Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Imagine you are an Information Systems Security Officer for a medium-sized financial services firm that has operations in four (4) states (Virginia, Florida, Arizona, and California).

Due to the highly sensitive data created, stored, and transported by your organization, the CIO is concerned with implementing proper security controls for the LAN-to-WAN domain.

Specifically, the CIO is concerned with the following areas:

Protecting data privacy across the WAN

Filtering undesirable network traffic from the Internet

Filtering the traffic to the Internet that does not adhere to the organizational acceptable use policy (AUP) for the Web

Having a zone that allows access for anonymous users but aggressively controls information exchange with internal resources

Having an area designed to trap attackers in order to monitor attacker activities

Allowing a means to monitor network traffic in real time as a means to identify and block unusual activity

Hiding internal IP addresses

Allowing operating system and application patch management

The CIO has tasked you with proposing a series of hardware and software controls designed to provide security for the LAN-to-WAN domain. The CIO anticipates receiving both a written report and diagram(s) to support your recommendations.

Write a three to five page paper in which you:

Use MS Visio or an open source equivalent to graphically depict a solution for the provided scenario that will:

filter undesirable network traffic from the Internet

filter Web traffic to the Internet that does not adhere to the organizational AUP for the Web

allow for a zone for anonymous users but aggressively controls information exchange with internal resources

allow for an area designed to trap attackers in order to monitor attacker activities

offer a means to monitor network traffic in real time as a means to identify and block unusual activity

hide internal IP addresses

Identify the fundamentals of public key infrastructure (PKI).

Describe the manner in which your solution will protect the privacy of data transmitted across the WAN.

Analyze the requirements necessary to allow for proper operating system and application patch management and describe a solution that would be effective.

Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92830839
  • Price:- $40

Priced at Now at $40, Verified Solution

Have any Question?


Related Questions in Management Information System

During the course of your employment you may have

During the course of your employment you may have experienced working for both a male and female supervisor. Discuss from your personal point of view the advantages/disadvantages and like/dislike of working for each gend ...

Question suppose dr smart has designed a 4des cipher which

Question : Suppose Dr. Smart has designed a 4DES cipher which encrypts data m in the following way: c= Dk4(Dk3(Ek2(Ek1(m)))), where E and D denote the encryption and decryption operation of DES. To break this cipher and ...

Assignment purpose the purpose of this assignment is to

Assignment Purpose: The purpose of this assignment is to create a budget with appropriate resource allocation Scenario: You are the office manager for an office of four physicians (Dr. A, Dr. B, Dr. C, and Dr. D). Last y ...

Discussionconduct research using the library and the

Discussion Conduct research using the library and the Internet to find information about ethernet and nonethernet networking. Then, answer the following: Discuss the major differences between these types of networking te ...

Question suppose the daytime processing load consists of 65

Question : Suppose the daytime processing load consists of 65% CPU activity and 35% disk activity. Your customers are complaining that the system is slow. After doing some research, you have learned that you can upgrade ...

Search the csu library the internet or any specific

Search the CSU library, the Internet, or any specific websites, and scan IT industry magazines to find an example of an IT project that had problems due to organizational issues. Write a paper summarizing the key stakeho ...

Topic we all had the unfortunate experience of seeing how

Topic: We all had the unfortunate experience of seeing how computers can, at times, make life's journey abit more difficult. This is especially true in knowledge centric workplaces. Describe an example of a very poorly i ...

Suppose i am designing a personnel database for a

Suppose I am designing a personnel database for a university. The university has three types of personnel: students, staff, and faculty. Here are the characteristics of the three groups: -All three groups have a name and ...

Case building shared services at rr Case : Building Shared Services at RR Communications

Case : Building Shared Services at RR Communications Discussion Questions 1. List the advantages of a single customer service center for RR Communications. 2. Devise an implementation strategy that would guarantee the su ...

Discussion wireless signals please respond to the

Discussion "Wireless Signals" Please respond to the following: • Describe the different types of wireless signals and how they are used in applications that support business objectives. • Analyze the maturity of each typ ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As