SlideShare a Scribd company logo
1 of 3
Download to read offline
Imagine you are an Information Systems Security Officer for a medium-sized financial services
firm that has operations in four (4) states (Virginia, Florida, Arizona, and California). Due to the
highly sensitive data created, stored, and transported by your organization, the CIO is concerned
with implementing proper security controls for the LAN-to-WAN domain. Specifically, the CIO
is concerned with the following areas:
Protecting data privacy across the WAN
Filtering undesirable network traffic from the Internet
Filtering the traffic to the Internet that does not adhere to the organizational acceptable use
policy (AUP) for the Web
Having a zone that allows access for anonymous users but aggressively controls information
exchange with internal resources
Having an area designed to trap attackers in order to monitor attacker activities
Allowing a means to monitor network traffic in real time as a means to identify and block
unusual activity
Hiding internal IP addresses
Allowing operating system and application patch management
The CIO has tasked you with proposing a series of hardware and software controls designed to
provide security for the LAN-to-WAN domain. The CIO anticipates receiving both a written
report and diagram(s) to support your recommendations.
Write a three to five (3-5) page paper in which you:
Use MS Visio or an open source equivalent to graphically depict a solution for the provided
scenario that will:
filter undesirable network traffic from the Internet
filter Web traffic to the Internet that does not adhere to the organizational AUP for the Web
allow for a zone for anonymous users but aggressively controls information exchange with
internal resources
allow for an area designed to trap attackers in order to monitor attacker activities
offer a means to monitor network traffic in real time as a means to identify and block unusual
activity
hide internal IP addresses
Identify the fundamentals of public key infrastructure (PKI).
Describe the manner in which your solution will protect the privacy of data transmitted across
the WAN.
Protecting data privacy across the WAN
Filtering undesirable network traffic from the Internet
Filtering the traffic to the Internet that does not adhere to the organizational acceptable use
policy (AUP) for the Web
Having a zone that allows access for anonymous users but aggressively controls information
exchange with internal resources
Having an area designed to trap attackers in order to monitor attacker activities
Allowing a means to monitor network traffic in real time as a means to identify and block
unusual activity
Hiding internal IP addresses
Allowing operating system and application patch management
Solution
Imagine you are an Information Systems Security Officer for a medium-sized financial services
firm that has operations in four (4) states (Virginia, Florida, Arizona, and California). Due to the
highly sensitive data created, stored, and transported by your organization, the CIO is concerned
with implementing proper security controls for the LAN-to-WAN domain. Specifically, the CIO
is concerned with the following areas:
Protecting data privacy across the WAN
Filtering undesirable network traffic from the Internet
Filtering the traffic to the Internet that does not adhere to the organizational acceptable use
policy (AUP) for the Web
Having a zone that allows access for anonymous users but aggressively controls information
exchange with internal resources
Having an area designed to trap attackers in order to monitor attacker activities
Allowing a means to monitor network traffic in real time as a means to identify and block
unusual activity
Hiding internal IP addresses
Allowing operating system and application patch management
The CIO has tasked you with proposing a series of hardware and software controls designed to
provide security for the LAN-to-WAN domain. The CIO anticipates receiving both a written
report and diagram(s) to support your recommendations.
Write a three to five (3-5) page paper in which you:
Use MS Visio or an open source equivalent to graphically depict a solution for the provided
scenario that will:
filter undesirable network traffic from the Internet
filter Web traffic to the Internet that does not adhere to the organizational AUP for the Web
allow for a zone for anonymous users but aggressively controls information exchange with
internal resources
allow for an area designed to trap attackers in order to monitor attacker activities
offer a means to monitor network traffic in real time as a means to identify and block unusual
activity
hide internal IP addresses
Identify the fundamentals of public key infrastructure (PKI).
Describe the manner in which your solution will protect the privacy of data transmitted across
the WAN.
Protecting data privacy across the WAN
Filtering undesirable network traffic from the Internet
Filtering the traffic to the Internet that does not adhere to the organizational acceptable use
policy (AUP) for the Web
Having a zone that allows access for anonymous users but aggressively controls information
exchange with internal resources
Having an area designed to trap attackers in order to monitor attacker activities
Allowing a means to monitor network traffic in real time as a means to identify and block
unusual activity
Hiding internal IP addresses
Allowing operating system and application patch management

More Related Content

Similar to Imagine you are an Information Systems Security Officer for a medium.pdf

Assignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
Assignment 4 Designing Compliance within the LAN-to-WAN Domain.docxAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
Assignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
luearsome
 
Assignment 4 Designing Compliance within the LAN-to-WAN DomainD.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainD.docxAssignment 4 Designing Compliance within the LAN-to-WAN DomainD.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainD.docx
astonrenna
 
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docxAssignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
eleanorabarrington
 
Assignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docx
Assignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docxAssignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docx
Assignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docx
danielfoster65629
 
Soteria Cybersecurity Healthcheck-FB01
Soteria Cybersecurity Healthcheck-FB01Soteria Cybersecurity Healthcheck-FB01
Soteria Cybersecurity Healthcheck-FB01
Richard Sullivan
 
Worksheet 4 LANWAN Compliance and Auditinglook on the docume.docx
Worksheet 4 LANWAN Compliance and Auditinglook on the docume.docxWorksheet 4 LANWAN Compliance and Auditinglook on the docume.docx
Worksheet 4 LANWAN Compliance and Auditinglook on the docume.docx
griffinruthie22
 
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docxAssignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
carlibradley31429
 
Week 7Worksheet 4 LANWAN Compliance and AuditingCourse L.docx
Week 7Worksheet 4 LANWAN Compliance and AuditingCourse L.docxWeek 7Worksheet 4 LANWAN Compliance and AuditingCourse L.docx
Week 7Worksheet 4 LANWAN Compliance and AuditingCourse L.docx
cockekeshia
 
Based on the below and using the 12 categories of threats identify 3 .pdf
Based on the below and using the 12 categories of threats identify 3 .pdfBased on the below and using the 12 categories of threats identify 3 .pdf
Based on the below and using the 12 categories of threats identify 3 .pdf
arri2009av
 

Similar to Imagine you are an Information Systems Security Officer for a medium.pdf (20)

Assignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
Assignment 4 Designing Compliance within the LAN-to-WAN Domain.docxAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
Assignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
 
Assignment 4 Designing Compliance within the LAN-to-WAN DomainD.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainD.docxAssignment 4 Designing Compliance within the LAN-to-WAN DomainD.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainD.docx
 
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docxAssignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
 
Assignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docx
Assignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docxAssignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docx
Assignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docx
 
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domainUop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
 
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domainUop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
 
Soteria Cybersecurity Healthcheck-FB01
Soteria Cybersecurity Healthcheck-FB01Soteria Cybersecurity Healthcheck-FB01
Soteria Cybersecurity Healthcheck-FB01
 
Lumeta IPsonar Aligned to ITIL v3
Lumeta IPsonar Aligned to ITIL v3Lumeta IPsonar Aligned to ITIL v3
Lumeta IPsonar Aligned to ITIL v3
 
Worksheet 4 LANWAN Compliance and Auditinglook on the docume.docx
Worksheet 4 LANWAN Compliance and Auditinglook on the docume.docxWorksheet 4 LANWAN Compliance and Auditinglook on the docume.docx
Worksheet 4 LANWAN Compliance and Auditinglook on the docume.docx
 
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docxAssignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
 
Week 7Worksheet 4 LANWAN Compliance and AuditingCourse L.docx
Week 7Worksheet 4 LANWAN Compliance and AuditingCourse L.docxWeek 7Worksheet 4 LANWAN Compliance and AuditingCourse L.docx
Week 7Worksheet 4 LANWAN Compliance and AuditingCourse L.docx
 
Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical Hacking
 
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...
 
Securing E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-CommerceSecuring E-commerce networks in MIS and E-Commerce
Securing E-commerce networks in MIS and E-Commerce
 
Microsoft Avanced Threat Analytics
Microsoft Avanced Threat AnalyticsMicrosoft Avanced Threat Analytics
Microsoft Avanced Threat Analytics
 
Based on the below and using the 12 categories of threats identify 3 .pdf
Based on the below and using the 12 categories of threats identify 3 .pdfBased on the below and using the 12 categories of threats identify 3 .pdf
Based on the below and using the 12 categories of threats identify 3 .pdf
 
Top 25 SOC Analyst interview questions.pdf
Top 25 SOC Analyst interview questions.pdfTop 25 SOC Analyst interview questions.pdf
Top 25 SOC Analyst interview questions.pdf
 
Purushottam Sharma
Purushottam SharmaPurushottam Sharma
Purushottam Sharma
 
Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security
 
Search Inform DLP
Search Inform DLPSearch Inform DLP
Search Inform DLP
 

More from arccreation001

SOURCE CODEimport java.util.Iterator;public class CircularLinke.pdf
SOURCE CODEimport java.util.Iterator;public class CircularLinke.pdfSOURCE CODEimport java.util.Iterator;public class CircularLinke.pdf
SOURCE CODEimport java.util.Iterator;public class CircularLinke.pdf
arccreation001
 
In optics, a virtual image is an image in which t.pdf
                     In optics, a virtual image is an image in which t.pdf                     In optics, a virtual image is an image in which t.pdf
In optics, a virtual image is an image in which t.pdf
arccreation001
 
1) Political orientation and ideas are the main reasons behind count.pdf
1) Political orientation and ideas are the main reasons behind count.pdf1) Political orientation and ideas are the main reasons behind count.pdf
1) Political orientation and ideas are the main reasons behind count.pdf
arccreation001
 
The tracheal system in insects and gills in fishes are both helps th.pdf
The tracheal system in insects and gills in fishes are both helps th.pdfThe tracheal system in insects and gills in fishes are both helps th.pdf
The tracheal system in insects and gills in fishes are both helps th.pdf
arccreation001
 
Question 1How many parameters does a default constructor haveAn.pdf
Question 1How many parameters does a default constructor haveAn.pdfQuestion 1How many parameters does a default constructor haveAn.pdf
Question 1How many parameters does a default constructor haveAn.pdf
arccreation001
 
Rio de Janeiro is a city located on Brazils south-east coast. It i.pdf
Rio de Janeiro is a city located on Brazils south-east coast. It i.pdfRio de Janeiro is a city located on Brazils south-east coast. It i.pdf
Rio de Janeiro is a city located on Brazils south-east coast. It i.pdf
arccreation001
 
Othello.javapackage othello;import core.Game; import userInter.pdf
Othello.javapackage othello;import core.Game; import userInter.pdfOthello.javapackage othello;import core.Game; import userInter.pdf
Othello.javapackage othello;import core.Game; import userInter.pdf
arccreation001
 
1.Types of Computer Information SystemsThere are four basic type.pdf
1.Types of Computer Information SystemsThere are four basic type.pdf1.Types of Computer Information SystemsThere are four basic type.pdf
1.Types of Computer Information SystemsThere are four basic type.pdf
arccreation001
 
Microbiome of human bodyResearchers currently studying human norm.pdf
Microbiome of human bodyResearchers currently studying human norm.pdfMicrobiome of human bodyResearchers currently studying human norm.pdf
Microbiome of human bodyResearchers currently studying human norm.pdf
arccreation001
 
It is an important to understand the early stages of reproduction. W.pdf
It is an important to understand the early stages of reproduction. W.pdfIt is an important to understand the early stages of reproduction. W.pdf
It is an important to understand the early stages of reproduction. W.pdf
arccreation001
 
Let the normal gene be represented by P, and the two mutations be re.pdf
Let the normal gene be represented by P, and the two mutations be re.pdfLet the normal gene be represented by P, and the two mutations be re.pdf
Let the normal gene be represented by P, and the two mutations be re.pdf
arccreation001
 

More from arccreation001 (20)

SOURCE CODEimport java.util.Iterator;public class CircularLinke.pdf
SOURCE CODEimport java.util.Iterator;public class CircularLinke.pdfSOURCE CODEimport java.util.Iterator;public class CircularLinke.pdf
SOURCE CODEimport java.util.Iterator;public class CircularLinke.pdf
 
2) In Autocrine signalling, reception of a signal released by the sa.pdf
2) In Autocrine signalling, reception of a signal released by the sa.pdf2) In Autocrine signalling, reception of a signal released by the sa.pdf
2) In Autocrine signalling, reception of a signal released by the sa.pdf
 
Volatility Distillation separates out different .pdf
                     Volatility  Distillation separates out different .pdf                     Volatility  Distillation separates out different .pdf
Volatility Distillation separates out different .pdf
 
The first one has Van der Waals interactions sinc.pdf
                     The first one has Van der Waals interactions sinc.pdf                     The first one has Van der Waals interactions sinc.pdf
The first one has Van der Waals interactions sinc.pdf
 
Supersaturated actually. There is more solvent th.pdf
                     Supersaturated actually. There is more solvent th.pdf                     Supersaturated actually. There is more solvent th.pdf
Supersaturated actually. There is more solvent th.pdf
 
In optics, a virtual image is an image in which t.pdf
                     In optics, a virtual image is an image in which t.pdf                     In optics, a virtual image is an image in which t.pdf
In optics, a virtual image is an image in which t.pdf
 
1) Political orientation and ideas are the main reasons behind count.pdf
1) Political orientation and ideas are the main reasons behind count.pdf1) Political orientation and ideas are the main reasons behind count.pdf
1) Political orientation and ideas are the main reasons behind count.pdf
 
Molarity = moles volume in L Molarity = 0.0342.pdf
                     Molarity = moles  volume in L Molarity = 0.0342.pdf                     Molarity = moles  volume in L Molarity = 0.0342.pdf
Molarity = moles volume in L Molarity = 0.0342.pdf
 
The tracheal system in insects and gills in fishes are both helps th.pdf
The tracheal system in insects and gills in fishes are both helps th.pdfThe tracheal system in insects and gills in fishes are both helps th.pdf
The tracheal system in insects and gills in fishes are both helps th.pdf
 
The answer is D. ChemoorganoheterotrophCow is a chemoorganohetero.pdf
The answer is D. ChemoorganoheterotrophCow is a chemoorganohetero.pdfThe answer is D. ChemoorganoheterotrophCow is a chemoorganohetero.pdf
The answer is D. ChemoorganoheterotrophCow is a chemoorganohetero.pdf
 
The A and B chains of human insulin are cloned in separate plasmids .pdf
The A and B chains of human insulin are cloned in separate plasmids .pdfThe A and B chains of human insulin are cloned in separate plasmids .pdf
The A and B chains of human insulin are cloned in separate plasmids .pdf
 
Question 1How many parameters does a default constructor haveAn.pdf
Question 1How many parameters does a default constructor haveAn.pdfQuestion 1How many parameters does a default constructor haveAn.pdf
Question 1How many parameters does a default constructor haveAn.pdf
 
Rio de Janeiro is a city located on Brazils south-east coast. It i.pdf
Rio de Janeiro is a city located on Brazils south-east coast. It i.pdfRio de Janeiro is a city located on Brazils south-east coast. It i.pdf
Rio de Janeiro is a city located on Brazils south-east coast. It i.pdf
 
Othello.javapackage othello;import core.Game; import userInter.pdf
Othello.javapackage othello;import core.Game; import userInter.pdfOthello.javapackage othello;import core.Game; import userInter.pdf
Othello.javapackage othello;import core.Game; import userInter.pdf
 
1.Types of Computer Information SystemsThere are four basic type.pdf
1.Types of Computer Information SystemsThere are four basic type.pdf1.Types of Computer Information SystemsThere are four basic type.pdf
1.Types of Computer Information SystemsThere are four basic type.pdf
 
Microbiome of human bodyResearchers currently studying human norm.pdf
Microbiome of human bodyResearchers currently studying human norm.pdfMicrobiome of human bodyResearchers currently studying human norm.pdf
Microbiome of human bodyResearchers currently studying human norm.pdf
 
Na2SeO3 --- 2 Na+ + SeO32- 0.08              0.16       0.08 .pdf
Na2SeO3 --- 2 Na+ + SeO32- 0.08              0.16       0.08 .pdfNa2SeO3 --- 2 Na+ + SeO32- 0.08              0.16       0.08 .pdf
Na2SeO3 --- 2 Na+ + SeO32- 0.08              0.16       0.08 .pdf
 
It is an important to understand the early stages of reproduction. W.pdf
It is an important to understand the early stages of reproduction. W.pdfIt is an important to understand the early stages of reproduction. W.pdf
It is an important to understand the early stages of reproduction. W.pdf
 
Let the normal gene be represented by P, and the two mutations be re.pdf
Let the normal gene be represented by P, and the two mutations be re.pdfLet the normal gene be represented by P, and the two mutations be re.pdf
Let the normal gene be represented by P, and the two mutations be re.pdf
 
Each water molecule has 4 hydrogen bonds holding .pdf
                     Each water molecule has 4 hydrogen bonds holding .pdf                     Each water molecule has 4 hydrogen bonds holding .pdf
Each water molecule has 4 hydrogen bonds holding .pdf
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Recently uploaded (20)

2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 

Imagine you are an Information Systems Security Officer for a medium.pdf

  • 1. Imagine you are an Information Systems Security Officer for a medium-sized financial services firm that has operations in four (4) states (Virginia, Florida, Arizona, and California). Due to the highly sensitive data created, stored, and transported by your organization, the CIO is concerned with implementing proper security controls for the LAN-to-WAN domain. Specifically, the CIO is concerned with the following areas: Protecting data privacy across the WAN Filtering undesirable network traffic from the Internet Filtering the traffic to the Internet that does not adhere to the organizational acceptable use policy (AUP) for the Web Having a zone that allows access for anonymous users but aggressively controls information exchange with internal resources Having an area designed to trap attackers in order to monitor attacker activities Allowing a means to monitor network traffic in real time as a means to identify and block unusual activity Hiding internal IP addresses Allowing operating system and application patch management The CIO has tasked you with proposing a series of hardware and software controls designed to provide security for the LAN-to-WAN domain. The CIO anticipates receiving both a written report and diagram(s) to support your recommendations. Write a three to five (3-5) page paper in which you: Use MS Visio or an open source equivalent to graphically depict a solution for the provided scenario that will: filter undesirable network traffic from the Internet filter Web traffic to the Internet that does not adhere to the organizational AUP for the Web allow for a zone for anonymous users but aggressively controls information exchange with internal resources allow for an area designed to trap attackers in order to monitor attacker activities offer a means to monitor network traffic in real time as a means to identify and block unusual activity hide internal IP addresses Identify the fundamentals of public key infrastructure (PKI). Describe the manner in which your solution will protect the privacy of data transmitted across the WAN. Protecting data privacy across the WAN Filtering undesirable network traffic from the Internet
  • 2. Filtering the traffic to the Internet that does not adhere to the organizational acceptable use policy (AUP) for the Web Having a zone that allows access for anonymous users but aggressively controls information exchange with internal resources Having an area designed to trap attackers in order to monitor attacker activities Allowing a means to monitor network traffic in real time as a means to identify and block unusual activity Hiding internal IP addresses Allowing operating system and application patch management Solution Imagine you are an Information Systems Security Officer for a medium-sized financial services firm that has operations in four (4) states (Virginia, Florida, Arizona, and California). Due to the highly sensitive data created, stored, and transported by your organization, the CIO is concerned with implementing proper security controls for the LAN-to-WAN domain. Specifically, the CIO is concerned with the following areas: Protecting data privacy across the WAN Filtering undesirable network traffic from the Internet Filtering the traffic to the Internet that does not adhere to the organizational acceptable use policy (AUP) for the Web Having a zone that allows access for anonymous users but aggressively controls information exchange with internal resources Having an area designed to trap attackers in order to monitor attacker activities Allowing a means to monitor network traffic in real time as a means to identify and block unusual activity Hiding internal IP addresses Allowing operating system and application patch management The CIO has tasked you with proposing a series of hardware and software controls designed to provide security for the LAN-to-WAN domain. The CIO anticipates receiving both a written report and diagram(s) to support your recommendations. Write a three to five (3-5) page paper in which you: Use MS Visio or an open source equivalent to graphically depict a solution for the provided scenario that will: filter undesirable network traffic from the Internet filter Web traffic to the Internet that does not adhere to the organizational AUP for the Web
  • 3. allow for a zone for anonymous users but aggressively controls information exchange with internal resources allow for an area designed to trap attackers in order to monitor attacker activities offer a means to monitor network traffic in real time as a means to identify and block unusual activity hide internal IP addresses Identify the fundamentals of public key infrastructure (PKI). Describe the manner in which your solution will protect the privacy of data transmitted across the WAN. Protecting data privacy across the WAN Filtering undesirable network traffic from the Internet Filtering the traffic to the Internet that does not adhere to the organizational acceptable use policy (AUP) for the Web Having a zone that allows access for anonymous users but aggressively controls information exchange with internal resources Having an area designed to trap attackers in order to monitor attacker activities Allowing a means to monitor network traffic in real time as a means to identify and block unusual activity Hiding internal IP addresses Allowing operating system and application patch management