Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Application of Network Security Concepts

An international law firm has asked you to engage in a risk and mitigation evaluation and plan for their organization. The details of their infrastructure follow.

The organization has offices in:

o United States: New York, New York, and Palo Alto, California (headquarters).

o England: London.

o Russia: Moscow.

o Mongolia: Ulaanbaatar.

o China: Hong Kong.

o Japan: Tokyo.

Each location is set up as a star topology with 40 PCs networked together, with the exception of the law firm's headquarters in Palo Alto, California.

The offices in New York are located on the 20th floor of a high rise. The remaining locations are all in commercial office centers with office space that shares a common wall with other businesses. All locations have a dedicated closet space that houses the networking equipment.

Each location has IT support, and local users are managed locally with organization-wide replication of active directory changes that occur every 20 minutes.

Headquarters

The Palo Alto location has an additional 10 PCs and the following employees:

o Executives: Chief executive officer, chief financial officer, chief operating officer, chief information officer, and chief ethics officer, plus executive assistants (5).

o Accounting: Director, accounts payable clerk, and accounts receivable clerk.

o Human Resources: Director.

o Information Technology: Director and systems analyst.

o Legal: Attorneys (10), paralegals (10), legal assistants (10), and legal interpreters (2).

o Administration: Office administrator and office assistant.

Other Offices

Each of the other locations has 40 PCs and the following employees:

o Accounting: Director, accounts payable clerk, and accounts receivable clerk.

o Human Resources: Director.

o Information Technology: Director and systems analyst.

o Legal: Attorneys (10), paralegals (10), legal assistants (10), and legal interpreters (2).

o Administration: Office administrator and office assistant.

Further Details

Additional details about the project organization including the following:

o All executives, lawyers, paralegals, legal assistants, and legal interpreters have been issued an HP Pavilion dv7t Quad edition laptop with security provided by Zone Alarm's security suite. No desktops are used by these employees. Docking stations are used at the office. When out of the office, each of these employees conducts business wirelessly using AT&T's wireless card and Motorola's Droid X.

o All other employees use HP's Pavilion Elite HPE-570t series desktop.

o All laptops and desktops run the Windows XP operating system with WordPerfect, Office 2010 Professional, Windows Media, WebEx, and Adobe Reader 8 installed. The company uses Gmail as its e-mail provider. Droid X runs all of the above except for the XP operating system. Each runs the Android 2.2 OS.

o Each location uses an IBM BladeCenter HX5 server along with Microsoft Windows Server 2008 R2 (NOS).

o The switch for each location is Cisco's Catalyst 2960-S series model number 2960S-48TS-S with Cisco TrustSec installed.

o All locations but the Mongolia office have been equipped with Cisco's 3900 series Integrated Services Router Model 2951, with security provided by Cisco's Network Analysis Module (NAM).

o The Mongolia office is equipped with Cisco's Space Router due to Ulaanbaatar's unreliable infrastructure.

Connecting the locations to each other is an IP WAN utilizing an integrated services digital network primary rate interface (ISDN-PRI) back up and fiber distributed data interface (FDDI).

Use the study materials, the enterprise description, and any additional research needed to fill in knowledge gaps. Write a 2â€"3 page paper that addresses the following:

o Evaluate the existing infrastructure as it currently exists.

o Identify significant vulnerabilities, risks, and points that exist within the network architecture of the organization.

o Recommend specific security technologies/methods that can be implemented to mitigate risks and points of vulnerability within the organization.

o Explore the benefits and challenges of implementing a cloud based solution for this organization.

Assignment Requirements

o Written communication: Written communication is free of errors that detract from the overall message.

o APA formatting: Resources and citations are formatted according to APA (sixth edition) style and formatting.

o Length of paper: 2-3 pages, excluding the references page.

o Font and font size: Times New Roman, 12 point.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92824043
  • Price:- $50

Priced at Now at $50, Verified Solution

Have any Question?


Related Questions in Management Information System

Suppose that frames are 500 bytes long which includes 58

Suppose that frames are 500 bytes long which includes 58 bytes of overhead. Also assume that ACK frames are 64 bytes long. a) The transmission uses Stop-and-Wait ARQ. Let the transmission rate of the system be R where R= ...

Read cybercrime deterrence and international legislation

Read "Cybercrime Deterrence and International Legislation: Evidence From Distributed Denial of Service Attacks," by Hui, Kim, and Wang, from MIS Quarterly (2017). Refer to this reading when completing Topic 8 DQ1. Read " ...

Assignment risk managementit is an accepted truth that

Assignment : Risk Management It is an accepted truth that without risk there can be no gain. Every individual and organization who wants to succeed must take some risks. Risk management is not about not taking risks, but ...

1 discuss the difference between a business continuity plan

1. Discuss the difference between a Business Continuity Plan (BCP), and a Disaster Recovery Plan (DRP). 2. What would be your recommendation for training personnel on your BCP and DRP if your plan documents were adopted ...

Background kirk 2016 designed his text to help understand

Background: Kirk (2016) designed his text to help understand the four steps involved in working with data. Kirk (2016) Discuss the following working with data steps: Data acquisition, data examination, data transformatio ...

Question briefly explain your understanding of

Question : Briefly explain your understanding of countermeasures and defense mechanisms that could be used to protect an organizations environment. Make sure to cite and reference the sources used for this discussion, as ...

Exercise 83 change control1 dr planning requires change

Exercise 8.3: Change Control 1. DR planning requires change management of the plan, as do the items involved in recovery, since technological environments change over time. 2. In a well supported essay, describe how you ...

Each case needs to be at least 250 words apa citation

Each case needs to be at least 250 words. APA citation required. Each case needs to be written separately. Turnitin check required. Case 1: Select a company either real or fictious. Completely describe the company includ ...

Using jython 50 or higherdevelop three new methods for the

Using Jython 5.0 or higher Develop three new methods for the Turtle class as follows: Add a method to the Turtle class to draw a rectangle given a certain width and height Add a method to the Turtle class to draw a simpl ...

Wireless applications please respond to the

"Wireless Applications" Please respond to the following: •Analyze what you believe to be the three most important advancements in wireless technologies within the last five years and describe how they have impacted busin ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As