Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

Objective:

ABC Invitation Design and XYZ Invitation Printing have decided to merge to one company, A2Z Invitations. ABC is a virtual company with a proprietary website which permits customers to do some preliminary work on invitations and then consult with a designer for the final product. XYZ is a traditional company with a system which permits customers to submit designs and track their orders. It as well has a contact management and invoicing system. ABC will be moving its application into the XYZ data center and will be by using all of XYZ's back end systems.

Both companies have experienced data breaches in the past and don't want to have them in the future. A2Z has hired you to do a security analysis of its new network and to recommend how it can be set up in a secure way. It has budgeted for a capital expenditure (outside of man hrs) of $250,000 for hardware and software and $25,000 every year for additional security measures.

Guidelines:

The Statement of Work objectives are:

Perform online reconnaissance on XYZ to see what information is available to an attacker. No social engineering of employees is allowed. Use the Week 1 You Decide as the data for this section. Perform an analysis of the current XYZ network, using the current network diagram and nmap report Diagram; NMAP and files are below. Check the user's password strength. Use the Week 3 You Decide as the data for this section. Redesign of network. Current network below. System hardening procedures for both IIS and Apache (even if they only use IIS). Three complete security policies. Use the Week 5 writing assignment as your starter policy for this section. Template for future security policies. Your paper must conform to all requirements listed below.

Requirements:

Papers must be at least 5-10 pages in length, double-spaced. Papers must include at least three references outside of the text. Paper and references must conform to APA style, including: cover page; header with student's name and page number; and sections including Introduction, Body, and Conclusion/Summary.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M915487

Have any Question? 


Related Questions in Computer Engineering

Using the internet search for commercial idps systems what

Using the Internet, search for commercial IDPS systems. What classification systems and descriptions are used, and how can these be used to compare the features and components of each IDPS? Create a comparison spreadshee ...

1 what is the function of a sonet regenerator2 what are the

1. What is the function of a SONET regenerator? 2. What are the four SONET layers? 3. Discuss the functions of each SONET layer. 4. What is a virtual tributary? 5. In ATM, what is the relationship between TPs, VPs, and V ...

Design a help-desk priority manager store help requests

Design a help-desk priority manager. Store help requests stored in a text file with the following structure: priority, id of requesting party, time of request The priority is an integer in the range 1-5 with 1 being the ...

Discussion questionsthe design discipline continues the

Discussion Questions The design discipline continues the modeling process by creating new models and expanding or refining business and requirements models. However, the purpose and nature of modeling changes. Though pro ...

Four well-known still-lifes are the loaf the boat the ship

Four well-known still-lifes are the loaf, the boat, the ship, and the beehive. Explain why each of these is a still-life. Can you find another still-life? Modify the Life model in the NetLogo models library to include a ...

How are virtual teams performance booster different from

How are Virtual Teams performance booster different from the techniques used in a traditional workplace? As a Virtual Leaders would you respond to the three Accountability questions? Does your response help team members ...

1 write a program that draws two solid squares one in pink

1. Write a program that draws two solid squares: one in pink and one in purple. Use a standard color for one of them and a custom color for the other. Provide a class TwoSquareViewer and a class TwoSquareComponent. 2. Wr ...

Computer viruses and worms are often transmitted as

Computer viruses and worms are often transmitted as attachments to electronic mail. The Drib's development network infrastructure directs all electronic mail to a mail server. Consider an alteration of the developmen ...

In this problem we will examine why techniques that work

In this problem, we will examine why techniques that work nicely for error correction codes are not suited as cryptographic hash functions. We look at a hash function that computes an 8-bit hash value by applying the fol ...

Flapper dumplings a local store that sells baby clothes and

Flapper Dumplings, a local store that sells baby clothes and accessories, has a baby registry. This registry keeps information about customers (the expectant mother and father) prior to the baby shower and for a time lon ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro