Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Network Segmentation Activity

Objective

This assignment requires the students to analyze the network diagram for PureLand Wastewater and make specific recommendations to improve network security per requirements below.

Instructions for assignment

1. Read your text: Establishing Secure enclaves

2. Refer to the document titled PureLand Network Diagram.pdf in the PureLand Case Study section of Blackboard.

This is your starting point, and it has some deficiencies in its design that impact the cyber security for PureLand Wastewater.

Your job is to use the concepts of establishing secure enclaves to improve the cyber security of PureLand's network.

3. Define at least 3 enclaves within the PureLand network and fill in the following table defining these enclaves and how they will be monitored in the future state.

Research Activity:Network Security Improvements

This assignment requires you to analyze the network diagram for PureLand Wastewater and make specific recommendations to improve network security.

Specifically, you must design zones and conduits as described in Chapter-9 of your text, establishing zones and conduits.

Use the Network Security Improvement template for this assignment. The network security improvements you develop will be a part of your cyber security improvement plan.

Assignment Resources:

• Textbook: Industrial Network Security, 2nd Edition by: Joel Thomas Langill and Eric D. Knapp- Chapter 9

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92783635

Have any Question?


Related Questions in Management Information System

Exercise 73 filling the human gapyou work for a medium

Exercise 7.3: Filling the Human Gap You work for a medium seized manufacturing company that has a well developed DR plan. The plan is well tested and the testing has revealed a serious personnel gap During a recovery, ke ...

Ransomwareto pay or not to pay when it comes to corporate

Ransomware: To pay or not to pay? When it comes to corporate data, should corporations pay? Can you trust paying? What can be done to protect against ransomware? Would you pay if it were your own personal data? How can y ...

Your study this week and last address a wide range of

Your study this week and last address a wide range of modeling techniques used in the systems analysis phase. Pick one specific structured or object-oriented technique and respond to the following: use: The system modeli ...

Please answer all 5 questions instructor will use

Please answer all 5 questions. Instructor will use turnitin. NOTE: Answers should generally be about 1½- 3 double spaced pages for each number. Of course, questions with multiple parts will be longer as will more complex ...

Develop a 2- to 3-page paper or a 10- to 12-slide

Develop a 2- to 3-page paper, or a 10- to 12-slide PowerPoint® presentation with speaker notes along with a 1-page executive summary. Cover the following: Identify the event and the issues surrounding the security breach ...

Discussion 1security countermeasures and strategic

Discussion 1. "Security Countermeasures and Strategic Governance" Please respond to the following: • Recommend three countermeasures that could enhance the information security measures of an enterprise. Justify your rec ...

Discussion conflict with teamspart 1 conflict within

Discussion Conflict with Teams Part 1: Conflict within Teams Think of a conflict that occurred in a team you were a part of and analyze it. What were the main sources of the conflict? What interventions can be used to im ...

Distributive bargainingany of the parties involved in the

Distributive Bargaining Any of the parties involved in the negotiation tries to get the maximum advantage by applying the tactics. According to Batra, generally, the negotiation processes are handled by using two approac ...

Assignment 1resource read ch 3 to 4 of the spirit catches

Assignment 1 Resource: read Ch. 3 to 4 of The Spirit Catches You and You Fall Down. After reading the article write a 175- to 265-word response to the following: do publicly funded health care programs overrule cultural ...

The head of the it security department expressed her

The head of the IT security department expressed her concerns about series of data breaches that occurred in the company and mentioned that many employees ignored their system security warnings. You have been asked to pr ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As