Secure Network Design

 

You are the cybersecurity professional for Company A and are responsible for protecting the information of the company. Your roles include managing the company’s cybersecurity capabilities and tools, conducting vulnerability management, and assessing risk to sensitive information. Company A has recently purchased Company B and wants to merge both networks.

Executives of Company A have tasked you with making risk-based decisions on integrating Company B’s network with Company A’s existing network. Company B has provided its latest vulnerability scans, network diagrams, and existing cybersecurity capabilities and tools. As a deliverable to the executives, you will submit your recommendations for a secure network design that merges the two networks and allows remote access for employees of both companies in the form of a merger and implementation plan.

For this project, you will use the given scenario and the following supporting documents to complete your network merger and implementation plan:

•  “Company A Network Diagram”

•  “Company A Risk Analysis”

•  “Company B Network Diagram”

•  “Company B Vulnerability Report and Cybersecurity Tools”

Scenario Company A is a global company based in the United States that operates in the financial industry. Company A serves its customers with financial products, such as checking accounts, bank cards, and investment products. Company A has recently acquired Company B and needs to integrate with or remove similar capabilities and tools from Company B. Company B is smaller in size, has no dedicated cybersecurity professional role, and utilizes third-party support for infrastructure needs. Company B offers specialized software to medical providers and accepts credit cards as a payment option.  The executives of the newly merged company have expressed interest in integrating the use of the cloud to allow for scalability and redundancy. As the security professional of the merged networks, you are tasked with creating a secure network design that includes the use of zero trust principles and that utilizes both on-premises and cloud infrastructure. You also have been tasked with ensuring compliance with all regulatory requirements of the merged company, along with utilizing cloud-based technologies to provide security capabilities. Company executives have provided a budget of $50,000 in the first year to create a secure network design to utilize cloud-based services. Requirements Your submission must be your original work.
.    A.  Describe two current network security problems and two current infrastructure problems for each company, based on business requirements given in the scenario.
 B.  Analyze the given network diagram and vulnerability scan for both companies by doing the following:  1.  Describe two existing vulnerabilities for each company.  2.  Explain the impact, risk, and likelihood associated with each described vulnerability from part B1 as it relates to each company.  
C.  Create a network topology diagram with details of the proposed merged network requirements.  
D.  Identify the layer for all components in the topology diagram referencing the layers of the OSI model and TCP/IP protocol stack.  
E.  Explain the rationale for adding, deleting, or repurposing network components in the newly merged network topology diagram, including details of how each component addresses budgetary constraints.          F.   Explain two secure network design principles that are used in the proposed network topology diagram.  
G.  Explain how the proposed merged network topology diagram addresses two regulatory compliance requirements that are relevant to the newly merged company, including the following in your explanation:  •   the name of the regulatory compliance requirement  •   why the regulatory requirement is relevant to the newly merged company  •   how the proposed merged network topology diagram meets the regulatory requirement   
H.  Describe two emerging threats that are applicable to the merged organization, including the following in the description:  •   potential network security risks of implementing the topology  •   potential performance impacts on the merged network after implementation of the proposed design  •   how to manage the identified potential security risks  
I.  Summarize your recommendations for implementation of this proposed merged network based on the scenario and budgetary requirements, including the following in the summary:  •   a cost-benefit analysis for on-premises and cloud infrastructure solutions  •   a justification for your recommendations to implement the proposed secure merged network design  
J.  Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.   
K.  Demonstrate professional communication in the content and presentation of your submission.

Follow this rubric  :  A:BUSINESS REQUIREMENTS:The submission accurately describes 2 or more current network security problems and at 2 or more current infrastructure problems for each company and is aligned with the business requirements given in the scenario.  
B1:VULNERABILITIES : The submission accurately describes 2 or more existing vulnerabilities for each company. The vulnerabilities described are in alignment with the given network diagram and vulnerability scan.  
B2:IMPACT, RISK, LIKELIHOOD:  The submission explains the impact, risk, and likelihood associated with each described vulnerability from part B1 as it relates to each company. The explanation is complete and in alignment with the given network diagram and vulnerability scan.  
C:TOPOLOGY DIAGRAM: The network topology diagram with the details of the proposed merged network requirements is provided. The diagram is complete and meets the needs provided in the scenario. MAke a table under the topology for costs that include everything that we added and show that it stays under the 50k budget
D:TOPOLOGY COMPONENTS: The submission correctly identifies the layer for all components in the topology diagram referencing the layers of the OSI and TCP/IP protocol stack
E:RATIONALE : The submission explains the rationale for adding, deleting, or repurposing network components in the newly merged network topology diagram and includes the details of how each component addresses budgetary constraints. The explanation is in alignment with the given scenario.  F:SECURE NETWORK DESIGN PRINCIPLES :  The submission explains 2 or more secure network design principles that are used in the proposed network topology diagram. The explanation clearly names the secure network design principles being used and how each principle aligns with the proposed network topology diagram.  
G:REGULATORY COMPLIANCE : The submission accurately explains how the proposed merged network topology diagram addresses 2 or more regulatory compliance requirements and includes all of the listed components. The regulatory compliance requirements are relevant to the newly merged company.  
H:EMERGING THREATS : The submission accurately describes 2 or more emerging threats that are applicable to the newly merged organization and includes all the given points.
I:SUMMARY RECOMMENDATIONS: The submission summarizes the recommendations for implementation of the proposed merged network. The summary is logical and in alignment with the scenario and budgetary requirements and includes all listed specifications.  

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

CIS 115 Computer

Version:1.0 StartHTML:000000224 EndHTML:000010011 StartFragment:000006682 EndFragment:000009925 StartSelection:000006682 EndSelection:000009915 SourceURL:https://ecpi.instructure.com/courses/18156/assignments/443943     Unit 3 In-seat Activity: Intellectual Property Rights        //<![CDATA[  !function(){   var o,s,v;   if (!(window.Promise && Object.assign && Object.values && [].find && [].includes && (o={},s=Symbol(),v={},o[s]=v,o[s]===v) && (function f(){}).bind().name===’bound f’)) {     s = ‘s’, document.write(‘<‘+s+’cr’+’ipt src=”https://du11hjcvx0uqb.cloudfront.net/dist/ie11-polyfill-a0702bf7af.js”></’+s+’c’+’ript>’);   } }();        //]]>             function _earlyClick(e){       var c = e.target       while (c && c.ownerDocument) {         if (c.getAttribute(‘href’) == ‘#’ || c.getAttribute(‘data-method’)) {           e.preventDefault()           (_earlyClick.clicks = _earlyClick.clicks || []).push(c)           break         }         c = c.parentNode       }     }     document.addEventListener(‘click’, _earlyClick)                   

Just because it’s on the Net, doesn’t mean it’s free.Many (if not most) pictures, sounds, and text are protected from general or common use. Intellectual property rights give the creator of the content exclusive rights under the law. Violating these laws can result in severe punishment. For instance, it’s illegal to download copyrighted music from the Internet and to use pictures or trademarks without the owner’s permission. And you certainly don’t want to go to jail or get fined (Just look what happened to Napster (Links to an external site.)Links to an external site..). To find out the basics of copyright, review the following short video from the Copyright Clearance Center: Copyright Basics (Links to an external site.)Links to an external site..Once you have watched the short video, read the scenario below, and then answer the activity questions.ScenarioImagine your business team has been tasked with preparing a PowerPoint presentation to help new employees learn how to use the company’s proprietary software. You are the lead for this project, and your team has decided to add graphics and sound to make the presentation more appealing. You have to make sure that your team’s presentation is not in violation of any copyright laws.QuestionsA member of your team wants to add some funny pictures that he took during the company party to lighten the mood at the beginning of the presentation. Does this violate any copyright laws? Explain your answer and use references.The presentation includes links to some company documents, but a member of your team wants to send the presentation to other clients. Would this be advisable to include the hyperlinks or remove them?List two web sites where you can freely use the media (pictures, images, etc.) without violating any copyright laws. Then, list two web sites where it would be illegal to download any type of media. Explain your answers and provide us with the references you have used.Response FormatSupport your answers with at least one credible source.  Please use the ECPI Online Library, and your textbook to conduct your research.Use in-text citations and a reference list in your responses using APA format.Your response should demonstrate critical thinking and provide justification.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Paper

I need a paper of around 100 to 200 words about “preferences for car choices in United States”(citations are required)???

and 

8 references among which 4 references must be scholarly peer reviewed articles???

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

program

 

Project Scope
Part 1:

Work with your supervisor at your Host Company, to identify a project that you can work on, i.e. a defined piece of work that you can plan, investigate, develop and deliver during your time at your internship.

Your project does not have to be big, but it cannot be routine, everyday work, such as working on help desk, assembling PC’s, fixing bugs in programs, and so on. You will use this project to produce an RMP (Risk Management Plan) in weeks 7 and 8 of the course

Now create a Scope Statement for your project, using the template provided and the separate instruction document for completing it. Please take care to enter information in ALL required fields. The information you write in your Scope Statement should be 200 – 300 words:

You should have at least 3 constraints, 3 assumptions and 3 risks. Write at least a paragraph (several sentences) for the Project Description and the Business Benefit.

Part 2:

Upload your completed Scope Statement to the forum for the others to read and comment on.

Compare your Scope Statement with at least 2 other classmates.

Question 2

Download the RMP (Risk Management Plan) template.

Complete  Part 1: Project Context, using the information from your Scope Statement.

Upload the template to the forum.

You do not need to comment on the responses of any of your classmates here.

Question 3

Risk Treatment Methods

  1. The project team is developing an app for iOs, Android, and Windows  phones. The development team lead identifies a risk with the Windows phones. She says that the team has little experience with the Windows mobile operating system; additionally Windows is not capable of performing many of the required functions without using commercial plugins and APIs. As Windows phones occupy just a tiny portion of the world market (0.7%), and are being deprecated by Microsoft, you recommend to the client that “Windows” compatibility be removed from the project. The client agrees. Which risk treatment method is this? Explain your answer.   
  2. Which risk treatment method should be used when a section of the project is too difficult for the company to perform? Explain your answer.  
  3. You are managing a project which uses subroutines and libraries from a number of different sources. You are concerned that the project might accidentally contravene the law. So you ask the HR department to employ someone with specialist knowledge in the area. Is this an example of “Transference”? Explain your answer.  
  4. What is the difference between “Avoidance” and “Acceptance”?

Comment on the responses of at least 2 other classmates 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

UNIX, Linux – Background processing, cron, and at commands

 In my final tutorial I will discuss process management and the following resources in which process consist of job control functions that were first introduced by the C-shell, but later became implemented into modern UNIX systems, including how jobs that run in the background enable a user to enter commands, while a job is running in the background. In other areas we will look at the Linux operating system, which is both a multi-tasking and multi-user environment and has special background processes known as daemons that reside in both the Linux and UNIX systems, while daemons run in the background or foreground as we will examine. Throughout the UNIX like (OS) there is a process known as zombies that don’t disappear when a task is completed they reside in what is called the process table after an execution; our team will provide information on how to remove a zombie off the system. Other process commands that are utilized in both a UNIX like system and UNIX system; such as, security mechanisms’ that may either send signals to various processes or kill signals will be elaborated on.  This week’s information on utilities of UNIX/Linux systems known as process handling commands will display how different processes can be combined acting as a task manager using a ps (process status) and kill command. In closing, I will look at Background processing, cron, and at commands applications that are popular on the Linux operating system. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Read Four (4) academically reviewed articles on Cyber Security and Risk Management and complete the following activities:

 

(Wikipedia articles will not be accepted. Professor may check originality of all posts. Avoid copy-and-paste.

1.     Summarize all four (4) articles in 300 words or more. Please use your own words. No copy-and-paste

2.     Base on your article review and the assigned reading, discuss the relationship between cyber security and risk management.

3. As an IT manager, discuss how you will use the concepts discussed in the four articles in the management of IT risks within your company.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Management Information System

There are three levels of management hierarchy: strategic, managerial and operational.

Part 1: Review at least 4 academically reviewed articles on each management hierarchy. Summary the articles in your own words.

Part 2: Discuss how the three levels of management hierarchy: strategic, management, and operational relates to the mission of a business.

Part 3: As an IT professional, how would you use information technology to improve the efficiency the three levels of management hierarchy?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Assignment 2: COPA and CIPA

The Children’s Online Privacy Protection Act (COPPA) and the Children’s Internet Protection Act (CIPA) are both intended to provide protections for children accessing the Internet. However, they both have had some opposition.   Write a three to five (3-5) page paper in which you:

  1. Describe the main compliancy requirements and the protected information for both COPPA and CIPA.
  2. Analyze how COPPA and CIPA are similar and how they are different, and explain why there is a need for two (2) different acts.
  3. Describe what you believe are the most challenging elements of both COPPA and CIPA to implement in order to be compliant.
  4. Speculate on why COPPA and CIPA define protection for different ages; COPPA defines a child as being under the age of 13 and CIPA defines a minor as being under the age of 17.
  5. Identify the main opposition to COPPA and CIPA based on research and speculate on whether they will be changed in the future based on the opposition. 
  6. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. 

The specific course learning outcomes associated with this assignment are:

  • Explain the concept of privacy and its legal protections. 
  • Describe legal compliance laws addressing public and private institutions. 
  • Use technology and information resources to research legal issues in information security.
  • Write clearly and concisely about information security legal issues and topics using proper writing mechanics and technical style conventions.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Database Components

 

For this assignment, you will be creating an 8-12 slide PowerPoint presentation that showcases 5-10 main components that make up a database. You can use a search engine or your textbook to help you find information about these components. Each slide should define and summarize each of the components and should provide information its role and purpose. You will need to provide a summary slide that describes how each component interconnects and/or interrelates to each other.

Note: If you use any references besides using your textbook while creating your presentation, be sure to provide a References Slide.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

W9D1462 – Implementation Issues and Organizational Challenges

I just need the document in a clear well written single spaced.  1-2 pages is fine more is okay just make the information flow. I will do the editing no need to send cover page or double space. I will do that through my review.

Avoid using “This” explain what “This” is!

I need 4 clear and quality references.

These references need to be current and website based with an author who is current (2008-2018). I need to be able to go to a website and see that actual work.

Hints these are current subject related cited references.

No ebooks.

No google books

No paid sites for access.

No make believe books.

****Must be current and visible references*****

Will not accept anything but true references.

References mean the world to me and they should to you if you want to accept my money.

Again all references must be cited!!!!!! All references must be made clear and precise websites I can go and look up the information.

I need actual articles!!! Articles and authors I can references and read about the topic! Please do not submit to me a reference page that does not reference actual authors and actual websites with valuable information.

No google books or Wiki. I need media articles to references and see. Please understand this requirement.

Also this needs to follow APA style and be in 12 Times. 

here is the example of APA:

https://owl.english.purdue.edu/owl/resource/560/18/

Thank you and see the topics below that need addressed.

  • Examine the implementation issues for IT security policy development. Determine which of these issues are the most challenging for organizations to overcome and explain why.
  • Propose at least three control measures that organizations can implement to mitigate the potential issues associated policy development and implementation

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now