Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

Objective:

ABC Invitation Design and XYZ Invitation Printing have decided to merge to one company, A2Z Invitations. ABC is a virtual company with a proprietary website which permits customers to do some preliminary work on invitations and then consult with a designer for the final product. XYZ is a traditional company with a system which permits customers to submit designs and track their orders. It as well has a contact management and invoicing system. ABC will be moving its application into the XYZ data center and will be by using all of XYZ's back end systems.

Both companies have experienced data breaches in the past and don't want to have them in the future. A2Z has hired you to do a security analysis of its new network and to recommend how it can be set up in a secure way. It has budgeted for a capital expenditure (outside of man hrs) of $250,000 for hardware and software and $25,000 every year for additional security measures.

Guidelines:

The Statement of Work objectives are:

Perform online reconnaissance on XYZ to see what information is available to an attacker. No social engineering of employees is allowed. Use the Week 1 You Decide as the data for this section. Perform an analysis of the current XYZ network, using the current network diagram and nmap report Diagram; NMAP and files are below. Check the user's password strength. Use the Week 3 You Decide as the data for this section. Redesign of network. Current network below. System hardening procedures for both IIS and Apache (even if they only use IIS). Three complete security policies. Use the Week 5 writing assignment as your starter policy for this section. Template for future security policies. Your paper must conform to all requirements listed below.

Requirements:

Papers must be at least 5-10 pages in length, double-spaced. Papers must include at least three references outside of the text. Paper and references must conform to APA style, including: cover page; header with student's name and page number; and sections including Introduction, Body, and Conclusion/Summary.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M915487

Have any Question? 


Related Questions in Computer Engineering

Q1 explain the difference in sram and dramq2 assume a

Q1. Explain the difference in SRAM and DRAM. Q2. Assume a computer has the capacity to hold up to 4 memory modules, with each module containing 1G bytes. How many total bits are needed in the memory address? Q3. What is ...

1 a tv channel has a bandwidth of 6 mhz if we send a

1. A TV channel has a bandwidth of 6 MHz. If we send a digital signal using one channel, what are the data rates if we use one harmonic, three harmonics, and five harmonics? 2. A signal travels from point A to point B. A ...

Write a windows application that allows the user to explore

Write a Windows application that allows the user to explore the knapsack problem. The user should be able to change the capacity of the knapsack, the sizes of the items, and the values of the items. The user should also ...

1 how does physical access control differ from the logical

1. How does physical access control differ from the logical access control described in earlier chapters? How is it similar? 2. Define a secure facility. What is the primary objective of the design of such a facility? Wh ...

Assignmentyou will write a menu and ordering system for a

Assignment You will write a menu and ordering system for a restaurant using a class for the menu items. Put the class code and the main in a single file. Write a class menuItem that contains the following: A member varia ...

For a network with about 150 people what network devices ie

For a network with about 150 people. What network devices (i.e router, switches, APs), security devices (i.e Firewall), network services (i.e DHCP, file, active directory) would you recommend using and why?

A 2 gb ie 2 230nbspbyte memory system with 32-bit

A 2 GB (i.e., 2 * 2 30  byte) memory system with 32-bit addresses is used with a 4-way set associative cache that contains a total of 65536 lines (each line is 512 bytes in size).  How many different memory blocks could ...

It is often said that breaking rsa is equivalent to

It is often said that breaking RSA is equivalent to factoring the modulus, n. a. Prove that if n can be factored, one can determine the private key d from the modulus n and the public key e. b. Show that it is not necess ...

Now calculate the relative performance of adders assume

Now calculate the relative performance of adders. Assume that hardware corresponding to any equation containing only OR or AND terms, such as the equations for pi and gi on page B-40, takes one time unit T. Equations tha ...

How are virtual teams performance booster different from

How are Virtual Teams performance booster different from the techniques used in a traditional workplace? As a Virtual Leaders would you respond to the three Accountability questions? Does your response help team members ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen