Ask Question, Ask an Expert


Ask Computer Engineering Expert


ABC Invitation Design and XYZ Invitation Printing have decided to merge to one company, A2Z Invitations. ABC is a virtual company with a proprietary website which permits customers to do some preliminary work on invitations and then consult with a designer for the final product. XYZ is a traditional company with a system which permits customers to submit designs and track their orders. It as well has a contact management and invoicing system. ABC will be moving its application into the XYZ data center and will be by using all of XYZ's back end systems.

Both companies have experienced data breaches in the past and don't want to have them in the future. A2Z has hired you to do a security analysis of its new network and to recommend how it can be set up in a secure way. It has budgeted for a capital expenditure (outside of man hrs) of $250,000 for hardware and software and $25,000 every year for additional security measures.


The Statement of Work objectives are:

Perform online reconnaissance on XYZ to see what information is available to an attacker. No social engineering of employees is allowed. Use the Week 1 You Decide as the data for this section. Perform an analysis of the current XYZ network, using the current network diagram and nmap report Diagram; NMAP and files are below. Check the user's password strength. Use the Week 3 You Decide as the data for this section. Redesign of network. Current network below. System hardening procedures for both IIS and Apache (even if they only use IIS). Three complete security policies. Use the Week 5 writing assignment as your starter policy for this section. Template for future security policies. Your paper must conform to all requirements listed below.


Papers must be at least 5-10 pages in length, double-spaced. Papers must include at least three references outside of the text. Paper and references must conform to APA style, including: cover page; header with student's name and page number; and sections including Introduction, Body, and Conclusion/Summary.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M915487

Have any Question? 

Related Questions in Computer Engineering

How could an evolutionary process like ge be used to

How could an evolutionary process, like GE be used to evolve 1. Neural networks? 2. Production systems? Describe in some detail. In particular, how would the crossover operation be implemented? Comment on whether or not ...

In el farol extension 3 we now graph the actual award

In El Farol Extension 3, we now graph the actual award distribution using a histogram. Another common way of displaying wealth distributions like this is to use a cumulative distribution function, where the y-value at an ...

Assignmentsection 1 algorithm analysisto do well before

Assignment SECTION 1. Algorithm Analysis TO DO WELL: Before you work on this section, write down what W(N) means, and the F(N)s of sorting and searching. 1) What is the purpose of using asymptotic notation such as O, Ome ...

1 rewrite the computer terms glossary application using the

1. Rewrite the computer terms glossary application using the customdesigned Hash class developed in this chapter. Experiment with different hash functions and collision-resolution strategies. 2. Using the Hashtable class ...

From which two sources does a union get its power to

From which two sources does a union get its power to negotiate effectively with the management of a business? What is the significance of unions to managers?

1 which cache design is better for each of these benchmarks

1. Which cache design is better for each of these benchmarks? Use data to support your conclusion. 2. Shared cache latency increases with the CMP size. Choose the best design if the shared cache latency doubles. Off -chi ...

Identify a major information security incident that has

Identify a major information security incident that has occurred in the recent past (within the last five years).  If possible, identify a breach that occurred in, or otherwise impacted, the Middle East.  Review and anal ...

Assessment activity instructionsdemonstrate your

Assessment Activity Instructions Demonstrate your understanding and knowledge gained about session's material. Complete with a short discussion (one paragraph) for each question on a Word document and upload through the  ...

In the sixth lab we analyze the behavior of the dns

In the sixth lab, we analyze the behavior of the DNS protocol. In addition to Wireshark, several network utilities are available for finding some information stored in the DNS servers. In this lab, we use the dig utiliti ...

1 rewrite the console application that uses an

1. Rewrite the Console application that uses an iterator-based linked list as a Windows application. 2. According to legend, the 1st-century Jewish historian, Flavius Josephus, was captured along with a band of 40 compat ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro