following tools and resources that will be needed to complete this project:

  • Course textbook
  • Internet      access for research

Deliverables

As discussed in this course, risk management is an important process for all organizations. This is particularly true in information systems, which provides critical support for organizational missions. The heart of risk management is a formal risk management plan. The project activities described in this document allow you to fulfill the role of an employee participating in the risk management process in a specific business situation.

Submission Requirements

All project submissions should follow this format:

  • Format: Microsoft Word or compatible
  • Font: Arial, 10-point,      double-space
  • Citation Style: Your school’s preferred style      guide
  • Minimum 2 pages per task

Scenario

You are an information technology (IT) intern working for Health Network, Inc. (Health Network), a fictitious health services organization headquartered in Minneapolis, Minnesota. Health Network has over 600 employees throughout the organization and generates $500 million USD in annual revenue. The company has two additional locations in Portland, Oregon and Arlington, Virginia, which support a mix of corporate operations. Each corporate facility is located near a co-location data center, where production systems are located and managed by third-party data center hosting vendors. 

Company Products 

Health Network has three main products: HNetExchange, HNetPay, and HNetConnect.

HNetExchange is the primary source of revenue for the company. The service handles secure electronic medical messages that originate from its customers, such as large hospitals, which are then routed to receiving customers such as clinics.

HNetPay is a Web portal used by many of the company’s HNetExchange customers to support the management of secure payments and billing. The HNetPay Web portal, hosted at Health Network production sites, accepts various forms of payments and interacts with credit-card processing organizations much like a Web commerce shopping cart.

HNetConnect is an online directory that lists doctors, clinics, and other medical facilities to allow Health Network customers to find the right type of care at the right locations. It contains doctors’ personal information, work addresses, medical certifications, and types of services that the doctors and clinics offer. Doctors are given credentials and are able to update the information in their profile. Health Network customers, which are the hospitals and clinics, connect to all three of the company’s products using HTTPS connections. Doctors and potential patients are able to make payments and update their profiles using Internet-accessible HTTPS Web sites.

Information Technology Infrastructure Overview

Health Network operates in three production data centers that provide high availability across the company’s products. The data centers host about 1,000 production servers, and Health Network maintains 650 corporate laptops and company-issued mobile devices for its employees.

Threats Identified

Upon review of the current risk management plan, the following threats were identified:

· Loss of company data due to hardware being removed from production systems

· Loss of company information on lost or stolen company-owned assets, such as mobile devices and laptops

· Loss of customers due to production outages caused by various events, such as natural disasters, change management, unstable software, and so on

· Internet threats due to company products being accessible on the Internet

· Insider threats

· Changes in regulatory landscape that may impact operations 

Management Request

Senior management at Health Network has determined that the existing risk management plan for the organization is out of date and a new risk management plan must be developed. Because of the importance of risk management to the organization, senior management is committed to and supportive of the project to develop a new plan. You have been assigned to develop this new plan.

Additional threats other than those described previously may be discovered when re-evaluating the current threat landscape during the risk assessment phase.

The budget for this project has not been defined due to senior management’s desire to react to any and all material risks that are identified within the new plan. Given the company’s annual revenue, reasonable expectations can be determined.

Project Part 1 Task 2: Risk Assessment Plan

After creating an initial draft of the risk management plan, the second part of the assigned project requires you to create a draft of the risk assessment (RA) plan. To do so, you must:

  1. Develop an introduction to the plan explaining its purpose and importance.
  2. Create an outline for the RA plan.
  3. Define the scope and boundaries for the RA      plan.
  4. Research and summarize RA approaches.
  5. Identify the key roles and      responsibilities of individuals and departments within the organization as      they pertain to risk assessment.
  6. Develop a proposed schedule for the RA      process.
  7. Create a professional report detailing the      information above as an initial draft of the RA plan.

Evaluation Criteria and Rubrics

Categories
Writers Solution

Develop a security Infrastructure for a Medium-Size Network

 ITNE2005Develop a security Infrastructure for a Medium-Size Network
Assignment
Objective(s)
This assessment item relates to the unit learning outcomes as in the unit descriptor. This assessment is designed to evaluate student’s ability on working with the routers, firewalls and VPN tunnels and adopting those technologies in enterprise level networks.
The following ULOs are assessed in this assent assessment.
LO 1
Explain network security issues and develop a comprehensive network security policy to counter threats against information security
LO 2
Analyse and configure routers on the network perimeter with router software security features
LO 3
Evaluate and configure firewall protocols and features to perform basic security operations on a network
LO 4
Critically review the enterprise network requirements and configure site-to-site virtual private networks using standard router software features
LO 5
Analyse the enterprise security requirements and configure intrusion prevention systems on network routers
LO 6
Monitor network traffic and implement security policies to control access, resist attacks, and protect network devices
INSTRUCTIONS
These instructions apply to Assignment
Assignment (Weightage 20%) – The report should be uploaded on the LMS by Session 12
Demonstration: Due on Lesson 12 in class
This Assignment will focus on student’s ability to work on an enterprise level network and handle network devices. Upon the implementation of the network, student should produce a comprehensive report, which includes screenshots of entering configuration commands and brief explanation of the screenshots. The devices should be named with the respective student ID
If any third-party content is used. The citation of sources is mandatory and should follow IEEE style.
What to Submit.
Submit your report to the Moodle drop-box for Assignment. Note that incidents of plagiarism will be penalized.
Please Note: All work is due by the due date and time. Late submissions will be penalized at the rate of 10% per day including weekends.
Assignment Description:
Figure 1: Network Topology
Note: Integrated Services Routers (ISR) have Fast Ethernet interfaces instead of Gigabit Ethernet interfaces.
Addressing Table
Device Interface IP Address Subnet Mask Default Gateway Switch Port
R1-S0000 F0/0 209.165.200.225 255.255.255.248 N/A ASA G0/0
S0/0 (DCE) 10.1.1.1 255.255.255.252 N/A N/A
Loopback 1 172.20.1.1 255.255.255.0 N/A N/A
R2-S0000 S0/0 10.1.1.2 255.255.255.252 N/A N/A
S0/1 (DCE) 10.2.2.2 255.255.255.252 N/A N/A
R3-S0000 F0/1 172.16.3.1 255.255.255.0 N/A S3 G0/0
S0/0 10.2.2.1 255.255.255.252 N/A N/A
S1-S0000 VLAN 1 192.168.2.11 255.255.255.0 192.168.2.1 N/A
S2-S0000 VLAN 1 192.168.1.11 255.255.255.0 192.168.1.1 N/A
S3-S0000 VLAN 1 172.16.3.11 255.255.255.0 172.16.3.1 N/A
ASA VLAN 1 (G0/1) 192.168.1.1 255.255.255.0 N/A S2 G0/0
VLAN 2 (G0/0) 209.165.200.226 255.255.255.248 N/A R1 F0/0
VLAN 3 (G0/2) 192.168.2.1 255.255.255.0 N/A S1 G0/0
PC-A NIC 192.168.2.3 255.255.255.0 192.168.2.1 S1 G0/1
PC-B NIC 192.168.1.3 255.255.255.0 192.168.1.1 S2 G0/1
PC-C NIC 172.16.3.3 255.255.255.0 172.16.3.1 S3 G0/1
In this Assignment you are required to complete all the following parts:
Task 1: Configure Basic Device Settings:
• Configure host names as shown in the topology plus your student ID.
• Configure interface IP addresses as shown in the IP Addressing Table.
• Configure static and dynamic routing
Task 2: Configure Secure Router Administrative Access
• Configure encrypted passwords and a login banner.
• Configure the EXEC timeout value on console and VTY lines.
• Configure login failure rates and VTY login enhancements.
• Configure Secure Shell (SSH) access and disable Telnet.
• Configure local authentication, authorization, and accounting (AAA) user authentication.
• Secure the router against login attacks and secure the IOS image and the configuration file.
• Configure a router NTP server and router NTP clients.
• Configure router syslog reporting and a syslog server on a local host.
Task 3: Configure a Zone-Based Policy Firewall and Intrusion Prevention System
• Configure a Zone-Based Policy Firewall (ZPF) on an R3 using the CLI.
• Configure an intrusion prevention system (IPS) on an R3 using the CLI.
Task 4: Secure Network Switches
• Configure passwords and a login banner.
• Configure management VLAN access.
• Secure access ports.
• Protect against Spanning Tree Protocol (STP) attacks.
• Configure port security and disable unused ports.
Task 5: Configure ASA Basic Settings and Firewall
• Configure basic settings, passwords, date, and time.
• Configure the inside and outside VLAN interfaces.
• Configure port address translation (PAT) for the inside network.
• Configure a Dynamic Host Configuration Protocol (DHCP) server for the inside network.
• Configure administrative access via Telnet and SSH.
• Configure a static default route for the Adaptive Security Appliance (ASA).
• Configure Local AAA user authentication.
• Configure a DMZ with a static NAT and ACL.
• Verify address translation and firewall functionality.
Task 6: Configure a DMZ, Static NAT, and ACLs on an ASA
• Configure static NAT to the DMZ server using a network object.
• View the DMZ Access Rule (ACL) generated by ASDM.
• Test access to the DMZ server from the outside network.
Task 7: Configure ASA Clientless SSL VPN Remote Access Using ASDM
• Configure a remote access SSL VPN using the Cisco Adaptive Security Device Manager (ASDM).
• Verify SSL VPN access to the portal.
Task 8: Configure a Site-to-Site VPN between the ASA and R3
• Configure an IPsec site-to-site VPN between the ASA and R3-S0000 using ASDM and the CLI.
• Activate and verify the IPsec site-to-site VPN tunnel between the ASA and R3.
Upon Completion of the above configuration tasks, you have been asked to draft a Policy on using of VPN by telecommuters. The policy should include the following sections:
1. Objectives 3. Audience 5. Exceptions
2. Purpose 4. Policy 6. Violations
NOTE: To complete the Assignment, refer to Assignment Supplementary Document.
Marking Guide: 100 Marks
Please note that the Assignment will contribute towards 20% of the final grade.
Task Description Marks
Final Report 80
Report Layout The report style, language and structure should be appropriate. All screenshots and descriptions need to be compiled and in a single final report and any given suggestions need to be incorporated.
The report must contain
i. Cover page with Unit Code, Unit Name and Student ID
ii. Table of Contents
iii. Introduction iv. Technical Discussion
v. Policy Document on using of VPN by telecommuters
vi. Critical Analysis
vii. Conclusion 5
Introduction The introduction should include purpose of the report, sections covered which should convince the reader that the report is worth reading. Word count limit – 125 words
4
Technical
Discussion
This section should include the configurations done in the virtualized network environment. You should break down this section into eight tasks and include at least 6 screen shots from each of these tasks and a brief description
i. Task 1: Configure Basic Device Settings: ii. Task 2: Configure Secure Router Administrative Access
iii. Task 3: Configure a Zone-Based Policy Firewall and Intrusion
Prevention System iv. Task 4: Secure Network Switches
v. Task 5: Configure ASA Basic Settings and Firewall
vi. Task 6: Configure a DMZ, Static NAT, and ACLs on an ASA
vii. Task 7: Configure ASA Clientless SSL VPN Remote Access Using
ASDM
viii. Task 8: Configure a Site-to-Site VPN between the ASA and ISR 45
5
5
5
5
5
5
5
10
Policy Document on using of VPN by
telecommuters
The policy should comprehensively cover all the aspects related to connecting to an enterprise network by a telecommuter 10
Critical Analysis The students are required to provide a critical analysis of the deployed network considering:
a) Confidentiality 10
b) Integrity
c) Availability
d) Performance
e) Scalability
Conclusion Summarize your findings. Word count limit – 125 words
4
References Should follow IEEE style.
2
Demonstration
In class
demonstration – 10 mins The students are required to demonstrate in class, during Lesson 12 20