SlideShare a Scribd company logo
1 of 3
Assignment 4: Designing Compliance within the LAN-to-WAN
Domain
Due Week 8 and worth 130 points
Note:
Review the page requirements and formatting instructions for
this assignment closely. Graphically depicted solutions, as well
as the standardized formatting requirements, do NOT count
toward the overall page length.
Imagine you are an Information Systems Security Officer for a
medium-sized financial services firm that has operations in four
(4) states (Virginia, Florida, Arizona, and California). Due to
the highly sensitive data created, stored, and transported by
your organization, the CIO is concerned with implementing
proper security controls for the LAN-to-WAN domain.
Specifically, the CIO is concerned with the following areas:
Protecting data privacy across the WAN
Filtering undesirable network traffic from the Internet
Filtering the traffic to the Internet that does not adhere to the
organizational acceptable use policy (AUP) for the Web
Having a zone that allows access for anonymous users but
aggressively controls information exchange with internal
resources
Having an area designed to trap attackers in order to monitor
attacker activities
Allowing a means to monitor network traffic in real time as a
means to identify and block unusual activity
Hiding internal IP addresses
Allowing operating system and application patch management
The CIO has tasked you with proposing a series of hardware and
software controls designed to provide security for the LAN-to-
WAN domain. The CIO anticipates receiving both a written
report and diagram(s) to support your recommendations.
Write a three page paper in which you:
Use MS Visio or an open source equivalent to graphically depict
a solution for the provided scenario that will:
filter undesirable network traffic from the Internet
filter Web traffic to the Internet that does not adhere to the
organizational AUP for the Web
allow for a zone for anonymous users but aggressively controls
information exchange with internal resources
allow for an area designed to trap attackers in order to monitor
attacker activities
offer a means to monitor network traffic in real time as a means
to identify and block unusual activity
hide internal IP addresses
Identify the fundamentals of public key infrastructure (PKI).
Describe the manner in which your solution will protect the
privacy of data transmitted across the WAN.
Analyze the requirements necessary to allow for proper
operating system and application patch management and
describe a solution that would be effective.
Use at least three (3) quality resources in this assignment.
Note:
Wikipedia and similar Websites do not qualify as quality
resources.
Note:
The graphically depicted solution is not included in the
required page length.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size
12), with one-inch margins on all sides; citations and references
must follow APA or school-specific format. Check with your
professor for any additional instructions.
Include a cover page containing the title of the assignment, the
student’s name, the professor’s name, the course title, and the
date. The cover page and the reference page are not included in
the required assignment page length.
Include charts or diagrams created in Visio or an equivalent
such as Dia or OpenOffice. The completed diagrams / charts
must be imported into the Word document before the paper is
submitted.
The specific course learning outcomes associated with this
assignment are:
Analyze information security systems compliance requirements
within the Workstation and LAN Domains.
Use technology and information resources to research issues in
security strategy and policy formation.
Write clearly and concisely about topics related to information
technology audit and control using proper writing mechanics
and technical style conventions.

More Related Content

Similar to Designing LAN-WAN Compliance (130pts

Assignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docx
Assignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docxAssignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docx
Assignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docxdanielfoster65629
 
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domainUop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domainuopassignment
 
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domainUop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domaineyavagal
 
Assignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docxAssignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docxastonrenna
 
Imagine you are an Information Systems Security Officer for a me.docx
Imagine you are an Information Systems Security Officer for a me.docxImagine you are an Information Systems Security Officer for a me.docx
Imagine you are an Information Systems Security Officer for a me.docxterirasco
 
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docxAssignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docxcarlibradley31429
 
GAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
GAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docxGAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
GAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docxstarkeykellye
 
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and worCase Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and worogglili
 
The infrastructure which encompasses the network solution and securi.docx
The infrastructure which encompasses the network solution and securi.docxThe infrastructure which encompasses the network solution and securi.docx
The infrastructure which encompasses the network solution and securi.docxkailynochseu
 
The infrastructure which encompasses the network solution and se.docx
The infrastructure which encompasses the network solution and se.docxThe infrastructure which encompasses the network solution and se.docx
The infrastructure which encompasses the network solution and se.docxlaurieellan
 
Imagine you are an Information Systems Security Officer for a medium.pdf
Imagine you are an Information Systems Security Officer for a medium.pdfImagine you are an Information Systems Security Officer for a medium.pdf
Imagine you are an Information Systems Security Officer for a medium.pdfarccreation001
 
CIS 341 Success Begins / snaptutorial.com
CIS 341 Success Begins / snaptutorial.comCIS 341 Success Begins / snaptutorial.com
CIS 341 Success Begins / snaptutorial.comRobinson070
 
Cis 341 Technology levels--snaptutorial.com
Cis 341 Technology levels--snaptutorial.comCis 341 Technology levels--snaptutorial.com
Cis 341 Technology levels--snaptutorial.comsholingarjosh56
 
Cis 341 Enthusiastic Study - snaptutorial.com
Cis 341 Enthusiastic Study - snaptutorial.comCis 341 Enthusiastic Study - snaptutorial.com
Cis 341 Enthusiastic Study - snaptutorial.comGeorgeDixon100
 
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docxTerm Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docxmanningchassidy
 
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...shyaminfo30
 
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and woerm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and woeleanorabarrington
 
The infrastructure which encompasses the network solution and securi.docx
The infrastructure which encompasses the network solution and securi.docxThe infrastructure which encompasses the network solution and securi.docx
The infrastructure which encompasses the network solution and securi.docxjmindy
 
Strayer cis-417-week-8-assignment-4-data
Strayer cis-417-week-8-assignment-4-dataStrayer cis-417-week-8-assignment-4-data
Strayer cis-417-week-8-assignment-4-datainfinityend3
 
Assignment InstructionsInstructionsNote A 15 or less origi.docx
Assignment InstructionsInstructionsNote A 15  or less origi.docxAssignment InstructionsInstructionsNote A 15  or less origi.docx
Assignment InstructionsInstructionsNote A 15 or less origi.docxAMMY30
 

Similar to Designing LAN-WAN Compliance (130pts (20)

Assignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docx
Assignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docxAssignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docx
Assignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docx
 
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domainUop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
 
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domainUop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
 
Assignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docxAssignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docx
 
Imagine you are an Information Systems Security Officer for a me.docx
Imagine you are an Information Systems Security Officer for a me.docxImagine you are an Information Systems Security Officer for a me.docx
Imagine you are an Information Systems Security Officer for a me.docx
 
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docxAssignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
 
GAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
GAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docxGAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
GAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
 
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and worCase Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
 
The infrastructure which encompasses the network solution and securi.docx
The infrastructure which encompasses the network solution and securi.docxThe infrastructure which encompasses the network solution and securi.docx
The infrastructure which encompasses the network solution and securi.docx
 
The infrastructure which encompasses the network solution and se.docx
The infrastructure which encompasses the network solution and se.docxThe infrastructure which encompasses the network solution and se.docx
The infrastructure which encompasses the network solution and se.docx
 
Imagine you are an Information Systems Security Officer for a medium.pdf
Imagine you are an Information Systems Security Officer for a medium.pdfImagine you are an Information Systems Security Officer for a medium.pdf
Imagine you are an Information Systems Security Officer for a medium.pdf
 
CIS 341 Success Begins / snaptutorial.com
CIS 341 Success Begins / snaptutorial.comCIS 341 Success Begins / snaptutorial.com
CIS 341 Success Begins / snaptutorial.com
 
Cis 341 Technology levels--snaptutorial.com
Cis 341 Technology levels--snaptutorial.comCis 341 Technology levels--snaptutorial.com
Cis 341 Technology levels--snaptutorial.com
 
Cis 341 Enthusiastic Study - snaptutorial.com
Cis 341 Enthusiastic Study - snaptutorial.comCis 341 Enthusiastic Study - snaptutorial.com
Cis 341 Enthusiastic Study - snaptutorial.com
 
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docxTerm Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
 
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...
 
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and woerm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
 
The infrastructure which encompasses the network solution and securi.docx
The infrastructure which encompasses the network solution and securi.docxThe infrastructure which encompasses the network solution and securi.docx
The infrastructure which encompasses the network solution and securi.docx
 
Strayer cis-417-week-8-assignment-4-data
Strayer cis-417-week-8-assignment-4-dataStrayer cis-417-week-8-assignment-4-data
Strayer cis-417-week-8-assignment-4-data
 
Assignment InstructionsInstructionsNote A 15 or less origi.docx
Assignment InstructionsInstructionsNote A 15  or less origi.docxAssignment InstructionsInstructionsNote A 15  or less origi.docx
Assignment InstructionsInstructionsNote A 15 or less origi.docx
 

More from eleanorabarrington

Employment in U.S.To be employed in the U.S., you must complet.docx
Employment in U.S.To be employed in the U.S., you must complet.docxEmployment in U.S.To be employed in the U.S., you must complet.docx
Employment in U.S.To be employed in the U.S., you must complet.docxeleanorabarrington
 
Employee Training and Career Development PaperWrite a 1,05.docx
Employee Training and Career Development PaperWrite a 1,05.docxEmployee Training and Career Development PaperWrite a 1,05.docx
Employee Training and Career Development PaperWrite a 1,05.docxeleanorabarrington
 
Employment-At-Will DoctrineImagine you are a recently-hired .docx
Employment-At-Will DoctrineImagine you are a recently-hired .docxEmployment-At-Will DoctrineImagine you are a recently-hired .docx
Employment-At-Will DoctrineImagine you are a recently-hired .docxeleanorabarrington
 
Employee Selection Please respond to the followingCompare and c.docx
Employee Selection Please respond to the followingCompare and c.docxEmployee Selection Please respond to the followingCompare and c.docx
Employee Selection Please respond to the followingCompare and c.docxeleanorabarrington
 
Emerging nations are generally defined as those countries working to.docx
Emerging nations are generally defined as those countries working to.docxEmerging nations are generally defined as those countries working to.docx
Emerging nations are generally defined as those countries working to.docxeleanorabarrington
 
Emerging Adulthood and CultureDueJul 12, 1000 PM  CST.docx
Emerging Adulthood and CultureDueJul 12, 1000 PM  CST.docxEmerging Adulthood and CultureDueJul 12, 1000 PM  CST.docx
Emerging Adulthood and CultureDueJul 12, 1000 PM  CST.docxeleanorabarrington
 
Eli Lily Case Questions(1page total will be fine)case see attach.docx
Eli Lily Case Questions(1page total will be fine)case see attach.docxEli Lily Case Questions(1page total will be fine)case see attach.docx
Eli Lily Case Questions(1page total will be fine)case see attach.docxeleanorabarrington
 
Encryption in Investigations  Please respond to the following.docx
Encryption in Investigations  Please respond to the following.docxEncryption in Investigations  Please respond to the following.docx
Encryption in Investigations  Please respond to the following.docxeleanorabarrington
 
Emerging Trends in Logistics and Supply Chain Management10 pag.docx
Emerging Trends in Logistics and Supply Chain Management10 pag.docxEmerging Trends in Logistics and Supply Chain Management10 pag.docx
Emerging Trends in Logistics and Supply Chain Management10 pag.docxeleanorabarrington
 
EN102 Sum15Paper Two ImagesPictures of Significance and What We .docx
EN102 Sum15Paper Two ImagesPictures of Significance and What We .docxEN102 Sum15Paper Two ImagesPictures of Significance and What We .docx
EN102 Sum15Paper Two ImagesPictures of Significance and What We .docxeleanorabarrington
 
Ellas father, Frederic has Parkinson disease known as Shaky Grandp.docx
Ellas father, Frederic has Parkinson disease known as Shaky Grandp.docxEllas father, Frederic has Parkinson disease known as Shaky Grandp.docx
Ellas father, Frederic has Parkinson disease known as Shaky Grandp.docxeleanorabarrington
 
ELL Placement Assessments Interview the ELL instructor that you ob.docx
ELL Placement Assessments Interview the ELL instructor that you ob.docxELL Placement Assessments Interview the ELL instructor that you ob.docx
ELL Placement Assessments Interview the ELL instructor that you ob.docxeleanorabarrington
 
eliverable Length1,000–1,250 wordsDetailsWeekly tasks or ass.docx
eliverable Length1,000–1,250 wordsDetailsWeekly tasks or ass.docxeliverable Length1,000–1,250 wordsDetailsWeekly tasks or ass.docx
eliverable Length1,000–1,250 wordsDetailsWeekly tasks or ass.docxeleanorabarrington
 
Elements of Projects  Please respond to the followingRese.docx
Elements of Projects  Please respond to the followingRese.docxElements of Projects  Please respond to the followingRese.docx
Elements of Projects  Please respond to the followingRese.docxeleanorabarrington
 
Emotional IntelligencePerform an internet search on emotional inte.docx
Emotional IntelligencePerform an internet search on emotional inte.docxEmotional IntelligencePerform an internet search on emotional inte.docx
Emotional IntelligencePerform an internet search on emotional inte.docxeleanorabarrington
 
Employee satisfaction is the product of many factors, some directly .docx
Employee satisfaction is the product of many factors, some directly .docxEmployee satisfaction is the product of many factors, some directly .docx
Employee satisfaction is the product of many factors, some directly .docxeleanorabarrington
 
Emily is an 18-month-old toddler developing typically. She attends.docx
Emily is an 18-month-old toddler developing typically. She attends.docxEmily is an 18-month-old toddler developing typically. She attends.docx
Emily is an 18-month-old toddler developing typically. She attends.docxeleanorabarrington
 
Assignment 4 Contemporary Issues in Modern Police Operations and .docx
Assignment 4 Contemporary Issues in Modern Police Operations and .docxAssignment 4 Contemporary Issues in Modern Police Operations and .docx
Assignment 4 Contemporary Issues in Modern Police Operations and .docxeleanorabarrington
 
Assignment 4 Communication MethodsChoose five (5) different commu.docx
Assignment 4 Communication MethodsChoose five (5) different commu.docxAssignment 4 Communication MethodsChoose five (5) different commu.docx
Assignment 4 Communication MethodsChoose five (5) different commu.docxeleanorabarrington
 
Assignment 4 PresentationChoose any federal statute that is cur.docx
Assignment 4 PresentationChoose any federal statute that is cur.docxAssignment 4 PresentationChoose any federal statute that is cur.docx
Assignment 4 PresentationChoose any federal statute that is cur.docxeleanorabarrington
 

More from eleanorabarrington (20)

Employment in U.S.To be employed in the U.S., you must complet.docx
Employment in U.S.To be employed in the U.S., you must complet.docxEmployment in U.S.To be employed in the U.S., you must complet.docx
Employment in U.S.To be employed in the U.S., you must complet.docx
 
Employee Training and Career Development PaperWrite a 1,05.docx
Employee Training and Career Development PaperWrite a 1,05.docxEmployee Training and Career Development PaperWrite a 1,05.docx
Employee Training and Career Development PaperWrite a 1,05.docx
 
Employment-At-Will DoctrineImagine you are a recently-hired .docx
Employment-At-Will DoctrineImagine you are a recently-hired .docxEmployment-At-Will DoctrineImagine you are a recently-hired .docx
Employment-At-Will DoctrineImagine you are a recently-hired .docx
 
Employee Selection Please respond to the followingCompare and c.docx
Employee Selection Please respond to the followingCompare and c.docxEmployee Selection Please respond to the followingCompare and c.docx
Employee Selection Please respond to the followingCompare and c.docx
 
Emerging nations are generally defined as those countries working to.docx
Emerging nations are generally defined as those countries working to.docxEmerging nations are generally defined as those countries working to.docx
Emerging nations are generally defined as those countries working to.docx
 
Emerging Adulthood and CultureDueJul 12, 1000 PM  CST.docx
Emerging Adulthood and CultureDueJul 12, 1000 PM  CST.docxEmerging Adulthood and CultureDueJul 12, 1000 PM  CST.docx
Emerging Adulthood and CultureDueJul 12, 1000 PM  CST.docx
 
Eli Lily Case Questions(1page total will be fine)case see attach.docx
Eli Lily Case Questions(1page total will be fine)case see attach.docxEli Lily Case Questions(1page total will be fine)case see attach.docx
Eli Lily Case Questions(1page total will be fine)case see attach.docx
 
Encryption in Investigations  Please respond to the following.docx
Encryption in Investigations  Please respond to the following.docxEncryption in Investigations  Please respond to the following.docx
Encryption in Investigations  Please respond to the following.docx
 
Emerging Trends in Logistics and Supply Chain Management10 pag.docx
Emerging Trends in Logistics and Supply Chain Management10 pag.docxEmerging Trends in Logistics and Supply Chain Management10 pag.docx
Emerging Trends in Logistics and Supply Chain Management10 pag.docx
 
EN102 Sum15Paper Two ImagesPictures of Significance and What We .docx
EN102 Sum15Paper Two ImagesPictures of Significance and What We .docxEN102 Sum15Paper Two ImagesPictures of Significance and What We .docx
EN102 Sum15Paper Two ImagesPictures of Significance and What We .docx
 
Ellas father, Frederic has Parkinson disease known as Shaky Grandp.docx
Ellas father, Frederic has Parkinson disease known as Shaky Grandp.docxEllas father, Frederic has Parkinson disease known as Shaky Grandp.docx
Ellas father, Frederic has Parkinson disease known as Shaky Grandp.docx
 
ELL Placement Assessments Interview the ELL instructor that you ob.docx
ELL Placement Assessments Interview the ELL instructor that you ob.docxELL Placement Assessments Interview the ELL instructor that you ob.docx
ELL Placement Assessments Interview the ELL instructor that you ob.docx
 
eliverable Length1,000–1,250 wordsDetailsWeekly tasks or ass.docx
eliverable Length1,000–1,250 wordsDetailsWeekly tasks or ass.docxeliverable Length1,000–1,250 wordsDetailsWeekly tasks or ass.docx
eliverable Length1,000–1,250 wordsDetailsWeekly tasks or ass.docx
 
Elements of Projects  Please respond to the followingRese.docx
Elements of Projects  Please respond to the followingRese.docxElements of Projects  Please respond to the followingRese.docx
Elements of Projects  Please respond to the followingRese.docx
 
Emotional IntelligencePerform an internet search on emotional inte.docx
Emotional IntelligencePerform an internet search on emotional inte.docxEmotional IntelligencePerform an internet search on emotional inte.docx
Emotional IntelligencePerform an internet search on emotional inte.docx
 
Employee satisfaction is the product of many factors, some directly .docx
Employee satisfaction is the product of many factors, some directly .docxEmployee satisfaction is the product of many factors, some directly .docx
Employee satisfaction is the product of many factors, some directly .docx
 
Emily is an 18-month-old toddler developing typically. She attends.docx
Emily is an 18-month-old toddler developing typically. She attends.docxEmily is an 18-month-old toddler developing typically. She attends.docx
Emily is an 18-month-old toddler developing typically. She attends.docx
 
Assignment 4 Contemporary Issues in Modern Police Operations and .docx
Assignment 4 Contemporary Issues in Modern Police Operations and .docxAssignment 4 Contemporary Issues in Modern Police Operations and .docx
Assignment 4 Contemporary Issues in Modern Police Operations and .docx
 
Assignment 4 Communication MethodsChoose five (5) different commu.docx
Assignment 4 Communication MethodsChoose five (5) different commu.docxAssignment 4 Communication MethodsChoose five (5) different commu.docx
Assignment 4 Communication MethodsChoose five (5) different commu.docx
 
Assignment 4 PresentationChoose any federal statute that is cur.docx
Assignment 4 PresentationChoose any federal statute that is cur.docxAssignment 4 PresentationChoose any federal statute that is cur.docx
Assignment 4 PresentationChoose any federal statute that is cur.docx
 

Recently uploaded

Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 

Recently uploaded (20)

Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 

Designing LAN-WAN Compliance (130pts

  • 1. Assignment 4: Designing Compliance within the LAN-to-WAN Domain Due Week 8 and worth 130 points Note: Review the page requirements and formatting instructions for this assignment closely. Graphically depicted solutions, as well as the standardized formatting requirements, do NOT count toward the overall page length. Imagine you are an Information Systems Security Officer for a medium-sized financial services firm that has operations in four (4) states (Virginia, Florida, Arizona, and California). Due to the highly sensitive data created, stored, and transported by your organization, the CIO is concerned with implementing proper security controls for the LAN-to-WAN domain. Specifically, the CIO is concerned with the following areas: Protecting data privacy across the WAN Filtering undesirable network traffic from the Internet Filtering the traffic to the Internet that does not adhere to the organizational acceptable use policy (AUP) for the Web Having a zone that allows access for anonymous users but aggressively controls information exchange with internal resources Having an area designed to trap attackers in order to monitor attacker activities Allowing a means to monitor network traffic in real time as a means to identify and block unusual activity Hiding internal IP addresses Allowing operating system and application patch management The CIO has tasked you with proposing a series of hardware and software controls designed to provide security for the LAN-to- WAN domain. The CIO anticipates receiving both a written report and diagram(s) to support your recommendations. Write a three page paper in which you: Use MS Visio or an open source equivalent to graphically depict a solution for the provided scenario that will:
  • 2. filter undesirable network traffic from the Internet filter Web traffic to the Internet that does not adhere to the organizational AUP for the Web allow for a zone for anonymous users but aggressively controls information exchange with internal resources allow for an area designed to trap attackers in order to monitor attacker activities offer a means to monitor network traffic in real time as a means to identify and block unusual activity hide internal IP addresses Identify the fundamentals of public key infrastructure (PKI). Describe the manner in which your solution will protect the privacy of data transmitted across the WAN. Analyze the requirements necessary to allow for proper operating system and application patch management and describe a solution that would be effective. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Note: The graphically depicted solution is not included in the required page length. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. Include charts or diagrams created in Visio or an equivalent such as Dia or OpenOffice. The completed diagrams / charts must be imported into the Word document before the paper is submitted.
  • 3. The specific course learning outcomes associated with this assignment are: Analyze information security systems compliance requirements within the Workstation and LAN Domains. Use technology and information resources to research issues in security strategy and policy formation. Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions.