Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Scenario:

 

You are a Security professional hired by NextGard Technologies in Phoenix, AZ to provide a Windows security implementation model for their organization. NextGard specializes in network consulting services for US companies and they want to upgrade and secure their current network.

NextGard has 250,000 employees in 5 countries. The Phoenix office operates as the NextGard Corporate headquarters. Currently there are five district offices:

            • Atlanta, Georgia 

            • Bangalore, India

            • Los Angeles, California 

            • Montreal, Canada 

            • New York City, New York 

The district offices have satellite employees that have a combination of desktops, mobile computers and wireless devices. There is a mix of computers running Windows 2000, XP, Windows Vista and Windows 7. There is a Windows Active Directory forest with domains set up for each office and seven file and print servers which are located in the Phoenix office. The Phoenix office also contains two proxy servers, configured as an array, that provide Web cache services and Internet access control for the organization since the majority of applications are web-based and hosted from the Phoenix office.

There are also several Microsoft applications that all employees within a region use that are hosted in the regional offices.   All employees have Internet access so they can browse the web.

Tasks:

For the assigned project, you are to submit a proposal for the management of NextGard.  In the proposal, you must address the following:

  1. Research solutions and detail the appropriate Microsoft Windows access controls including policies, standards and procedures that define who users are, what they can do, which resources they can access, and what operations they can perform on a system.
  2. Research and detail the cryptography methods to protect organizational information using techniques that ensure its integrity, confidentiality, authenticity and non-repudiation, and the recovery of encrypted information in its original form.
  3. Research and devise a plan to thwart malicious code and activity by implementing countermeasures and prevention techniques for dealing with viruses, worms, logic bombs, Trojan horses and other related forms of intentionally created deviant code.
  4. Research and formulate a plan to implement monitoring and analysis by determining system implementation and access as well as an incident response plan for security breaches or events.
  5. Research and detail security guidelines for contains the two proxy servers and Internet access control for the organization
  6. Research and define best practices for the security of NextGard's organization.
  7. Conclusion summarizing your findings and recommendations for the reader.
  8. The Network topology must include all of the sites and the network infrastructure required to provide the services described in the Final Project Scenario in the section above.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M91375214
  • Price:- $70

Guranteed 36 Hours Delivery, In Price:- $70

Have any Question?


Related Questions in Computer Network & Security

Assignment - 8021q tunneling q-in-q configuration8021q

Assignment - 802.1Q Tunneling (Q-in-Q) Configuration 802.1Q tunneling (aka Q-in-Q) is a technique often used by Metro Ethernet providers as a layer 2 VPN for customers. 802.1Q (or dot1q) tunneling is pretty simple...the ...

Assignment descriptionproject scope a typical

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

Suppose after collecting data on an existing firms actual

Suppose, after collecting data on an existing firm's actual short-run ouput, the following production function is found to match the data: TP = Q = 5*L + 0.6*L2 - 0.01*L3 1. Using the equation above, find the following e ...

1srin response to nmap -n -sn localhost what kind of

1. SR In response to "nmap -n -sn localhost": What kind of information did the nmap scan results show you, specifically? 2. FIB What does the "-sn" option do in nmap? ping scan -disable port scan 3. SR How does the "-sn" ...

Task1 in each of the following scenarios there is a

Task 1. In each of the following scenarios there is a relationship to work life in the IT industry. With each of the following question, ensure that your answer includes the explanation of how it would be applied to work ...

Content analysis assignmentoverviewthis assignment has

Content Analysis Assignment Overview This assignment has three major aims: - To help students gain good understanding of all ITECH1102 theoretical and practical material. - To encourage students to use content analysis s ...

In a short paragraph explain the transmission of data for a

In a short paragraph, explain the transmission of data for a TCP connection between a client computer and a web server to request a web page. Assume that the server responds with a web page that fits in one packet. Assum ...

Per capita income of winterfell is 15000 with a growth rate

Per capita income of Winterfell is $15,000 with a growth rate of 4%. Per capita income of King's Landing is $25,000 with a growth rate of 0%. How long until per capita income is the same in both locations?

Americans purchase a lot of coffee grown in brazil and

Americans purchase a lot of coffee grown in Brazil and elsewhere in Latin America. It would seem that in order to avoid the huge transportation costs of bringing coffee here and to provide jobs for Americans, we should g ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As