No plagiarized work. I need 8 to 9 page paper analyzing the security weaknesses within the company listed below. Two weaknesses within the existing company must be analyzed – hardware, software, or the existing security policy not to include the password policy. The two items (hardware, software, or policy ) must be identified as an item that requires security.
To clarify an item that requires improved security, you must identify one of these items:
· one hardware and one software weakness
· one hardware and one policy weakness
· one software and one policy weakness
It must be in APA format and the Quality Web Design organization listed below is the Project Company Overview / Scenario.
6 Cited and verifiable resources are needed. Scholarly articles or sources I can gain access to are a must.
The paper is due November 4th, 2014. I will pay $75 for QUALITY and on-time delivery.
Suggested Reference – Security in Computing – Charles P. Pfleeger and Shari Lawrence Pfleeger
Company Overview
Quality Web Design (QWD) is an organization that specializes in Web site and Web content design for all types of businesses. QWD's mission is to provide top quality Web design that will increase consumer generated revenue to QWD's customer Web sites. QWD's database contains over 250,000 proprietary images and graphical designs that will enhance most Web site's appeal to a target demographic.
Business Processes
Quality Web Design has several mission critical business processes. First is the use of the repository of Web site templates, custom written scripts and/or custom applications. This repository is stored in a Microsoft Visual Studio Team Foundation Service (TFS) server. This application is used to monitor the project development lifecycle of custom Visual Studio applications from inception to deployment, including the quality assurance testing phase. Other critical business processes are QWD's accounting, payroll and Marketing operations all of which are supported by IT assets. There are strict technology-based access controls associated with each of these systems to ensure that only authorized personnel can access them.
Digital Assets
These are shown in the network diagrams below
WAN
· (2) T1 Frame Relay circuits connected to the Internet.
· ISP controlled Internet routers
· Corporate Firewall Model: Juniper ISG2000 integrated Firewall, VPN, and Intrusion Detection and Prevention system. Remote office firewall is a Juniper SSG140.
· L2TP/IPSec VPN tunnel between the corporate firewall and the office firewall to allow for secure data flow.
Corporate Office
· Internal LAN switch is an HP 5400zl series with 147 ports with 10/100/1000 GB connectivity.
· (2) HP ProCurve MSM410 Access Point US wireless access points.
· Microsoft TFS code repository consists of 1 Web server, 1 application server, and 1 database code repository.
· Web server includes, Microsoft Share Point portal for department document and Web sites. Corporate intr.
No plagiarized work. I need 8 to 9 page paper analyzing the.docx
1. No plagiarized work. I need 8 to 9 page paper analyzing the
security weaknesses within the company listed below. Two
weaknesses within the existing company must be analyzed –
hardware, software, or the existing security policy not to
include the password policy. The two items (hardware,
software, or policy ) must be identified as an item that requires
security.
To clarify an item that requires improved security, you must
identify one of these items:
· one hardware and one software weakness
· one hardware and one policy weakness
· one software and one policy weakness
It must be in APA format and the Quality Web Design
organization listed below is the Project Company Overview /
Scenario.
6 Cited and verifiable resources are needed. Scholarly articles
or sources I can gain access to are a must.
The paper is due November 4th, 2014. I will pay $75 for
QUALITY and on-time delivery.
Suggested Reference – Security in Computing – Charles P.
Pfleeger and Shari Lawrence Pfleeger
Company Overview
Quality Web Design (QWD) is an organization that specializes
in Web site and Web content design for all types of
businesses. QWD's mission is to provide top quality Web
design that will increase consumer generated revenue to QWD's
customer Web sites. QWD's database contains over 250,000
proprietary images and graphical designs that will enhance most
2. Web site's appeal to a target demographic.
Business Processes
Quality Web Design has several mission critical business
processes. First is the use of the repository of Web site
templates, custom written scripts and/or custom applications.
This repository is stored in a Microsoft Visual Studio Team
Foundation Service (TFS) server. This application is used to
monitor the project development lifecycle of custom Visual
Studio applications from inception to deployment, including the
quality assurance testing phase. Other critical business
processes are QWD's accounting, payroll and Marketing
operations all of which are supported by IT assets. There are
strict technology-based access controls associated with each of
these systems to ensure that only authorized personnel can
access them.
Digital Assets
These are shown in the network diagrams below
WAN
· (2) T1 Frame Relay circuits connected to the Internet.
· ISP controlled Internet routers
· Corporate Firewall Model: Juniper ISG2000 integrated
Firewall, VPN, and Intrusion Detection and Prevention system.
Remote office firewall is a Juniper SSG140.
· L2TP/IPSec VPN tunnel between the corporate firewall and
the office firewall to allow for secure data flow.
Corporate Office
· Internal LAN switch is an HP 5400zl series with 147 ports
with 10/100/1000 GB connectivity.
· (2) HP ProCurve MSM410 Access Point US wireless access
points.
· Microsoft TFS code repository consists of 1 Web server, 1
application server, and 1 database code repository.
· Web server includes, Microsoft Share Point portal for
department document and Web sites. Corporate intranet site.
· Microsoft SQL 2008 Database server used for storage of
custom designed graphics and custom application image control
3. system.
· File and Print server services.
· Microsoft Exchange 2007 email servers, include (2) Client
Access (CAS) and Hub Transport (HT) Servers, 1 backend
mailbox servers.
· HP Storage Works SAN with 6 TB disk space.
· (2) Microsoft Windows 2008 domain controllers.
· Approximately 50 user computers, 35 laptops and 15 desktops.
· (4) network printers
· (30) Mobile devices, IPhones, and Windows Mobile 6 devices.
Remote Office:
· HP ProCurve Switch 3500yl-48G0PWR intelligent Edge. This
is a 48 10/100/1000 GB port intelligent switch.
· (2) HP ProCurve MSM410 Access Point US wireless access
points.
· Microsoft TFS code repository, consists of 1 Web server, 1
application server that connects to the database server in the
corporate office through the IPSec tunnel.
· (2) Microsoft Windows 2008 domain controllers.
· File and Print server services.
· Approximately 20 user computers, 15 laptops and 5 desktops.
· (2) Network printers
· (15) Mobile devices consisting of IPhones, and Windows
Mobile 6 devices.
Externally Published Services
Corporate and remote offices have the following services that
are accessible for employees. From corporate owned computer
or mobile device employees can access VPN, Outlook Web
Access for email, or Active Sync for Exchange server. On any
computer in the world employees can access Outlook Web
Access for email. Customers are only allowed to access to the
Corporate Web site.
Security Controls
There is a published corporate security manual that covers the
4. following security practices. Username standard including
having a separate account for any elevated privileges. Password
length, complexity, rotation and history requirements. Data
classification levels depend upon what type of data each system
contains and security group accounts control access to each data
classification level. Security training is also describe and
required communications quarterly and annual training classes.
SEE THE PROJECT EXAMPLE BELOW FOR A SUGGESTED
FORMAT
Course Project Format Example
5. Table of Contents
Executive Summary1
Company Overview1
Security Vulnerabilities3
A Hardware Example Title3
A Software Example Title4
Recommended
Solution
s5
A Hardware Example