SlideShare a Scribd company logo
1 of 6
Assignment 4: Designing Compliance within the LAN-to-WAN
Domain
Note:
Review the page requirements and formatting instructions for
this assignment closely. Graphically depicted solutions, as well
as the standardized formatting requirements, do NOT count
toward the overall page length.
Imagine you are an Information Systems Security Officer for a
medium-sized financial services firm that has operations in four
(4) states (Virginia, Florida, Arizona, and California). Due to
the highly sensitive data created, stored, and transported by
your organization, the CIO is concerned with implementing
proper security controls for the LAN-to-WAN domain.
Specifically, the CIO is concerned with the following areas:
Protecting data privacy across the WAN
Filtering undesirable network traffic from the Internet
Filtering the traffic to the Internet that does not adhere to the
organizational acceptable use policy (AUP) for the Web
Having a zone that allows access for anonymous users but
aggressively controls information exchange with internal
resources
Having an area designed to trap attackers in order to monitor
attacker activities
Allowing a means to monitor network traffic in real time as a
means to identify and block unusual activity
Hiding internal IP addresses
Allowing operating system and application patch management
The CIO has tasked you with proposing a series of hardware and
software controls designed to provide security for the LAN-to-
WAN domain. The CIO anticipates receiving both a written
report and diagram(s) to support your recommendations.
Write a three to five (3-5) page paper in which you:
Use MS Visio or an open source equivalent to graphically depict
a solution for the provided scenario that will:
filter undesirable network traffic from the Internet
filter Web traffic to the Internet that does not adhere to the
organizational AUP for the Web
allow for a zone for anonymous users but aggressively controls
information exchange with internal resources
allow for an area designed to trap attackers in order to monitor
attacker activities
offer a means to monitor network traffic in real time as a means
to identify and block unusual activity
hide internal IP addresses
Identify the fundamentals of public key infrastructure (PKI).
Describe the manner in which your solution will protect the
privacy of data transmitted across the WAN.
Analyze the requirements necessary to allow for proper
operating system and application patch management and
describe a solution that would be effective.
Use at least three (3) quality resources in this assignment.
Note:
Wikipedia and similar Websites do not qualify as quality
resources.
Note:
The graphically depicted solution is not included in the
required page length.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size
12), with one-inch margins on all sides; citations and references
must follow APA or school-specific format. Check with your
professor for any additional instructions.
Include a cover page containing the title of the assignment, the
student’s name, the professor’s name, the course title, and the
date. The cover page and the reference page are not included in
the required assignment page length.
Include charts or diagrams created in Visio or an equivalent
such as Dia or OpenOffice. The completed diagrams / charts
must be imported into the Word document before the paper is
submitted.
The specific course learning outcomes associated with this
assignment are:
Analyze information security systems compliance requirements
within the Workstation and LAN Domains.
Use technology and information resources to research issues in
security strategy and policy formation.
Write clearly and concisely about topics related to information
technology audit and control using proper writing mechanics
and technical style conventions.
Click
here
to view the grading rubric.
Grading for this assignment will be based on answer quality,
logic / organization of the paper, and language and writing
skills, using the following rubric.
Points: 130
Assignment 4: Designing Compliance within the LAN-to-WAN
Domain
Criteria
Unacceptable
Below 60% F
Meets Minimum Expectations
60-69% D
Fair
70-79% C
Proficient
80-89% B
Exemplary
90-100% A
1. Use MS Visio or an open source equivalent to graphically
depict a solution for the provided scenario.
Weight: 30%
Did not submit or incompletely
used MS Visio or an open source equivalent to graphically
depict a solution for the provided scenario.
Insufficiently used MS Visio or an open source equivalent to
graphically depict a solution for the provided scenario.
Partially used MS Visio or an open source equivalent to
graphically depict a solution for the provided scenario.
Satisfactorily used MS Visio or an open source equivalent to
graphically depict a solution for the provided scenario.
Thoroughly used MS Visio or an open source equivalent to
graphically depict a solution for the provided scenario.
2. Identify the fundamentals of public key infrastructure (PKI).
Weight: 10%
Did not submit or incompletely
identified the fundamentals of public key infrastructure (PKI).
Insufficiently identified the fundamentals of public key
infrastructure (PKI).
Partially identified the fundamentals of public key
infrastructure (PKI).
Satisfactorily identified the fundamentals of public key
infrastructure (PKI).
Thoroughly identified the fundamentals of public key
infrastructure (PKI).
3. Describe the manner in which your solution will protect the
privacy of data transmitted across the WAN.
Weight: 15%
Did not submit or incompletely
described the manner in which your solution will protect the
privacy of data transmitted across the WAN.
Insufficiently described the manner in which your solution will
protect the privacy of data transmitted across the WAN.
Partially described the manner in which your solution will
protect the privacy of data transmitted across the WAN.
Satisfactorily described the manner in which your solution will
protect the privacy of data transmitted across the WAN.
Thoroughly described the manner in which your solution will
protect the privacy of data transmitted across the WAN.
4. Analyze the requirements necessary to allow for proper
operating system and application patch management and
describe a solution that would be effective.
Weight: 15%
Did not submit or incompletely
analyzed the requirements necessary to allow for proper
operating system and application patch management and did not
submit or incompletely
described a solution that would be effective.
Insufficiently analyzed the requirements necessary to allow for
proper operating system and application patch management and
insufficiently described a solution that would be effective.
Partially analyzed the requirements necessary to allow for
proper operating system and application patch management and
partially described a solution that would be effective.
Satisfactorily analyzed the requirements necessary to allow for
proper operating system and application patch management and
satisfactorily described a solution that would be effective.
Thoroughly analyzed the requirements necessary to allow for
proper operating system and application patch management and
thoroughly described a solution that would be effective.
5. 3 references
Weight: 5%
No references provided
Does not meet the required number of references; all references
poor quality choices.
Does not meet the required number of references; some
references poor quality choices.
Meets number of required references; all references high quality
choices.
Exceeds number of required references; all references high
quality choices.
6. Clarity, writing mechanics, and formatting requirements
Weight: 10%
More than 8 errors present
7-8 errors present
5-6 errors present
3-4 errors present
0-2 errors present

More Related Content

Similar to Assignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docx

Note Review the page requirements and formatting instructions for.docx
Note Review the page requirements and formatting instructions for.docxNote Review the page requirements and formatting instructions for.docx
Note Review the page requirements and formatting instructions for.docxcarlibradley31429
 
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docxAssignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docxastonrenna
 
Imagine you are an Information Systems Security Officer for a medium.docx
Imagine you are an Information Systems Security Officer for a medium.docxImagine you are an Information Systems Security Officer for a medium.docx
Imagine you are an Information Systems Security Officer for a medium.docxnolanalgernon
 
Imagine you are an Information Systems Security Officer for a medium.docx
Imagine you are an Information Systems Security Officer for a medium.docxImagine you are an Information Systems Security Officer for a medium.docx
Imagine you are an Information Systems Security Officer for a medium.docxgordienaysmythe
 
Assignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docx
Assignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docxAssignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docx
Assignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docxdanielfoster65629
 
Project Deliverable 5 Network Infrastructure and SecurityDue Week.docx
Project Deliverable 5 Network Infrastructure and SecurityDue Week.docxProject Deliverable 5 Network Infrastructure and SecurityDue Week.docx
Project Deliverable 5 Network Infrastructure and SecurityDue Week.docxbfingarjcmc
 
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domainUop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domainuopassignment
 
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domainUop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domaineyavagal
 
erm Paper Penetration TestingDue Week 10 and worth 120 points.docx
erm Paper Penetration TestingDue Week 10 and worth 120 points.docxerm Paper Penetration TestingDue Week 10 and worth 120 points.docx
erm Paper Penetration TestingDue Week 10 and worth 120 points.docxmealsdeidre
 
Assignment 5 Technical Term PaperThe Technical Term Paper will in.docx
Assignment 5 Technical Term PaperThe Technical Term Paper will in.docxAssignment 5 Technical Term PaperThe Technical Term Paper will in.docx
Assignment 5 Technical Term PaperThe Technical Term Paper will in.docxrosemariebrayshaw
 
Cis 436 Technology levels--snaptutorial.com
Cis 436 Technology levels--snaptutorial.comCis 436 Technology levels--snaptutorial.com
Cis 436 Technology levels--snaptutorial.comsholingarjosh61
 
Cis 436 Enthusiastic Study / snaptutorial.com
Cis 436 Enthusiastic Study / snaptutorial.comCis 436 Enthusiastic Study / snaptutorial.com
Cis 436 Enthusiastic Study / snaptutorial.comStephenson03
 
Due 12 10 2016Week 10 Term PaperClick the link above to submit.docx
Due 12 10 2016Week 10 Term PaperClick the link above to submit.docxDue 12 10 2016Week 10 Term PaperClick the link above to submit.docx
Due 12 10 2016Week 10 Term PaperClick the link above to submit.docxsagarlesley
 
Imagine you are an Information Systems Security Officer for a me.docx
Imagine you are an Information Systems Security Officer for a me.docxImagine you are an Information Systems Security Officer for a me.docx
Imagine you are an Information Systems Security Officer for a me.docxterirasco
 
Project Deliverable 5 Infrastructure and SecurityThis assignm.docx
Project Deliverable 5 Infrastructure and SecurityThis assignm.docxProject Deliverable 5 Infrastructure and SecurityThis assignm.docx
Project Deliverable 5 Infrastructure and SecurityThis assignm.docxwoodruffeloisa
 
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...shyaminfo30
 
Unit1 - Individual Project Due on 03292014A company wan.docx
Unit1 - Individual Project       Due on  03292014A company wan.docxUnit1 - Individual Project       Due on  03292014A company wan.docx
Unit1 - Individual Project Due on 03292014A company wan.docxdickonsondorris
 
Term Paper WirelessSecurityPlanDue Week 10 and worth 150 po.docx
Term Paper WirelessSecurityPlanDue Week 10 and worth 150 po.docxTerm Paper WirelessSecurityPlanDue Week 10 and worth 150 po.docx
Term Paper WirelessSecurityPlanDue Week 10 and worth 150 po.docxjonghollingberry
 
Executive Proposal ProjectThe purpose of this project is to evalua.docx
Executive Proposal ProjectThe purpose of this project is to evalua.docxExecutive Proposal ProjectThe purpose of this project is to evalua.docx
Executive Proposal ProjectThe purpose of this project is to evalua.docxrhetttrevannion
 
Technical Paper Risk AssessmentGlobal Finance, Inc. Netwo.docx
Technical Paper Risk AssessmentGlobal Finance, Inc. Netwo.docxTechnical Paper Risk AssessmentGlobal Finance, Inc. Netwo.docx
Technical Paper Risk AssessmentGlobal Finance, Inc. Netwo.docxmattinsonjanel
 

Similar to Assignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docx (20)

Note Review the page requirements and formatting instructions for.docx
Note Review the page requirements and formatting instructions for.docxNote Review the page requirements and formatting instructions for.docx
Note Review the page requirements and formatting instructions for.docx
 
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docxAssignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
 
Imagine you are an Information Systems Security Officer for a medium.docx
Imagine you are an Information Systems Security Officer for a medium.docxImagine you are an Information Systems Security Officer for a medium.docx
Imagine you are an Information Systems Security Officer for a medium.docx
 
Imagine you are an Information Systems Security Officer for a medium.docx
Imagine you are an Information Systems Security Officer for a medium.docxImagine you are an Information Systems Security Officer for a medium.docx
Imagine you are an Information Systems Security Officer for a medium.docx
 
Assignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docx
Assignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docxAssignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docx
Assignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docx
 
Project Deliverable 5 Network Infrastructure and SecurityDue Week.docx
Project Deliverable 5 Network Infrastructure and SecurityDue Week.docxProject Deliverable 5 Network Infrastructure and SecurityDue Week.docx
Project Deliverable 5 Network Infrastructure and SecurityDue Week.docx
 
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domainUop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
 
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domainUop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
 
erm Paper Penetration TestingDue Week 10 and worth 120 points.docx
erm Paper Penetration TestingDue Week 10 and worth 120 points.docxerm Paper Penetration TestingDue Week 10 and worth 120 points.docx
erm Paper Penetration TestingDue Week 10 and worth 120 points.docx
 
Assignment 5 Technical Term PaperThe Technical Term Paper will in.docx
Assignment 5 Technical Term PaperThe Technical Term Paper will in.docxAssignment 5 Technical Term PaperThe Technical Term Paper will in.docx
Assignment 5 Technical Term PaperThe Technical Term Paper will in.docx
 
Cis 436 Technology levels--snaptutorial.com
Cis 436 Technology levels--snaptutorial.comCis 436 Technology levels--snaptutorial.com
Cis 436 Technology levels--snaptutorial.com
 
Cis 436 Enthusiastic Study / snaptutorial.com
Cis 436 Enthusiastic Study / snaptutorial.comCis 436 Enthusiastic Study / snaptutorial.com
Cis 436 Enthusiastic Study / snaptutorial.com
 
Due 12 10 2016Week 10 Term PaperClick the link above to submit.docx
Due 12 10 2016Week 10 Term PaperClick the link above to submit.docxDue 12 10 2016Week 10 Term PaperClick the link above to submit.docx
Due 12 10 2016Week 10 Term PaperClick the link above to submit.docx
 
Imagine you are an Information Systems Security Officer for a me.docx
Imagine you are an Information Systems Security Officer for a me.docxImagine you are an Information Systems Security Officer for a me.docx
Imagine you are an Information Systems Security Officer for a me.docx
 
Project Deliverable 5 Infrastructure and SecurityThis assignm.docx
Project Deliverable 5 Infrastructure and SecurityThis assignm.docxProject Deliverable 5 Infrastructure and SecurityThis assignm.docx
Project Deliverable 5 Infrastructure and SecurityThis assignm.docx
 
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...
 
Unit1 - Individual Project Due on 03292014A company wan.docx
Unit1 - Individual Project       Due on  03292014A company wan.docxUnit1 - Individual Project       Due on  03292014A company wan.docx
Unit1 - Individual Project Due on 03292014A company wan.docx
 
Term Paper WirelessSecurityPlanDue Week 10 and worth 150 po.docx
Term Paper WirelessSecurityPlanDue Week 10 and worth 150 po.docxTerm Paper WirelessSecurityPlanDue Week 10 and worth 150 po.docx
Term Paper WirelessSecurityPlanDue Week 10 and worth 150 po.docx
 
Executive Proposal ProjectThe purpose of this project is to evalua.docx
Executive Proposal ProjectThe purpose of this project is to evalua.docxExecutive Proposal ProjectThe purpose of this project is to evalua.docx
Executive Proposal ProjectThe purpose of this project is to evalua.docx
 
Technical Paper Risk AssessmentGlobal Finance, Inc. Netwo.docx
Technical Paper Risk AssessmentGlobal Finance, Inc. Netwo.docxTechnical Paper Risk AssessmentGlobal Finance, Inc. Netwo.docx
Technical Paper Risk AssessmentGlobal Finance, Inc. Netwo.docx
 

More from astonrenna

Assignment 4 Special Problems and Challenges and the Future of Poli.docx
Assignment 4 Special Problems and Challenges and the Future of Poli.docxAssignment 4 Special Problems and Challenges and the Future of Poli.docx
Assignment 4 Special Problems and Challenges and the Future of Poli.docxastonrenna
 
Assignment 5 Integrated Business Communication1 As a future execu.docx
Assignment 5 Integrated Business Communication1 As a future execu.docxAssignment 5 Integrated Business Communication1 As a future execu.docx
Assignment 5 Integrated Business Communication1 As a future execu.docxastonrenna
 
Assignment 4 The Future of Digital Crimes and Digital TerrorismDu.docx
Assignment 4 The Future of Digital Crimes and Digital TerrorismDu.docxAssignment 4 The Future of Digital Crimes and Digital TerrorismDu.docx
Assignment 4 The Future of Digital Crimes and Digital TerrorismDu.docxastonrenna
 
Assignment 4 Network Design Executive PowerPoint PresentationIn t.docx
Assignment 4 Network Design Executive PowerPoint PresentationIn t.docxAssignment 4 Network Design Executive PowerPoint PresentationIn t.docx
Assignment 4 Network Design Executive PowerPoint PresentationIn t.docxastonrenna
 
Assignment 4 Presentation Due Week 10 and worth 280 pointsCho.docx
Assignment 4 Presentation Due Week 10 and worth 280 pointsCho.docxAssignment 4 Presentation Due Week 10 and worth 280 pointsCho.docx
Assignment 4 Presentation Due Week 10 and worth 280 pointsCho.docxastonrenna
 
Assignment 4 Engaging Families and the Community in Early Childhood.docx
Assignment 4 Engaging Families and the Community in Early Childhood.docxAssignment 4 Engaging Families and the Community in Early Childhood.docx
Assignment 4 Engaging Families and the Community in Early Childhood.docxastonrenna
 
Assignment 4 Changing Our Lives” Thesis Statement Adaliza Rodr.docx
Assignment 4 Changing Our Lives” Thesis Statement Adaliza Rodr.docxAssignment 4 Changing Our Lives” Thesis Statement Adaliza Rodr.docx
Assignment 4 Changing Our Lives” Thesis Statement Adaliza Rodr.docxastonrenna
 
Assignment 3PurposeIn assignment 3, the saga of Joseph Dunn.docx
Assignment 3PurposeIn assignment 3, the saga of Joseph Dunn.docxAssignment 3PurposeIn assignment 3, the saga of Joseph Dunn.docx
Assignment 3PurposeIn assignment 3, the saga of Joseph Dunn.docxastonrenna
 
Assignment 3 Views on Diversity FOR SOLUTIONS PRO.Pablo.docx
Assignment 3 Views on Diversity FOR SOLUTIONS PRO.Pablo.docxAssignment 3 Views on Diversity FOR SOLUTIONS PRO.Pablo.docx
Assignment 3 Views on Diversity FOR SOLUTIONS PRO.Pablo.docxastonrenna
 
Assignment 3 Views on DiversityPablo believes that diversity is t.docx
Assignment 3 Views on DiversityPablo believes that diversity is t.docxAssignment 3 Views on DiversityPablo believes that diversity is t.docx
Assignment 3 Views on DiversityPablo believes that diversity is t.docxastonrenna
 
Assignment 3 Outline a New IT Security PolicyDue Week 9 and wor.docx
Assignment 3 Outline a New IT Security PolicyDue Week 9 and wor.docxAssignment 3 Outline a New IT Security PolicyDue Week 9 and wor.docx
Assignment 3 Outline a New IT Security PolicyDue Week 9 and wor.docxastonrenna
 
Assignment 3 Nonverbal CommunicationImagine that you are forming .docx
Assignment 3 Nonverbal CommunicationImagine that you are forming .docxAssignment 3 Nonverbal CommunicationImagine that you are forming .docx
Assignment 3 Nonverbal CommunicationImagine that you are forming .docxastonrenna
 
Assignment 3 Incident Response (IR) Strategic DecisionsSuppose th.docx
Assignment 3 Incident Response (IR) Strategic DecisionsSuppose th.docxAssignment 3 Incident Response (IR) Strategic DecisionsSuppose th.docx
Assignment 3 Incident Response (IR) Strategic DecisionsSuppose th.docxastonrenna
 
Assignment 3 Leadership of Richard BransonWrite a paper in whic.docx
Assignment 3 Leadership of Richard BransonWrite a paper in whic.docxAssignment 3 Leadership of Richard BransonWrite a paper in whic.docx
Assignment 3 Leadership of Richard BransonWrite a paper in whic.docxastonrenna
 
Assignment 3 Gender Identity We are socialized at every stage in .docx
Assignment 3 Gender Identity We are socialized at every stage in .docxAssignment 3 Gender Identity We are socialized at every stage in .docx
Assignment 3 Gender Identity We are socialized at every stage in .docxastonrenna
 
Assignment 3 Fraud Techniques Due Week 7 and worth 50 points .docx
Assignment 3 Fraud Techniques Due Week 7 and worth 50 points .docxAssignment 3 Fraud Techniques Due Week 7 and worth 50 points .docx
Assignment 3 Fraud Techniques Due Week 7 and worth 50 points .docxastonrenna
 
Assignment 3 Exploring Your CulturePart of successfully exploring.docx
Assignment 3 Exploring Your CulturePart of successfully exploring.docxAssignment 3 Exploring Your CulturePart of successfully exploring.docx
Assignment 3 Exploring Your CulturePart of successfully exploring.docxastonrenna
 
Assignment 3 Exploring Your CulturePart of successfully explo.docx
Assignment 3 Exploring Your CulturePart of successfully explo.docxAssignment 3 Exploring Your CulturePart of successfully explo.docx
Assignment 3 Exploring Your CulturePart of successfully explo.docxastonrenna
 
Assignment 3 Legal Ethics, Patients’ Rights, and HIV AIDSDue We.docx
Assignment 3 Legal Ethics, Patients’ Rights, and HIV  AIDSDue We.docxAssignment 3 Legal Ethics, Patients’ Rights, and HIV  AIDSDue We.docx
Assignment 3 Legal Ethics, Patients’ Rights, and HIV AIDSDue We.docxastonrenna
 
Assignment 3 Kotter Change Management ModelDue Week 6Using .docx
Assignment 3 Kotter Change Management ModelDue Week 6Using .docxAssignment 3 Kotter Change Management ModelDue Week 6Using .docx
Assignment 3 Kotter Change Management ModelDue Week 6Using .docxastonrenna
 

More from astonrenna (20)

Assignment 4 Special Problems and Challenges and the Future of Poli.docx
Assignment 4 Special Problems and Challenges and the Future of Poli.docxAssignment 4 Special Problems and Challenges and the Future of Poli.docx
Assignment 4 Special Problems and Challenges and the Future of Poli.docx
 
Assignment 5 Integrated Business Communication1 As a future execu.docx
Assignment 5 Integrated Business Communication1 As a future execu.docxAssignment 5 Integrated Business Communication1 As a future execu.docx
Assignment 5 Integrated Business Communication1 As a future execu.docx
 
Assignment 4 The Future of Digital Crimes and Digital TerrorismDu.docx
Assignment 4 The Future of Digital Crimes and Digital TerrorismDu.docxAssignment 4 The Future of Digital Crimes and Digital TerrorismDu.docx
Assignment 4 The Future of Digital Crimes and Digital TerrorismDu.docx
 
Assignment 4 Network Design Executive PowerPoint PresentationIn t.docx
Assignment 4 Network Design Executive PowerPoint PresentationIn t.docxAssignment 4 Network Design Executive PowerPoint PresentationIn t.docx
Assignment 4 Network Design Executive PowerPoint PresentationIn t.docx
 
Assignment 4 Presentation Due Week 10 and worth 280 pointsCho.docx
Assignment 4 Presentation Due Week 10 and worth 280 pointsCho.docxAssignment 4 Presentation Due Week 10 and worth 280 pointsCho.docx
Assignment 4 Presentation Due Week 10 and worth 280 pointsCho.docx
 
Assignment 4 Engaging Families and the Community in Early Childhood.docx
Assignment 4 Engaging Families and the Community in Early Childhood.docxAssignment 4 Engaging Families and the Community in Early Childhood.docx
Assignment 4 Engaging Families and the Community in Early Childhood.docx
 
Assignment 4 Changing Our Lives” Thesis Statement Adaliza Rodr.docx
Assignment 4 Changing Our Lives” Thesis Statement Adaliza Rodr.docxAssignment 4 Changing Our Lives” Thesis Statement Adaliza Rodr.docx
Assignment 4 Changing Our Lives” Thesis Statement Adaliza Rodr.docx
 
Assignment 3PurposeIn assignment 3, the saga of Joseph Dunn.docx
Assignment 3PurposeIn assignment 3, the saga of Joseph Dunn.docxAssignment 3PurposeIn assignment 3, the saga of Joseph Dunn.docx
Assignment 3PurposeIn assignment 3, the saga of Joseph Dunn.docx
 
Assignment 3 Views on Diversity FOR SOLUTIONS PRO.Pablo.docx
Assignment 3 Views on Diversity FOR SOLUTIONS PRO.Pablo.docxAssignment 3 Views on Diversity FOR SOLUTIONS PRO.Pablo.docx
Assignment 3 Views on Diversity FOR SOLUTIONS PRO.Pablo.docx
 
Assignment 3 Views on DiversityPablo believes that diversity is t.docx
Assignment 3 Views on DiversityPablo believes that diversity is t.docxAssignment 3 Views on DiversityPablo believes that diversity is t.docx
Assignment 3 Views on DiversityPablo believes that diversity is t.docx
 
Assignment 3 Outline a New IT Security PolicyDue Week 9 and wor.docx
Assignment 3 Outline a New IT Security PolicyDue Week 9 and wor.docxAssignment 3 Outline a New IT Security PolicyDue Week 9 and wor.docx
Assignment 3 Outline a New IT Security PolicyDue Week 9 and wor.docx
 
Assignment 3 Nonverbal CommunicationImagine that you are forming .docx
Assignment 3 Nonverbal CommunicationImagine that you are forming .docxAssignment 3 Nonverbal CommunicationImagine that you are forming .docx
Assignment 3 Nonverbal CommunicationImagine that you are forming .docx
 
Assignment 3 Incident Response (IR) Strategic DecisionsSuppose th.docx
Assignment 3 Incident Response (IR) Strategic DecisionsSuppose th.docxAssignment 3 Incident Response (IR) Strategic DecisionsSuppose th.docx
Assignment 3 Incident Response (IR) Strategic DecisionsSuppose th.docx
 
Assignment 3 Leadership of Richard BransonWrite a paper in whic.docx
Assignment 3 Leadership of Richard BransonWrite a paper in whic.docxAssignment 3 Leadership of Richard BransonWrite a paper in whic.docx
Assignment 3 Leadership of Richard BransonWrite a paper in whic.docx
 
Assignment 3 Gender Identity We are socialized at every stage in .docx
Assignment 3 Gender Identity We are socialized at every stage in .docxAssignment 3 Gender Identity We are socialized at every stage in .docx
Assignment 3 Gender Identity We are socialized at every stage in .docx
 
Assignment 3 Fraud Techniques Due Week 7 and worth 50 points .docx
Assignment 3 Fraud Techniques Due Week 7 and worth 50 points .docxAssignment 3 Fraud Techniques Due Week 7 and worth 50 points .docx
Assignment 3 Fraud Techniques Due Week 7 and worth 50 points .docx
 
Assignment 3 Exploring Your CulturePart of successfully exploring.docx
Assignment 3 Exploring Your CulturePart of successfully exploring.docxAssignment 3 Exploring Your CulturePart of successfully exploring.docx
Assignment 3 Exploring Your CulturePart of successfully exploring.docx
 
Assignment 3 Exploring Your CulturePart of successfully explo.docx
Assignment 3 Exploring Your CulturePart of successfully explo.docxAssignment 3 Exploring Your CulturePart of successfully explo.docx
Assignment 3 Exploring Your CulturePart of successfully explo.docx
 
Assignment 3 Legal Ethics, Patients’ Rights, and HIV AIDSDue We.docx
Assignment 3 Legal Ethics, Patients’ Rights, and HIV  AIDSDue We.docxAssignment 3 Legal Ethics, Patients’ Rights, and HIV  AIDSDue We.docx
Assignment 3 Legal Ethics, Patients’ Rights, and HIV AIDSDue We.docx
 
Assignment 3 Kotter Change Management ModelDue Week 6Using .docx
Assignment 3 Kotter Change Management ModelDue Week 6Using .docxAssignment 3 Kotter Change Management ModelDue Week 6Using .docx
Assignment 3 Kotter Change Management ModelDue Week 6Using .docx
 

Recently uploaded

Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 

Recently uploaded (20)

INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 

Assignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docx

  • 1. Assignment 4: Designing Compliance within the LAN-to-WAN Domain Note: Review the page requirements and formatting instructions for this assignment closely. Graphically depicted solutions, as well as the standardized formatting requirements, do NOT count toward the overall page length. Imagine you are an Information Systems Security Officer for a medium-sized financial services firm that has operations in four (4) states (Virginia, Florida, Arizona, and California). Due to the highly sensitive data created, stored, and transported by your organization, the CIO is concerned with implementing proper security controls for the LAN-to-WAN domain. Specifically, the CIO is concerned with the following areas: Protecting data privacy across the WAN Filtering undesirable network traffic from the Internet Filtering the traffic to the Internet that does not adhere to the organizational acceptable use policy (AUP) for the Web Having a zone that allows access for anonymous users but aggressively controls information exchange with internal resources Having an area designed to trap attackers in order to monitor attacker activities Allowing a means to monitor network traffic in real time as a means to identify and block unusual activity Hiding internal IP addresses Allowing operating system and application patch management The CIO has tasked you with proposing a series of hardware and software controls designed to provide security for the LAN-to- WAN domain. The CIO anticipates receiving both a written report and diagram(s) to support your recommendations. Write a three to five (3-5) page paper in which you: Use MS Visio or an open source equivalent to graphically depict a solution for the provided scenario that will: filter undesirable network traffic from the Internet
  • 2. filter Web traffic to the Internet that does not adhere to the organizational AUP for the Web allow for a zone for anonymous users but aggressively controls information exchange with internal resources allow for an area designed to trap attackers in order to monitor attacker activities offer a means to monitor network traffic in real time as a means to identify and block unusual activity hide internal IP addresses Identify the fundamentals of public key infrastructure (PKI). Describe the manner in which your solution will protect the privacy of data transmitted across the WAN. Analyze the requirements necessary to allow for proper operating system and application patch management and describe a solution that would be effective. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Note: The graphically depicted solution is not included in the required page length. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. Include charts or diagrams created in Visio or an equivalent such as Dia or OpenOffice. The completed diagrams / charts must be imported into the Word document before the paper is submitted. The specific course learning outcomes associated with this
  • 3. assignment are: Analyze information security systems compliance requirements within the Workstation and LAN Domains. Use technology and information resources to research issues in security strategy and policy formation. Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions. Click here to view the grading rubric. Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric. Points: 130 Assignment 4: Designing Compliance within the LAN-to-WAN Domain Criteria Unacceptable Below 60% F Meets Minimum Expectations 60-69% D Fair 70-79% C Proficient 80-89% B Exemplary 90-100% A 1. Use MS Visio or an open source equivalent to graphically depict a solution for the provided scenario. Weight: 30%
  • 4. Did not submit or incompletely used MS Visio or an open source equivalent to graphically depict a solution for the provided scenario. Insufficiently used MS Visio or an open source equivalent to graphically depict a solution for the provided scenario. Partially used MS Visio or an open source equivalent to graphically depict a solution for the provided scenario. Satisfactorily used MS Visio or an open source equivalent to graphically depict a solution for the provided scenario. Thoroughly used MS Visio or an open source equivalent to graphically depict a solution for the provided scenario. 2. Identify the fundamentals of public key infrastructure (PKI). Weight: 10% Did not submit or incompletely identified the fundamentals of public key infrastructure (PKI). Insufficiently identified the fundamentals of public key infrastructure (PKI). Partially identified the fundamentals of public key infrastructure (PKI). Satisfactorily identified the fundamentals of public key infrastructure (PKI). Thoroughly identified the fundamentals of public key infrastructure (PKI). 3. Describe the manner in which your solution will protect the privacy of data transmitted across the WAN. Weight: 15% Did not submit or incompletely described the manner in which your solution will protect the privacy of data transmitted across the WAN. Insufficiently described the manner in which your solution will protect the privacy of data transmitted across the WAN. Partially described the manner in which your solution will protect the privacy of data transmitted across the WAN. Satisfactorily described the manner in which your solution will protect the privacy of data transmitted across the WAN. Thoroughly described the manner in which your solution will
  • 5. protect the privacy of data transmitted across the WAN. 4. Analyze the requirements necessary to allow for proper operating system and application patch management and describe a solution that would be effective. Weight: 15% Did not submit or incompletely analyzed the requirements necessary to allow for proper operating system and application patch management and did not submit or incompletely described a solution that would be effective. Insufficiently analyzed the requirements necessary to allow for proper operating system and application patch management and insufficiently described a solution that would be effective. Partially analyzed the requirements necessary to allow for proper operating system and application patch management and partially described a solution that would be effective. Satisfactorily analyzed the requirements necessary to allow for proper operating system and application patch management and satisfactorily described a solution that would be effective. Thoroughly analyzed the requirements necessary to allow for proper operating system and application patch management and thoroughly described a solution that would be effective. 5. 3 references Weight: 5% No references provided Does not meet the required number of references; all references poor quality choices. Does not meet the required number of references; some references poor quality choices. Meets number of required references; all references high quality choices. Exceeds number of required references; all references high quality choices. 6. Clarity, writing mechanics, and formatting requirements Weight: 10% More than 8 errors present
  • 6. 7-8 errors present 5-6 errors present 3-4 errors present 0-2 errors present