Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

Objective:

ABC Invitation Design and XYZ Invitation Printing have decided to merge to one company, A2Z Invitations. ABC is a virtual company with a proprietary website which permits customers to do some preliminary work on invitations and then consult with a designer for the final product. XYZ is a traditional company with a system which permits customers to submit designs and track their orders. It as well has a contact management and invoicing system. ABC will be moving its application into the XYZ data center and will be by using all of XYZ's back end systems.

Both companies have experienced data breaches in the past and don't want to have them in the future. A2Z has hired you to do a security analysis of its new network and to recommend how it can be set up in a secure way. It has budgeted for a capital expenditure (outside of man hrs) of $250,000 for hardware and software and $25,000 every year for additional security measures.

Guidelines:

The Statement of Work objectives are:

Perform online reconnaissance on XYZ to see what information is available to an attacker. No social engineering of employees is allowed. Use the Week 1 You Decide as the data for this section. Perform an analysis of the current XYZ network, using the current network diagram and nmap report Diagram; NMAP and files are below. Check the user's password strength. Use the Week 3 You Decide as the data for this section. Redesign of network. Current network below. System hardening procedures for both IIS and Apache (even if they only use IIS). Three complete security policies. Use the Week 5 writing assignment as your starter policy for this section. Template for future security policies. Your paper must conform to all requirements listed below.

Requirements:

Papers must be at least 5-10 pages in length, double-spaced. Papers must include at least three references outside of the text. Paper and references must conform to APA style, including: cover page; header with student's name and page number; and sections including Introduction, Body, and Conclusion/Summary.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M915487

Have any Question? 


Related Questions in Computer Engineering

A 2 gb ie 2 230nbspbyte memory system with 32-bit

A 2 GB (i.e., 2 * 2 30  byte) memory system with 32-bit addresses is used with a 4-way set associative cache that contains a total of 65536 lines (each line is 512 bytes in size).  How many different memory blocks could ...

Explain the relationship between mps due forecast quantity

Explain the relationship between MPS, due, forecast quantity, and customer orders.

1 list four types of delays in a packet-switched network2

1. List four types of delays in a packet-switched network. 2. In Figure 18.10, assume that the link between R1 and R2 is upgraded to 170 kbps and the link between the source host and R1 is now downgraded to 140 kbps. Wha ...

For a network with about 150 people what network devices ie

For a network with about 150 people. What network devices (i.e router, switches, APs), security devices (i.e Firewall), network services (i.e DHCP, file, active directory) would you recommend using and why?

Presentations and best practices please respond to the

Presentations and Best Practices" Please respond to the following: • Choose a field (e.g., marketing, sales, teaching, etc.) where you believe presentations are important. Describe three ways in which you could effective ...

We conduct a known-plaintext attack on an lfsr-based stream

We conduct a known-plaintext attack on an LFSR-based stream cipher. We know that the plaintext sent was: 1. What is the degree m of the key stream generator? 2. What is the initialization vector? 3. Determine the feedbac ...

This chapter lists five tools that can be used by security

This chapter lists five tools that can be used by security administrators, network administrators, and attackers alike. Search the World Wide Web for three to five other tools that fit this same description. Who do the s ...

1 write a program that can read an indefinite number of

1. Write a program that can read an indefinite number of lines of VB.NET code and store reserved words in one linked list and identifiers and literals in another linked list. When the program is finished reading input, d ...

Explain what differentiation strategy your company should

Explain what differentiation strategy your company should undertake to encourage their target market to choose them over other competitors. "NETFLIX"

1 rewrite the longest common substring code as a class2

1. Rewrite the longest common substring code as a class. 2. Write a program that uses a brute force technique to find the longest common substring. Use the Timing class to compare the brute force method with the dynamic ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen