SlideShare a Scribd company logo
1 of 36
© 2014 Stra
and may not
Strayer Univ
CIS 502 Fac
Technica
Due Wee
Accounti
Loan De
Custo
Servic
ayer University. A
t be copied, furth
versity.
culty Version 114
al Paper: Risk
k 10 and wort
Off
Worstations
(x25)
Worstations
(x12)
Worstations
(x63)
ing
ept
omer
ces
DMZ
Prin
(x
Prin
(x
Pr
CIS 502
All Rights Reserv
her distributed, o
48 (1099 10-17-2
k Assessme
th 160 points
Trus
f-Site Office VPN
Gatew
VPN
Gatewa
Orac
S
ters
7)
ters
5)
rinters
(x3)
SUS Server
10Gbps
2 – Assig
ed. This docume
r otherwise discl
2014) Final
nt
sted Computin
In
Global
N
ay
ay
Border
Intern
DNS
Distrib
cle 9i DB
erver
10Gbps
10 Gbps
10 Gbps
OC192
10Gbps
nments a
ent contains Stra
osed in whole or
g Base Interna
nternet
Finance, Inc.
r (Core) Router
al
S
Exchange
2000 Email
bution Routers
File
Acc
La
VL
Swi
10 Gb
10 Gbps
OC1
10G
10 Gbps
nd Rubric
ayer University C
r in part, without
al Network
rs
e and Print Server
Intra
S
cess
ayer
LAN
witch
bps
100Mbps
192
bps
cs
onfidential and P
the expressed w
Remote
Dial UpUsers
Worstations
(x5)
Worstations
(x10)
Worstations
(x49)
anet Web
Server
Printer
(x3)
Printers
(x3)
Printers
(x5)
Workstatio
(x7)
s
RAS
Proprietary inform
written permission
Page 3
PBX
PSTN
Mgmt
Credit Dept
Finance
s
ons
mation
n of
33 of 50
© 2014 Stra
and may not
Strayer Univ
CIS 502 Fac
Above is t
this past y
invested i
However,
pace, its o
GFI’s netw
network o
as the ban
hired any
The truste
hosts the
overall fin
applicatio
financial s
network a
one (1) we
the norma
$1,000,00
Write a ei
1. D
2. A
co
or
th
th
3. E
of
w
4. E
m
5. U
se
re
6. U
do
ayer University. A
t be copied, furth
versity.
culty Version 114
the Global Fin
year and impl
n the network
although the
overall netwo
work has histo
outages. GFI h
ndwidth dema
security pers
ed computing
company’s m
ancial situatio
n servers in t
systems heav
attacks twice t
eek as a resu
al operating b
00, as well as
ght to ten (8-
Describe the c
Assess risk ba
over all the ne
rganization an
his risk assess
he business le
a. Defend
b. Ascert
vulner
Recom
vulner
c. Justify
require
xamine wheth
f these, and d
was the most a
xplain the wa
management a
Using Microsof
ecure and risk
equired page
Use at least th
o not qualify a
CIS 502
All Rights Reserv
her distributed, o
48 (1099 10-17-2
Glo
nance, Inc. (G
emented a nu
k and designe
e company’s f
rk security po
orically been
has hired thre
and by the co
sonnel who ca
base (TCB)
mission critica
on. The Orac
he company.
vily depend on
this year, and
ult. The recov
baseline. GFI
lost custome
10) page form
company netw
ased on the G
ecessary deta
nd risk postur
sment to dete
eaders to mak
d your assum
tain apparent
abilities. Such
mmend mitiga
abilities.
y your cryptog
ements, data-
her your risk
discuss the m
appropriate.
ay in which yo
and thus facili
ft Visio or its
k-mitigating m
length.
ree (3) quality
as quality res
2 – Assig
ed. This docume
r otherwise discl
2014) Final
obal Finance
GFI) network d
umber of netw
ed it to be fau
inancial statu
osture has not
fairly stable,
ee (3) network
ompany emplo
an take care o
internal netwo
l systems tha
le database a
GFI cannot a
n the network
d its Oracle da
ery process r
estimated the
er confidence.
mal risk asses
work, intercon
GFI, Inc. netwo
ails for your c
re of the curre
ermine what a
ke data-driven
mptions where
security vuln
h analysis sho
ation processe
graphy recom
-driven decisi
assessment m
main reasons w
ou would pres
itate security
open source
model. Note: T
y resources in
ources.
nments a
ent contains Stra
osed in whole or
e, Inc. Netwo
diagram. A hy
work devices
lt tolerant and
s has mature
t kept up with
and the comp
k engineers to
oyees and the
of the operatio
ork within the
at are vital to t
and email sys
afford system
k stability and
atabase and e
required GFI t
e loss from th
.
ssment propo
nection, and
ork diagram s
client, GFI Inc
ent environme
actions to take
n decisions.
e pertinent info
erabilities, an
ould entertain
es and proced
mendations,
on-making, a
methodology
why you belie
sent your findi
buy-in and co
equivalent, re
The graphica
n this assignm
nd Rubric
ayer University C
r in part, without
ork Diagram
ypothetical co
as displayed
d resilient from
ed and its netw
h the company
pany has not
o keep up wit
e clients. How
onal security
e Global Finan
the company’
stems are amo
m or network o
availability. G
email servers
to utilize $25,
ese network
osal in which y
communicati
scenario. Note
c., to understa
ent. The com
e; therefore, i
ormation from
nd analyze at
n the possibili
dures for eac
based on sec
and objective
is quantitativ
eve that the m
ings and asse
oncentration.
edraw the CF
ally depicted s
ment. Note: W
cs
onfidential and P
the expressed w
ompany, GFI
in the diagra
m any networ
work has exp
y growth.
experienced
th the network
wever, the com
responsibility
nce, Inc. Netw
’s operations
ong the most
outages, as its
GFI has expe
s had been do
,000 to restor
attacks at mo
you:
on environme
e: Your risk a
and the risk fa
pany manage
it must be com
m the scenario
least three (3
ity of faulty ne
ch of the ident
curity concern
opinions.
ve, qualitative
methodology t
essment to th
FI diagram, de
solution is not
Wikipedia and
Proprietary inform
written permission
Page 3
has grown ra
am. The comp
rk failures.
panded at a ra
many full sca
k growth, as w
mpany has no
y.
work Diagram
that also affe
t intensively u
s cash flow an
rienced DoS
own for a tota
re its operatio
ore than
ent.
assessment s
actors of the
ement will util
mprehensive
o isn’t availab
3) such
etwork design
tified
ns and
, or a combin
that you utilize
he company’s
epicted as a
t included in t
d similar Web
mation
n of
34 of 50
apidly
pany
apid
ale
well
ot
m
ect the
used
nd
l of
ns to
should
lize
for
ble.
n.
ation
ed
the
sites
© 2014 Stra
and may not
Strayer Univ
CIS 502 Fac
Your assig
B
si
pr
In
na
th
In
co
su
The speci
E
pr
A
E
D
fr
E
an
at
U
W
m
Grading fo
language
Poin
Cr
1. Describe
network, in
and comm
environme
Weight: 15
2a. Defend
assumption
pertinent in
from the sc
available.
Weight: 5%
2b. Ascerta
security vu
ayer University. A
t be copied, furth
versity.
culty Version 114
gnment must
e typed, doub
ides; citations
rofessor for a
nclude a cove
ame, the cou
he required as
nclude charts
ompleted diag
ubmitted.
ific course lea
valuate an or
rovide securit
Analyze the m
xplain access
Describe the d
om a manage
valuate and e
nd technologi
ttacks.
Use technolog
Write clearly a
mechanics and
or this assign
and writing s
nts: 160
riteria
e the company
nterconnection,
unication
nt.
5%
d your
ns where
nformation
cenario isn’t
%
ain apparent
lnerabilities,
CIS 502
All Rights Reserv
her distributed, o
48 (1099 10-17-2
follow these
ble spaced, u
s and referenc
any additional
er page contai
rse title, and t
ssignment pa
or diagrams
grams / chart
arning outcom
rganization’s s
ty countermea
ethods of ma
s control meth
details and the
ement perspe
explain from a
ies organizati
y and informa
nd concisely
d technical sty
ment will be b
skills, using th
Unacce
Below 7
y Did not sub
incomplete
described t
company n
interconnec
and commu
environmen
Did not sub
incompletel
defended y
assumption
pertinent
information
scenario isn
available.
Did not sub
incompletel
2 – Assig
ed. This docume
r otherwise discl
2014) Final
formatting re
sing Times N
ces must follo
instructions.
ining the title
the date. The
ge length.
created in Vis
s must be imp
mes associate
security polic
asures.
naging, contr
hods and atta
e importance
ective.
a managemen
ions can emp
ation resource
about the the
yle conventio
based on ans
e following ru
Te
ptable
70% F
bmit or
ly
he
etwork,
ction,
unication
nt.
Par
the
net
inte
com
env
bmit or
ly
our
ns where
from the
n’t
Par
you
wh
info
sce
ava
bmit or
ly
Par
app
nments a
ent contains Stra
osed in whole or
quirements:
New Roman fo
ow APA or sc
of the assign
e cover page a
sio or an open
ported into th
ed with this as
ies and risk m
rolling, and m
acks.
of application
nt perspective
ploy to mitigat
es to research
eories of secu
ns.
swer quality, l
ubric.
echnical Pap
Fair
70-79% C
rtially described
e company
twork,
erconnection, a
mmunication
vironment.
rtially defended
ur assumptions
ere pertinent
ormation from t
enario isn’t
ailable.
rtially ascertain
parent security
nd Rubric
ayer University C
r in part, without
ont (size 12),
chool-specific
nment, the stu
and the refere
n source alter
he Word docu
ssignment are
management
mitigating secu
n security mo
e the industry
te risks and th
h issues in se
urity managem
ogic / organiz
per: Risk Ass
Pro
80-
d
and
Satisfacto
described
company
interconn
communi
environm
d
s
the
Satisfacto
defended
assumpti
pertinent
from the
isn’t avail
ned
y
Satisfacto
ascertain
cs
onfidential and P
the expressed w
with one-inch
format. Chec
udent’s name,
ence page ar
rnative such a
ment before t
e:
procedures, a
urity risks and
dels and thei
y-standard eq
hwart both int
ecurity manag
ment using pr
zation of the p
sessment
oficient
-89% B
orily
d the
y network,
nection, and
ication
ment.
T
d
c
in
c
e
orily
d your
ons where
information
scenario
lable.
T
y
w
in
s
a
orily
ned
T
a
Proprietary inform
written permission
Page 3
h margins on
ck with your
, the professo
re not include
as Dia. The
the paper is
and its ability
d vulnerabilitie
r implementa
uipment, tool
ternal and ext
gement.
roper writing
paper, and
Exempla
90-100%
Thoroughly
described the
company netwo
nterconnection
communication
environment.
Thoroughly def
your assumptio
where pertinent
nformation from
scenario isn’t
available.
Thoroughly
ascertained app
mation
n of
35 of 50
all
or’s
d in
to
es.
tion
ls,
ternal
ary
% A
ork,
n, and
n
fended
ons
t
m the
parent
© 2014 Straand may notStrayer UnivCIS 502 FacTechn.docx

More Related Content

Similar to © 2014 Straand may notStrayer UnivCIS 502 FacTechn.docx

erm Paper Penetration TestingDue Week 10 and worth 120 points.docx
erm Paper Penetration TestingDue Week 10 and worth 120 points.docxerm Paper Penetration TestingDue Week 10 and worth 120 points.docx
erm Paper Penetration TestingDue Week 10 and worth 120 points.docxmealsdeidre
 
Cis 502 week 10 technical paper – strayer new
Cis 502 week 10 technical paper – strayer newCis 502 week 10 technical paper – strayer new
Cis 502 week 10 technical paper – strayer newMaryTurner2017
 
Cis 502 week 10 technical paper – strayer new
Cis 502 week 10 technical paper – strayer newCis 502 week 10 technical paper – strayer new
Cis 502 week 10 technical paper – strayer newMaryLouis2018
 
Cis 502 week 10 technical paper – strayer new
Cis 502 week 10 technical paper – strayer newCis 502 week 10 technical paper – strayer new
Cis 502 week 10 technical paper – strayer newSourCandy123
 
Cis 436 Technology levels--snaptutorial.com
Cis 436 Technology levels--snaptutorial.comCis 436 Technology levels--snaptutorial.com
Cis 436 Technology levels--snaptutorial.comsholingarjosh61
 
Cis 436 Enthusiastic Study / snaptutorial.com
Cis 436 Enthusiastic Study / snaptutorial.comCis 436 Enthusiastic Study / snaptutorial.com
Cis 436 Enthusiastic Study / snaptutorial.comStephenson03
 
IRJET- Placement Portal
IRJET- Placement PortalIRJET- Placement Portal
IRJET- Placement PortalIRJET Journal
 
Break Loose Acting To Forestall Emulation Blast
Break Loose Acting To Forestall Emulation BlastBreak Loose Acting To Forestall Emulation Blast
Break Loose Acting To Forestall Emulation BlastIRJET Journal
 
IRJET- Insider Interruption Identification and Protection by using Forens...
IRJET-  	  Insider Interruption Identification and Protection by using Forens...IRJET-  	  Insider Interruption Identification and Protection by using Forens...
IRJET- Insider Interruption Identification and Protection by using Forens...IRJET Journal
 
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service ProvidersIRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service ProvidersIRJET Journal
 
IRJET- A Novel Approach for Privacy Security in Cloud Storage Plan with Three...
IRJET- A Novel Approach for Privacy Security in Cloud Storage Plan with Three...IRJET- A Novel Approach for Privacy Security in Cloud Storage Plan with Three...
IRJET- A Novel Approach for Privacy Security in Cloud Storage Plan with Three...IRJET Journal
 
IRJET-Comparative Analysis of Disaster Recovery Solutions in Cloud Computing
IRJET-Comparative Analysis of Disaster Recovery Solutions in Cloud ComputingIRJET-Comparative Analysis of Disaster Recovery Solutions in Cloud Computing
IRJET-Comparative Analysis of Disaster Recovery Solutions in Cloud ComputingIRJET Journal
 
Audax Group: CIO Perspectives - Managing The Copy Data Explosion
Audax Group: CIO Perspectives - Managing The Copy Data ExplosionAudax Group: CIO Perspectives - Managing The Copy Data Explosion
Audax Group: CIO Perspectives - Managing The Copy Data Explosionactifio
 
IRJET- Privacy Enhancing Routing Algorithm using Backbone Flooding Schemes
IRJET- Privacy Enhancing Routing Algorithm using Backbone Flooding SchemesIRJET- Privacy Enhancing Routing Algorithm using Backbone Flooding Schemes
IRJET- Privacy Enhancing Routing Algorithm using Backbone Flooding SchemesIRJET Journal
 
IRJET- A Review of the Concept of Smart Grid
IRJET- A Review of the Concept of Smart GridIRJET- A Review of the Concept of Smart Grid
IRJET- A Review of the Concept of Smart GridIRJET Journal
 
IRJET- Cipher Text-Policy Attribute-Based Encryption and with Delegation ...
IRJET-  	  Cipher Text-Policy Attribute-Based Encryption and with Delegation ...IRJET-  	  Cipher Text-Policy Attribute-Based Encryption and with Delegation ...
IRJET- Cipher Text-Policy Attribute-Based Encryption and with Delegation ...IRJET Journal
 
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...IRJET Journal
 

Similar to © 2014 Straand may notStrayer UnivCIS 502 FacTechn.docx (20)

erm Paper Penetration TestingDue Week 10 and worth 120 points.docx
erm Paper Penetration TestingDue Week 10 and worth 120 points.docxerm Paper Penetration TestingDue Week 10 and worth 120 points.docx
erm Paper Penetration TestingDue Week 10 and worth 120 points.docx
 
Cis 502 week 10 technical paper – strayer new
Cis 502 week 10 technical paper – strayer newCis 502 week 10 technical paper – strayer new
Cis 502 week 10 technical paper – strayer new
 
Cis 502 week 10 technical paper – strayer new
Cis 502 week 10 technical paper – strayer newCis 502 week 10 technical paper – strayer new
Cis 502 week 10 technical paper – strayer new
 
Cis 502 week 10 technical paper – strayer new
Cis 502 week 10 technical paper – strayer newCis 502 week 10 technical paper – strayer new
Cis 502 week 10 technical paper – strayer new
 
Cis 436 Technology levels--snaptutorial.com
Cis 436 Technology levels--snaptutorial.comCis 436 Technology levels--snaptutorial.com
Cis 436 Technology levels--snaptutorial.com
 
Cis 436 Enthusiastic Study / snaptutorial.com
Cis 436 Enthusiastic Study / snaptutorial.comCis 436 Enthusiastic Study / snaptutorial.com
Cis 436 Enthusiastic Study / snaptutorial.com
 
Emmert_Resume
Emmert_ResumeEmmert_Resume
Emmert_Resume
 
6620handout5o
6620handout5o6620handout5o
6620handout5o
 
IRJET- Placement Portal
IRJET- Placement PortalIRJET- Placement Portal
IRJET- Placement Portal
 
Break Loose Acting To Forestall Emulation Blast
Break Loose Acting To Forestall Emulation BlastBreak Loose Acting To Forestall Emulation Blast
Break Loose Acting To Forestall Emulation Blast
 
IRJET- Insider Interruption Identification and Protection by using Forens...
IRJET-  	  Insider Interruption Identification and Protection by using Forens...IRJET-  	  Insider Interruption Identification and Protection by using Forens...
IRJET- Insider Interruption Identification and Protection by using Forens...
 
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service ProvidersIRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
 
IRJET- A Novel Approach for Privacy Security in Cloud Storage Plan with Three...
IRJET- A Novel Approach for Privacy Security in Cloud Storage Plan with Three...IRJET- A Novel Approach for Privacy Security in Cloud Storage Plan with Three...
IRJET- A Novel Approach for Privacy Security in Cloud Storage Plan with Three...
 
IRJET-Comparative Analysis of Disaster Recovery Solutions in Cloud Computing
IRJET-Comparative Analysis of Disaster Recovery Solutions in Cloud ComputingIRJET-Comparative Analysis of Disaster Recovery Solutions in Cloud Computing
IRJET-Comparative Analysis of Disaster Recovery Solutions in Cloud Computing
 
Audax Group: CIO Perspectives - Managing The Copy Data Explosion
Audax Group: CIO Perspectives - Managing The Copy Data ExplosionAudax Group: CIO Perspectives - Managing The Copy Data Explosion
Audax Group: CIO Perspectives - Managing The Copy Data Explosion
 
IRJET- Privacy Enhancing Routing Algorithm using Backbone Flooding Schemes
IRJET- Privacy Enhancing Routing Algorithm using Backbone Flooding SchemesIRJET- Privacy Enhancing Routing Algorithm using Backbone Flooding Schemes
IRJET- Privacy Enhancing Routing Algorithm using Backbone Flooding Schemes
 
IRJET- A Review of the Concept of Smart Grid
IRJET- A Review of the Concept of Smart GridIRJET- A Review of the Concept of Smart Grid
IRJET- A Review of the Concept of Smart Grid
 
IRJET- Cipher Text-Policy Attribute-Based Encryption and with Delegation ...
IRJET-  	  Cipher Text-Policy Attribute-Based Encryption and with Delegation ...IRJET-  	  Cipher Text-Policy Attribute-Based Encryption and with Delegation ...
IRJET- Cipher Text-Policy Attribute-Based Encryption and with Delegation ...
 
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
 
6620handout5t
6620handout5t6620handout5t
6620handout5t
 

More from LynellBull52

· · · Must be a foreign film with subtitles· Provide you wit.docx
· · · Must be a foreign film with subtitles· Provide you wit.docx· · · Must be a foreign film with subtitles· Provide you wit.docx
· · · Must be a foreign film with subtitles· Provide you wit.docxLynellBull52
 
·  Identify the stakeholders and how they were affected by Heene.docx
·  Identify the stakeholders and how they were affected by Heene.docx·  Identify the stakeholders and how they were affected by Heene.docx
·  Identify the stakeholders and how they were affected by Heene.docxLynellBull52
 
· · Re WEEK ONE - DISCUSSION QUESTION # 2posted by DONALD DEN.docx
· · Re WEEK ONE - DISCUSSION QUESTION # 2posted by DONALD DEN.docx· · Re WEEK ONE - DISCUSSION QUESTION # 2posted by DONALD DEN.docx
· · Re WEEK ONE - DISCUSSION QUESTION # 2posted by DONALD DEN.docxLynellBull52
 
· Week 3 AssignmentGovernment and Not-For-Profit AccountingVal.docx
· Week 3 AssignmentGovernment and Not-For-Profit AccountingVal.docx· Week 3 AssignmentGovernment and Not-For-Profit AccountingVal.docx
· Week 3 AssignmentGovernment and Not-For-Profit AccountingVal.docxLynellBull52
 
· Week 10 Assignment 2 SubmissionStudents, please view the.docx
· Week 10 Assignment 2 SubmissionStudents, please view the.docx· Week 10 Assignment 2 SubmissionStudents, please view the.docx
· Week 10 Assignment 2 SubmissionStudents, please view the.docxLynellBull52
 
· Write in paragraph format (no lists, bullets, or numbers).· .docx
· Write in paragraph format (no lists, bullets, or numbers).· .docx· Write in paragraph format (no lists, bullets, or numbers).· .docx
· Write in paragraph format (no lists, bullets, or numbers).· .docxLynellBull52
 
· WEEK 1 Databases and SecurityLesson· Databases and Security.docx
· WEEK 1 Databases and SecurityLesson· Databases and Security.docx· WEEK 1 Databases and SecurityLesson· Databases and Security.docx
· WEEK 1 Databases and SecurityLesson· Databases and Security.docxLynellBull52
 
· Unit 4 Citizen RightsINTRODUCTIONIn George Orwells Animal.docx
· Unit 4 Citizen RightsINTRODUCTIONIn George Orwells Animal.docx· Unit 4 Citizen RightsINTRODUCTIONIn George Orwells Animal.docx
· Unit 4 Citizen RightsINTRODUCTIONIn George Orwells Animal.docxLynellBull52
 
· Unit Interface-User Interaction· Assignment Objectives Em.docx
· Unit  Interface-User Interaction· Assignment Objectives Em.docx· Unit  Interface-User Interaction· Assignment Objectives Em.docx
· Unit Interface-User Interaction· Assignment Objectives Em.docxLynellBull52
 
· The Victims’ Rights MovementWrite a 2 page paper.  Address the.docx
· The Victims’ Rights MovementWrite a 2 page paper.  Address the.docx· The Victims’ Rights MovementWrite a 2 page paper.  Address the.docx
· The Victims’ Rights MovementWrite a 2 page paper.  Address the.docxLynellBull52
 
· Question 1· · How does internal environmental analy.docx
· Question 1· ·        How does internal environmental analy.docx· Question 1· ·        How does internal environmental analy.docx
· Question 1· · How does internal environmental analy.docxLynellBull52
 
· Question 1Question 192 out of 2 pointsWhat file in the.docx
· Question 1Question 192 out of 2 pointsWhat file in the.docx· Question 1Question 192 out of 2 pointsWhat file in the.docx
· Question 1Question 192 out of 2 pointsWhat file in the.docxLynellBull52
 
· Question 15 out of 5 pointsWhen psychologists discuss .docx
· Question 15 out of 5 pointsWhen psychologists discuss .docx· Question 15 out of 5 pointsWhen psychologists discuss .docx
· Question 15 out of 5 pointsWhen psychologists discuss .docxLynellBull52
 
· Question 1 2 out of 2 pointsWhich of the following i.docx
· Question 1 2 out of 2 pointsWhich of the following i.docx· Question 1 2 out of 2 pointsWhich of the following i.docx
· Question 1 2 out of 2 pointsWhich of the following i.docxLynellBull52
 
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docxLynellBull52
 
· Strengths Public Recognition of OrganizationOverall Positive P.docx
· Strengths Public Recognition of OrganizationOverall Positive P.docx· Strengths Public Recognition of OrganizationOverall Positive P.docx
· Strengths Public Recognition of OrganizationOverall Positive P.docxLynellBull52
 
· Part I Key Case SummaryThis case discusses the Union Carbid.docx
· Part I Key Case SummaryThis case discusses the Union Carbid.docx· Part I Key Case SummaryThis case discusses the Union Carbid.docx
· Part I Key Case SummaryThis case discusses the Union Carbid.docxLynellBull52
 
· Perceptual process is a process through manager receive organize.docx
· Perceptual process is a process through manager receive organize.docx· Perceptual process is a process through manager receive organize.docx
· Perceptual process is a process through manager receive organize.docxLynellBull52
 
· Performance Critique Assignment· During the first month of.docx
· Performance Critique Assignment· During the first month of.docx· Performance Critique Assignment· During the first month of.docx
· Performance Critique Assignment· During the first month of.docxLynellBull52
 
· Please read the following article excerpt, and view the video cl.docx
· Please read the following article excerpt, and view the video cl.docx· Please read the following article excerpt, and view the video cl.docx
· Please read the following article excerpt, and view the video cl.docxLynellBull52
 

More from LynellBull52 (20)

· · · Must be a foreign film with subtitles· Provide you wit.docx
· · · Must be a foreign film with subtitles· Provide you wit.docx· · · Must be a foreign film with subtitles· Provide you wit.docx
· · · Must be a foreign film with subtitles· Provide you wit.docx
 
·  Identify the stakeholders and how they were affected by Heene.docx
·  Identify the stakeholders and how they were affected by Heene.docx·  Identify the stakeholders and how they were affected by Heene.docx
·  Identify the stakeholders and how they were affected by Heene.docx
 
· · Re WEEK ONE - DISCUSSION QUESTION # 2posted by DONALD DEN.docx
· · Re WEEK ONE - DISCUSSION QUESTION # 2posted by DONALD DEN.docx· · Re WEEK ONE - DISCUSSION QUESTION # 2posted by DONALD DEN.docx
· · Re WEEK ONE - DISCUSSION QUESTION # 2posted by DONALD DEN.docx
 
· Week 3 AssignmentGovernment and Not-For-Profit AccountingVal.docx
· Week 3 AssignmentGovernment and Not-For-Profit AccountingVal.docx· Week 3 AssignmentGovernment and Not-For-Profit AccountingVal.docx
· Week 3 AssignmentGovernment and Not-For-Profit AccountingVal.docx
 
· Week 10 Assignment 2 SubmissionStudents, please view the.docx
· Week 10 Assignment 2 SubmissionStudents, please view the.docx· Week 10 Assignment 2 SubmissionStudents, please view the.docx
· Week 10 Assignment 2 SubmissionStudents, please view the.docx
 
· Write in paragraph format (no lists, bullets, or numbers).· .docx
· Write in paragraph format (no lists, bullets, or numbers).· .docx· Write in paragraph format (no lists, bullets, or numbers).· .docx
· Write in paragraph format (no lists, bullets, or numbers).· .docx
 
· WEEK 1 Databases and SecurityLesson· Databases and Security.docx
· WEEK 1 Databases and SecurityLesson· Databases and Security.docx· WEEK 1 Databases and SecurityLesson· Databases and Security.docx
· WEEK 1 Databases and SecurityLesson· Databases and Security.docx
 
· Unit 4 Citizen RightsINTRODUCTIONIn George Orwells Animal.docx
· Unit 4 Citizen RightsINTRODUCTIONIn George Orwells Animal.docx· Unit 4 Citizen RightsINTRODUCTIONIn George Orwells Animal.docx
· Unit 4 Citizen RightsINTRODUCTIONIn George Orwells Animal.docx
 
· Unit Interface-User Interaction· Assignment Objectives Em.docx
· Unit  Interface-User Interaction· Assignment Objectives Em.docx· Unit  Interface-User Interaction· Assignment Objectives Em.docx
· Unit Interface-User Interaction· Assignment Objectives Em.docx
 
· The Victims’ Rights MovementWrite a 2 page paper.  Address the.docx
· The Victims’ Rights MovementWrite a 2 page paper.  Address the.docx· The Victims’ Rights MovementWrite a 2 page paper.  Address the.docx
· The Victims’ Rights MovementWrite a 2 page paper.  Address the.docx
 
· Question 1· · How does internal environmental analy.docx
· Question 1· ·        How does internal environmental analy.docx· Question 1· ·        How does internal environmental analy.docx
· Question 1· · How does internal environmental analy.docx
 
· Question 1Question 192 out of 2 pointsWhat file in the.docx
· Question 1Question 192 out of 2 pointsWhat file in the.docx· Question 1Question 192 out of 2 pointsWhat file in the.docx
· Question 1Question 192 out of 2 pointsWhat file in the.docx
 
· Question 15 out of 5 pointsWhen psychologists discuss .docx
· Question 15 out of 5 pointsWhen psychologists discuss .docx· Question 15 out of 5 pointsWhen psychologists discuss .docx
· Question 15 out of 5 pointsWhen psychologists discuss .docx
 
· Question 1 2 out of 2 pointsWhich of the following i.docx
· Question 1 2 out of 2 pointsWhich of the following i.docx· Question 1 2 out of 2 pointsWhich of the following i.docx
· Question 1 2 out of 2 pointsWhich of the following i.docx
 
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
 
· Strengths Public Recognition of OrganizationOverall Positive P.docx
· Strengths Public Recognition of OrganizationOverall Positive P.docx· Strengths Public Recognition of OrganizationOverall Positive P.docx
· Strengths Public Recognition of OrganizationOverall Positive P.docx
 
· Part I Key Case SummaryThis case discusses the Union Carbid.docx
· Part I Key Case SummaryThis case discusses the Union Carbid.docx· Part I Key Case SummaryThis case discusses the Union Carbid.docx
· Part I Key Case SummaryThis case discusses the Union Carbid.docx
 
· Perceptual process is a process through manager receive organize.docx
· Perceptual process is a process through manager receive organize.docx· Perceptual process is a process through manager receive organize.docx
· Perceptual process is a process through manager receive organize.docx
 
· Performance Critique Assignment· During the first month of.docx
· Performance Critique Assignment· During the first month of.docx· Performance Critique Assignment· During the first month of.docx
· Performance Critique Assignment· During the first month of.docx
 
· Please read the following article excerpt, and view the video cl.docx
· Please read the following article excerpt, and view the video cl.docx· Please read the following article excerpt, and view the video cl.docx
· Please read the following article excerpt, and view the video cl.docx
 

Recently uploaded

Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesAmanpreetKaur157993
 
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...Nguyen Thanh Tu Collection
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaEADTU
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxneillewis46
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSAnaAcapella
 
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...Gary Wood
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code ExamplesPeter Brusilovsky
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjMohammed Sikander
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxAdelaideRefugio
 
ANTI PARKISON DRUGS.pptx
ANTI         PARKISON          DRUGS.pptxANTI         PARKISON          DRUGS.pptx
ANTI PARKISON DRUGS.pptxPoojaSen20
 
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhĐề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhleson0603
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文中 央社
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project researchCaitlinCummins3
 
An Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge AppAn Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge AppCeline George
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17Celine George
 
How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxCeline George
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMELOISARIVERA8
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismDabee Kamal
 

Recently uploaded (20)

Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategies
 
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptx
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptx
 
ANTI PARKISON DRUGS.pptx
ANTI         PARKISON          DRUGS.pptxANTI         PARKISON          DRUGS.pptx
ANTI PARKISON DRUGS.pptx
 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
 
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhĐề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 
An Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge AppAn Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge App
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
 
How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptx
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in Hinduism
 

© 2014 Straand may notStrayer UnivCIS 502 FacTechn.docx

  • 1. © 2014 Stra and may not Strayer Univ CIS 502 Fac Technica Due Wee Accounti Loan De Custo Servic ayer University. A t be copied, furth versity. culty Version 114 al Paper: Risk k 10 and wort Off Worstations (x25) Worstations (x12)
  • 2. Worstations (x63) ing ept omer ces DMZ Prin (x Prin (x Pr CIS 502 All Rights Reserv her distributed, o 48 (1099 10-17-2 k Assessme th 160 points Trus f-Site Office VPN Gatew
  • 3. VPN Gatewa Orac S ters 7) ters 5) rinters (x3) SUS Server 10Gbps 2 – Assig ed. This docume r otherwise discl 2014) Final nt sted Computin In Global N ay
  • 4. ay Border Intern DNS Distrib cle 9i DB erver 10Gbps 10 Gbps 10 Gbps OC192 10Gbps nments a ent contains Stra osed in whole or g Base Interna nternet Finance, Inc. r (Core) Router al
  • 5. S Exchange 2000 Email bution Routers File Acc La VL Swi 10 Gb 10 Gbps OC1 10G 10 Gbps nd Rubric ayer University C r in part, without al Network rs e and Print Server Intra S
  • 6. cess ayer LAN witch bps 100Mbps 192 bps cs onfidential and P the expressed w Remote Dial UpUsers Worstations (x5) Worstations (x10) Worstations (x49) anet Web Server Printer (x3)
  • 7. Printers (x3) Printers (x5) Workstatio (x7) s RAS Proprietary inform written permission Page 3 PBX PSTN Mgmt Credit Dept Finance s ons mation n of 33 of 50
  • 8. © 2014 Stra and may not Strayer Univ CIS 502 Fac Above is t this past y invested i However, pace, its o GFI’s netw network o as the ban hired any The truste hosts the overall fin applicatio financial s network a one (1) we the norma $1,000,00 Write a ei 1. D 2. A co or
  • 9. th th 3. E of w 4. E m 5. U se re 6. U do ayer University. A t be copied, furth versity. culty Version 114 the Global Fin year and impl n the network although the overall netwo work has histo outages. GFI h ndwidth dema security pers ed computing
  • 10. company’s m ancial situatio n servers in t systems heav attacks twice t eek as a resu al operating b 00, as well as ght to ten (8- Describe the c Assess risk ba over all the ne rganization an his risk assess he business le a. Defend b. Ascert vulner Recom vulner c. Justify require xamine wheth f these, and d was the most a xplain the wa management a
  • 11. Using Microsof ecure and risk equired page Use at least th o not qualify a CIS 502 All Rights Reserv her distributed, o 48 (1099 10-17-2 Glo nance, Inc. (G emented a nu k and designe e company’s f rk security po orically been has hired thre and by the co sonnel who ca base (TCB) mission critica on. The Orac he company. vily depend on this year, and ult. The recov baseline. GFI
  • 12. lost custome 10) page form company netw ased on the G ecessary deta nd risk postur sment to dete eaders to mak d your assum tain apparent abilities. Such mmend mitiga abilities. y your cryptog ements, data- her your risk discuss the m appropriate. ay in which yo and thus facili ft Visio or its k-mitigating m length. ree (3) quality as quality res 2 – Assig ed. This docume r otherwise discl 2014) Final
  • 13. obal Finance GFI) network d umber of netw ed it to be fau inancial statu osture has not fairly stable, ee (3) network ompany emplo an take care o internal netwo l systems tha le database a GFI cannot a n the network d its Oracle da ery process r estimated the er confidence. mal risk asses work, intercon GFI, Inc. netwo ails for your c re of the curre ermine what a ke data-driven mptions where
  • 14. security vuln h analysis sho ation processe graphy recom -driven decisi assessment m main reasons w ou would pres itate security open source model. Note: T y resources in ources. nments a ent contains Stra osed in whole or e, Inc. Netwo diagram. A hy work devices lt tolerant and s has mature t kept up with and the comp k engineers to oyees and the
  • 15. of the operatio ork within the at are vital to t and email sys afford system k stability and atabase and e required GFI t e loss from th . ssment propo nection, and ork diagram s client, GFI Inc ent environme actions to take n decisions. e pertinent info erabilities, an ould entertain es and proced mendations, on-making, a methodology why you belie sent your findi buy-in and co equivalent, re The graphica
  • 16. n this assignm nd Rubric ayer University C r in part, without ork Diagram ypothetical co as displayed d resilient from ed and its netw h the company pany has not o keep up wit e clients. How onal security e Global Finan the company’ stems are amo m or network o availability. G email servers to utilize $25, ese network osal in which y communicati scenario. Note c., to understa
  • 17. ent. The com e; therefore, i ormation from nd analyze at n the possibili dures for eac based on sec and objective is quantitativ eve that the m ings and asse oncentration. edraw the CF ally depicted s ment. Note: W cs onfidential and P the expressed w ompany, GFI in the diagra m any networ work has exp y growth. experienced th the network wever, the com responsibility
  • 18. nce, Inc. Netw ’s operations ong the most outages, as its GFI has expe s had been do ,000 to restor attacks at mo you: on environme e: Your risk a and the risk fa pany manage it must be com m the scenario least three (3 ity of faulty ne ch of the ident curity concern opinions. ve, qualitative methodology t essment to th FI diagram, de solution is not
  • 19. Wikipedia and Proprietary inform written permission Page 3 has grown ra am. The comp rk failures. panded at a ra many full sca k growth, as w mpany has no y. work Diagram that also affe t intensively u s cash flow an rienced DoS own for a tota re its operatio ore than ent. assessment s actors of the ement will util mprehensive o isn’t availab
  • 20. 3) such etwork design tified ns and , or a combin that you utilize he company’s epicted as a t included in t d similar Web mation n of 34 of 50 apidly pany apid ale well ot m ect the used nd l of
  • 21. ns to should lize for ble. n. ation ed the sites © 2014 Stra and may not Strayer Univ CIS 502 Fac Your assig B si pr In na th
  • 22. In co su The speci E pr A E D fr E an at U W m Grading fo language Poin Cr 1. Describe network, in and comm environme Weight: 15 2a. Defend assumption
  • 23. pertinent in from the sc available. Weight: 5% 2b. Ascerta security vu ayer University. A t be copied, furth versity. culty Version 114 gnment must e typed, doub ides; citations rofessor for a nclude a cove ame, the cou he required as nclude charts ompleted diag ubmitted. ific course lea valuate an or rovide securit Analyze the m xplain access Describe the d om a manage
  • 24. valuate and e nd technologi ttacks. Use technolog Write clearly a mechanics and or this assign and writing s nts: 160 riteria e the company nterconnection, unication nt. 5% d your ns where nformation cenario isn’t % ain apparent lnerabilities, CIS 502 All Rights Reserv her distributed, o
  • 25. 48 (1099 10-17-2 follow these ble spaced, u s and referenc any additional er page contai rse title, and t ssignment pa or diagrams grams / chart arning outcom rganization’s s ty countermea ethods of ma s control meth details and the ement perspe explain from a ies organizati y and informa nd concisely d technical sty ment will be b skills, using th Unacce Below 7 y Did not sub incomplete
  • 26. described t company n interconnec and commu environmen Did not sub incompletel defended y assumption pertinent information scenario isn available. Did not sub incompletel 2 – Assig ed. This docume r otherwise discl 2014) Final formatting re sing Times N ces must follo instructions. ining the title the date. The ge length. created in Vis s must be imp
  • 27. mes associate security polic asures. naging, contr hods and atta e importance ective. a managemen ions can emp ation resource about the the yle conventio based on ans e following ru Te ptable 70% F bmit or ly he etwork, ction, unication nt. Par the net inte com env
  • 28. bmit or ly our ns where from the n’t Par you wh info sce ava bmit or ly Par app nments a ent contains Stra osed in whole or quirements: New Roman fo ow APA or sc of the assign e cover page a sio or an open ported into th
  • 29. ed with this as ies and risk m rolling, and m acks. of application nt perspective ploy to mitigat es to research eories of secu ns. swer quality, l ubric. echnical Pap Fair 70-79% C rtially described e company twork, erconnection, a mmunication vironment. rtially defended ur assumptions ere pertinent ormation from t enario isn’t ailable.
  • 30. rtially ascertain parent security nd Rubric ayer University C r in part, without ont (size 12), chool-specific nment, the stu and the refere n source alter he Word docu ssignment are management mitigating secu n security mo e the industry te risks and th h issues in se urity managem ogic / organiz per: Risk Ass Pro
  • 32. with one-inch format. Chec udent’s name, ence page ar rnative such a ment before t e: procedures, a urity risks and dels and thei y-standard eq hwart both int ecurity manag ment using pr zation of the p sessment oficient -89% B orily d the y network, nection, and ication ment.
  • 33. T d c in c e orily d your ons where information scenario lable. T y w in s a orily ned T a Proprietary inform written permission Page 3 h margins on ck with your , the professo
  • 34. re not include as Dia. The the paper is and its ability d vulnerabilitie r implementa uipment, tool ternal and ext gement. roper writing paper, and Exempla 90-100% Thoroughly described the company netwo nterconnection communication environment. Thoroughly def your assumptio where pertinent nformation from scenario isn’t available.
  • 35. Thoroughly ascertained app mation n of 35 of 50 all or’s d in to es. tion ls, ternal ary % A ork, n, and n fended ons t m the parent