SlideShare a Scribd company logo
1 of 9
Technical Paper: Risk Assessment
Global Finance, Inc. Network Diagram
Above is the Global Finance, Inc. (GFI) network diagram. GFI
has grown rapidly this past year and acquired many network
devices as displayed in the diagram. The company invested in
the network and designed it to be fault tolerant and resilient
from any network failures. However, although the company’s
financial status has matured and its network has expanded at a
rapid pace, its network security has not kept up with the
company growth.
GFI’s network is fairly stabilized as it has not experienced
many outages due to network failures. GFI has hired three (3)
network engineers to keep up with the network growth and the
bandwidth demand by the company employees and the clients.
However, the company has not hired any security personnel who
can take care of the operational security responsibility.
The trusted computing base (TCB) internal network in the
Global Finance, Inc. Network Diagram hosts the company’s
mission critical systems without which the company’s
operations and financial situation would suffer. The Oracle
database and email systems are among the most intensively used
application servers in the company. GFI cannot afford system
outages because its cash flow and financial systems heavily
depend on the network stability. GFI has experienced DOS
network attacks twice this year and its Oracle database and
email servers had been down for a week. The recovery process
required GFI to use $25,000 to restore its operations back to
normal. GFI estimated the loss from these network attacks at
more than $100,000 including lost customer confidence.
Write a twelve to fifteen (12-15) page formal risk assessment
proposal and redraw the above diagram of a secure and risk-
mitigating model in which you:
1. Describe the company network, interconnection, and
communication environment.
2. Assess risk based on the Global Finance, Inc. Network
Diagram scenario. Note: Your risk assessment should cover all
the necessary details for your client, GFI Inc., to understand the
risk factors of the organization and risk posture of the current
environment. The company management will decide what to
mitigate based on your risk assessment. Your risk assessment
must be comprehensive for the organization to make data-driven
decisions.
a. Describe and defend your assumptions as there is no further
information from this company. The company does not wish to
release any security-related information per company policy.
b. Assess security vulnerabilities, including the possibility of
faulty network design, and recommend mitigation procedures
for each vulnerability.
c. Justify your cryptography recommendations based on data-
driven decision making and objective opinions.
3. Examine whether your risk assessment methodology is
quantitative, qualitative, hybrid, or a combination of these.
4. Use at least three (3) quality resources in this assignment.
Note: Wikipedia and similar Websites do not qualify as quality
resources.
5. Create the redrawn diagram of a secure and risk-mitigating
model using Microsoft Visio or its open source equivalent.
Note: The graphically depicted solution is not included in the
required page length.
Your assignment must follow these formatting requirements:
· Be typed, double spaced, using Times New Roman font (size
12), with one-inch margins on all sides; citations and references
must follow APA or school-specific format. Check with your
professor for any additional instructions.
· Include a cover page containing the title of the assignment, the
student’s name, the professor’s name, the course title, and the
date. The cover page and the reference page are not included in
the required assignment page length.
· Include charts or diagrams created in Excel, Visio, MS
Project, or one of their equivalents such as Open Project, Dia,
and OpenOffice. The completed diagrams/charts must be
imported into the Word document before the paper is submitted.
The specific course learning outcomes associated with this
assignment are:
· Evaluate an organization’s security policies and risk
management procedures, and its ability to provide security
countermeasures.
· Describe the details and the importance of application security
models and their implementation from a management
perspective.
· Analyze the methods of managing, controlling, and mitigating
security risks and vulnerabilities.
· Evaluate and explain from a management perspective the
industry-standard equipment, tools, and technologies
organizations can employ to mitigate risks and thwart both
internal and external attacks.
· Explain access control methods and attacks.
· Use technology and information resources to research issues in
security management.
· Write clearly and concisely about the theories of security
management using proper writing mechanics and technical style
conventions.
Grading for this assignment will be based on answer quality,
logic / organization of the paper, and language and writing
skills, using the following rubric.
Points: 150
Technical Paper: Risk Assessment
Criteria
Unacceptable
Below 70% F
Fair
70-79% C
Proficient
80-89% B
Exemplary
90-100% A
1. Describe the company network, interconnection, and
communication environment.
Weight: 25%
Did not submit or incompletely described the company network,
interconnection, and communication environment.
Partially described the company network, interconnection, and
communication environment.
Satisfactorily described the company network, interconnection,
and communication environment.
Thoroughly described the company network, interconnection,
and communication environment.
2a. Describe and defend your assumptions as there is no further
information from this company.
Weight: 5%
Did not submit or incompletely described and defended your
assumptions as there is no further information from this
company.
Partially described and defended your assumptions as there is
no further information from this company.
Satisfactorily described and defended your assumptions as there
is no further information from this company.
Thoroughly described and defended your assumptions as there is
no further information from this company.
2b. Assess security vulnerabilities, including the possibility of
faulty network design, and recommend mitigation procedures
for each vulnerability.
Weight: 5%
Did not submit or incompletely assessed security
vulnerabilities, including the possibility of faulty network
design; did not submit or incompletely recommended mitigation
procedures for each vulnerability.
Partially assessed security vulnerabilities, including the
possibility of faulty network design; partially recommended
mitigation procedures for each vulnerability.
Satisfactorily assessed security vulnerabilities, including the
possibility of faulty network design; satisfactorily
recommended mitigation procedures for each vulnerability.
Thoroughly assessed security vulnerabilities, including the
possibility of faulty network design; thoroughly recommended
mitigation procedures for each vulnerability.
2c. Justify your cryptography recommendations based on data-
driven decision making and objective opinions.
Weight: 5%
Did not submit or incompletely justified your cryptography
recommendations based on data-driven decision making and
objective opinions.
Partially justified your cryptography recommendations based on
data-driven decision making and objective opinions.
Satisfactorily justified your cryptography recommendations
based on data-driven decision making and objective opinions.
Thoroughly justified your cryptography recommendations based
on data-driven decision making and objective opinions.
3. Examine whether your risk assessment methodology is
quantitative, qualitative, hybrid, or a combination of these.
Weight: 20%
Did not submit or incompletely examined whether your risk
assessment methodology is quantitative, qualitative, hybrid, or a
combination of these.
Partially examined whether your risk assessment methodology
is quantitative, qualitative, hybrid, or a combination of these.
Satisfactorily examined whether your risk assessment
methodology is quantitative, qualitative, hybrid, or a
combination of these.
Thoroughly examined whether your risk assessment
methodology is quantitative, qualitative, hybrid, or a
combination of these.
4. 3 references
Weight: 5%
No references provided
Does not meet the required number of references; some or all
references poor quality choices.
Meets number of required references; all references high quality
choices.
Exceeds number of required references; all references high
quality choices.
5. Clarity, writing mechanics, and formatting requirements
Weight: 10%
More than 6 errors present
5-6 errors present
3-4 errors present
0-2 errors present
6. Create the redrawn diagram of a secure and risk-mitigating
model using Microsoft Visio or its open source equivalent.
Weight: 25%
Did not submit or incompletely created the redrawn diagram of
a secure and risk-mitigating model using Microsoft Visio or its
open source equivalent.
Partially created the redrawn diagram of a secure and risk-
mitigating model using Microsoft Visio or its open source
equivalent.
Satisfactorily created the redrawn diagram of a secure and risk-
mitigating model using Microsoft Visio or its open source
equivalent.
Thoroughly created the redrawn diagram of a secure and risk-
mitigating model using Microsoft Visio or its open source
equivalent.
CIS 502 – Assignments and Rubrics
Remote
Dial UpUsers
Trusted Computing Base Internal Network
Off-Site Office
Internet
Global Finance, Inc.
VPN
Gateway
VPN
Gateway
PBX
PSTN
Worstations
(x25)
Worstations
(x12)
Worstations
(x63)
Worstations
(x5)
Worstations
(x10)
Worstations
(x49)
Border (Core) Routers
Accounting
Loan Dept
Customer
Services
Mgmt
Credit Dept
Finance
Internal
DNS
Exchange
2000 Email
Distribution Routers
DMZ
File and Print Server
Oracle 9i DB
Server
Intranet Web
Server
Printers
(x7)
Printers
(x5)
Printers
(x3)
Printers
(x3)
Printers
(x3)
Printers
(x5)
Workstations
(x7)
SUS Server
Access
Layer
VLAN
Switch
10 Gbps
100Mbps
10Gbps
10Gbps
10 Gbps
OC193
10Gbps
RAS
10 Gbps
10 Gbps
10 Gbps
OC193
10Gbps
PBX
Laptop
Server
Computer
Workstation

More Related Content

Similar to Technical Paper Risk AssessmentGlobal Finance, Inc. Netwo.docx

Cis 558 Exceptional Education-snaptutorial.com
Cis 558 Exceptional Education-snaptutorial.comCis 558 Exceptional Education-snaptutorial.com
Cis 558 Exceptional Education-snaptutorial.comrobertleses9
 
CIS 558 Enhance teaching / snaptutorial.com
CIS 558 Enhance teaching / snaptutorial.comCIS 558 Enhance teaching / snaptutorial.com
CIS 558 Enhance teaching / snaptutorial.comdonaldzs56
 
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and worCase Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and worogglili
 
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and woerm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and woeleanorabarrington
 
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docxTerm Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docxmanningchassidy
 
Ifsm 370 project 2 white paper instructions
Ifsm 370 project 2  white paper instructionsIfsm 370 project 2  white paper instructions
Ifsm 370 project 2 white paper instructionsbestwriter
 
CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
 CMGT 582 STUDY Inspiring Innovation--cmgt582study.com CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
CMGT 582 STUDY Inspiring Innovation--cmgt582study.comKeatonJennings98
 
GAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
GAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docxGAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
GAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docxstarkeykellye
 
Points 140Term PaperRedesigning Security OperationsCriteria.docx
Points 140Term PaperRedesigning Security OperationsCriteria.docxPoints 140Term PaperRedesigning Security OperationsCriteria.docx
Points 140Term PaperRedesigning Security OperationsCriteria.docxharrisonhoward80223
 
CIS 558 Success Begins / snaptutorial.com
CIS 558 Success Begins / snaptutorial.comCIS 558 Success Begins / snaptutorial.com
CIS 558 Success Begins / snaptutorial.comRobinson075
 
Cis 558 Enthusiastic Study / snaptutorial.com
Cis 558 Enthusiastic Study / snaptutorial.comCis 558 Enthusiastic Study / snaptutorial.com
Cis 558 Enthusiastic Study / snaptutorial.comStephenson06
 
Cis 558 Technology levels--snaptutorial.com
Cis 558 Technology levels--snaptutorial.comCis 558 Technology levels--snaptutorial.com
Cis 558 Technology levels--snaptutorial.comsholingarjosh63
 
w-cyber-risk-modeling Owasp cyber risk quantification 2018
w-cyber-risk-modeling Owasp cyber risk quantification 2018w-cyber-risk-modeling Owasp cyber risk quantification 2018
w-cyber-risk-modeling Owasp cyber risk quantification 2018Open Security Summit
 
Project Deliverable 1 Project Plan InceptionDue Week 2 and worth .docx
Project Deliverable 1 Project Plan InceptionDue Week 2 and worth .docxProject Deliverable 1 Project Plan InceptionDue Week 2 and worth .docx
Project Deliverable 1 Project Plan InceptionDue Week 2 and worth .docxbfingarjcmc
 
Project Deliverable 5 Infrastructure and SecurityThis assignm.docx
Project Deliverable 5 Infrastructure and SecurityThis assignm.docxProject Deliverable 5 Infrastructure and SecurityThis assignm.docx
Project Deliverable 5 Infrastructure and SecurityThis assignm.docxwoodruffeloisa
 
Points 200 Term Paper The Rookie Chief Information Security .docx
Points 200 Term Paper The Rookie Chief Information Security .docxPoints 200 Term Paper The Rookie Chief Information Security .docx
Points 200 Term Paper The Rookie Chief Information Security .docxLeilaniPoolsy
 
Running head SECURITY ANALYSIS REPORT1SECURITY ANALYSIS REPO.docx
Running head SECURITY ANALYSIS REPORT1SECURITY ANALYSIS REPO.docxRunning head SECURITY ANALYSIS REPORT1SECURITY ANALYSIS REPO.docx
Running head SECURITY ANALYSIS REPORT1SECURITY ANALYSIS REPO.docxjeanettehully
 
The Rookie Chief Information Security OfficerWorth 200 poi
The Rookie Chief Information Security OfficerWorth 200 poiThe Rookie Chief Information Security OfficerWorth 200 poi
The Rookie Chief Information Security OfficerWorth 200 poijacvzpline
 
Executive Proposal ProjectThe purpose of this project is to evalua.docx
Executive Proposal ProjectThe purpose of this project is to evalua.docxExecutive Proposal ProjectThe purpose of this project is to evalua.docx
Executive Proposal ProjectThe purpose of this project is to evalua.docxrhetttrevannion
 
Note Chapter 5 of the required textbook may be helpful in the com.docx
Note Chapter 5 of the required textbook may be helpful in the com.docxNote Chapter 5 of the required textbook may be helpful in the com.docx
Note Chapter 5 of the required textbook may be helpful in the com.docxIlonaThornburg83
 

Similar to Technical Paper Risk AssessmentGlobal Finance, Inc. Netwo.docx (20)

Cis 558 Exceptional Education-snaptutorial.com
Cis 558 Exceptional Education-snaptutorial.comCis 558 Exceptional Education-snaptutorial.com
Cis 558 Exceptional Education-snaptutorial.com
 
CIS 558 Enhance teaching / snaptutorial.com
CIS 558 Enhance teaching / snaptutorial.comCIS 558 Enhance teaching / snaptutorial.com
CIS 558 Enhance teaching / snaptutorial.com
 
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and worCase Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
 
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and woerm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
 
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docxTerm Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
 
Ifsm 370 project 2 white paper instructions
Ifsm 370 project 2  white paper instructionsIfsm 370 project 2  white paper instructions
Ifsm 370 project 2 white paper instructions
 
CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
 CMGT 582 STUDY Inspiring Innovation--cmgt582study.com CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
 
GAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
GAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docxGAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
GAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
 
Points 140Term PaperRedesigning Security OperationsCriteria.docx
Points 140Term PaperRedesigning Security OperationsCriteria.docxPoints 140Term PaperRedesigning Security OperationsCriteria.docx
Points 140Term PaperRedesigning Security OperationsCriteria.docx
 
CIS 558 Success Begins / snaptutorial.com
CIS 558 Success Begins / snaptutorial.comCIS 558 Success Begins / snaptutorial.com
CIS 558 Success Begins / snaptutorial.com
 
Cis 558 Enthusiastic Study / snaptutorial.com
Cis 558 Enthusiastic Study / snaptutorial.comCis 558 Enthusiastic Study / snaptutorial.com
Cis 558 Enthusiastic Study / snaptutorial.com
 
Cis 558 Technology levels--snaptutorial.com
Cis 558 Technology levels--snaptutorial.comCis 558 Technology levels--snaptutorial.com
Cis 558 Technology levels--snaptutorial.com
 
w-cyber-risk-modeling Owasp cyber risk quantification 2018
w-cyber-risk-modeling Owasp cyber risk quantification 2018w-cyber-risk-modeling Owasp cyber risk quantification 2018
w-cyber-risk-modeling Owasp cyber risk quantification 2018
 
Project Deliverable 1 Project Plan InceptionDue Week 2 and worth .docx
Project Deliverable 1 Project Plan InceptionDue Week 2 and worth .docxProject Deliverable 1 Project Plan InceptionDue Week 2 and worth .docx
Project Deliverable 1 Project Plan InceptionDue Week 2 and worth .docx
 
Project Deliverable 5 Infrastructure and SecurityThis assignm.docx
Project Deliverable 5 Infrastructure and SecurityThis assignm.docxProject Deliverable 5 Infrastructure and SecurityThis assignm.docx
Project Deliverable 5 Infrastructure and SecurityThis assignm.docx
 
Points 200 Term Paper The Rookie Chief Information Security .docx
Points 200 Term Paper The Rookie Chief Information Security .docxPoints 200 Term Paper The Rookie Chief Information Security .docx
Points 200 Term Paper The Rookie Chief Information Security .docx
 
Running head SECURITY ANALYSIS REPORT1SECURITY ANALYSIS REPO.docx
Running head SECURITY ANALYSIS REPORT1SECURITY ANALYSIS REPO.docxRunning head SECURITY ANALYSIS REPORT1SECURITY ANALYSIS REPO.docx
Running head SECURITY ANALYSIS REPORT1SECURITY ANALYSIS REPO.docx
 
The Rookie Chief Information Security OfficerWorth 200 poi
The Rookie Chief Information Security OfficerWorth 200 poiThe Rookie Chief Information Security OfficerWorth 200 poi
The Rookie Chief Information Security OfficerWorth 200 poi
 
Executive Proposal ProjectThe purpose of this project is to evalua.docx
Executive Proposal ProjectThe purpose of this project is to evalua.docxExecutive Proposal ProjectThe purpose of this project is to evalua.docx
Executive Proposal ProjectThe purpose of this project is to evalua.docx
 
Note Chapter 5 of the required textbook may be helpful in the com.docx
Note Chapter 5 of the required textbook may be helpful in the com.docxNote Chapter 5 of the required textbook may be helpful in the com.docx
Note Chapter 5 of the required textbook may be helpful in the com.docx
 

More from mattinsonjanel

The changes required in the IT project plan for Telecomm Ltd would.docx
The changes required in the IT project plan for Telecomm Ltd would.docxThe changes required in the IT project plan for Telecomm Ltd would.docx
The changes required in the IT project plan for Telecomm Ltd would.docxmattinsonjanel
 
The Catholic University of America Metropolitan School of .docx
The Catholic University of America Metropolitan School of .docxThe Catholic University of America Metropolitan School of .docx
The Catholic University of America Metropolitan School of .docxmattinsonjanel
 
The Case of Frank and Judy. During the past few years Frank an.docx
The Case of Frank and Judy. During the past few years Frank an.docxThe Case of Frank and Judy. During the past few years Frank an.docx
The Case of Frank and Judy. During the past few years Frank an.docxmattinsonjanel
 
The Case of MikeChapter 5 • Common Theoretical Counseling Perspe.docx
The Case of MikeChapter 5 • Common Theoretical Counseling Perspe.docxThe Case of MikeChapter 5 • Common Theoretical Counseling Perspe.docx
The Case of MikeChapter 5 • Common Theoretical Counseling Perspe.docxmattinsonjanel
 
THE CHRONICLE OF HIGHER EDUCATIONNovember 8, 2002 -- vol. 49, .docx
THE CHRONICLE OF HIGHER EDUCATIONNovember 8, 2002 -- vol. 49, .docxTHE CHRONICLE OF HIGHER EDUCATIONNovember 8, 2002 -- vol. 49, .docx
THE CHRONICLE OF HIGHER EDUCATIONNovember 8, 2002 -- vol. 49, .docxmattinsonjanel
 
The chart is a guide rather than an absolute – feel free to modify.docx
The chart is a guide rather than an absolute – feel free to modify.docxThe chart is a guide rather than an absolute – feel free to modify.docx
The chart is a guide rather than an absolute – feel free to modify.docxmattinsonjanel
 
The Challenge of Choosing FoodFor this forum, please read http.docx
The Challenge of Choosing FoodFor this forum, please read http.docxThe Challenge of Choosing FoodFor this forum, please read http.docx
The Challenge of Choosing FoodFor this forum, please read http.docxmattinsonjanel
 
The Civil Rights Movem.docx
The Civil Rights Movem.docxThe Civil Rights Movem.docx
The Civil Rights Movem.docxmattinsonjanel
 
The Churchill CentreReturn to Full GraphicsThe Churchi.docx
The Churchill CentreReturn to Full GraphicsThe Churchi.docxThe Churchill CentreReturn to Full GraphicsThe Churchi.docx
The Churchill CentreReturn to Full GraphicsThe Churchi.docxmattinsonjanel
 
The Categorical Imperative (selections taken from The Foundati.docx
The Categorical Imperative (selections taken from The Foundati.docxThe Categorical Imperative (selections taken from The Foundati.docx
The Categorical Imperative (selections taken from The Foundati.docxmattinsonjanel
 
The cave represents how we are trained to think, fell or act accor.docx
The cave represents how we are trained to think, fell or act accor.docxThe cave represents how we are trained to think, fell or act accor.docx
The cave represents how we are trained to think, fell or act accor.docxmattinsonjanel
 
The Case Superior Foods Corporation Faces a ChallengeOn his way.docx
The Case Superior Foods Corporation Faces a ChallengeOn his way.docxThe Case Superior Foods Corporation Faces a ChallengeOn his way.docx
The Case Superior Foods Corporation Faces a ChallengeOn his way.docxmattinsonjanel
 
The Case You can choose to discuss relativism in view of one .docx
The Case You can choose to discuss relativism in view of one .docxThe Case You can choose to discuss relativism in view of one .docx
The Case You can choose to discuss relativism in view of one .docxmattinsonjanel
 
The Case Study of Jim, Week Six The body or text (i.e., not rest.docx
The Case Study of Jim, Week Six The body or text (i.e., not rest.docxThe Case Study of Jim, Week Six The body or text (i.e., not rest.docx
The Case Study of Jim, Week Six The body or text (i.e., not rest.docxmattinsonjanel
 
The Case of Missing Boots Made in ItalyYou can lead a shipper to.docx
The Case of Missing Boots Made in ItalyYou can lead a shipper to.docxThe Case of Missing Boots Made in ItalyYou can lead a shipper to.docx
The Case of Missing Boots Made in ItalyYou can lead a shipper to.docxmattinsonjanel
 
The Cardiovascular SystemNSCI281 Version 51University of .docx
The Cardiovascular SystemNSCI281 Version 51University of .docxThe Cardiovascular SystemNSCI281 Version 51University of .docx
The Cardiovascular SystemNSCI281 Version 51University of .docxmattinsonjanel
 
The Cardiovascular SystemNSCI281 Version 55University of .docx
The Cardiovascular SystemNSCI281 Version 55University of .docxThe Cardiovascular SystemNSCI281 Version 55University of .docx
The Cardiovascular SystemNSCI281 Version 55University of .docxmattinsonjanel
 
The Case of Jeff Pedophile in InstitutionJeff is a 35-year-old .docx
The Case of Jeff Pedophile in InstitutionJeff is a 35-year-old .docxThe Case of Jeff Pedophile in InstitutionJeff is a 35-year-old .docx
The Case of Jeff Pedophile in InstitutionJeff is a 35-year-old .docxmattinsonjanel
 
The British Airways Swipe Card Debacle case study;On Friday, Jul.docx
The British Airways Swipe Card Debacle case study;On Friday, Jul.docxThe British Airways Swipe Card Debacle case study;On Friday, Jul.docx
The British Airways Swipe Card Debacle case study;On Friday, Jul.docxmattinsonjanel
 
The Case Abstract Accuracy International (AI) is a s.docx
The Case  Abstract  Accuracy International (AI) is a s.docxThe Case  Abstract  Accuracy International (AI) is a s.docx
The Case Abstract Accuracy International (AI) is a s.docxmattinsonjanel
 

More from mattinsonjanel (20)

The changes required in the IT project plan for Telecomm Ltd would.docx
The changes required in the IT project plan for Telecomm Ltd would.docxThe changes required in the IT project plan for Telecomm Ltd would.docx
The changes required in the IT project plan for Telecomm Ltd would.docx
 
The Catholic University of America Metropolitan School of .docx
The Catholic University of America Metropolitan School of .docxThe Catholic University of America Metropolitan School of .docx
The Catholic University of America Metropolitan School of .docx
 
The Case of Frank and Judy. During the past few years Frank an.docx
The Case of Frank and Judy. During the past few years Frank an.docxThe Case of Frank and Judy. During the past few years Frank an.docx
The Case of Frank and Judy. During the past few years Frank an.docx
 
The Case of MikeChapter 5 • Common Theoretical Counseling Perspe.docx
The Case of MikeChapter 5 • Common Theoretical Counseling Perspe.docxThe Case of MikeChapter 5 • Common Theoretical Counseling Perspe.docx
The Case of MikeChapter 5 • Common Theoretical Counseling Perspe.docx
 
THE CHRONICLE OF HIGHER EDUCATIONNovember 8, 2002 -- vol. 49, .docx
THE CHRONICLE OF HIGHER EDUCATIONNovember 8, 2002 -- vol. 49, .docxTHE CHRONICLE OF HIGHER EDUCATIONNovember 8, 2002 -- vol. 49, .docx
THE CHRONICLE OF HIGHER EDUCATIONNovember 8, 2002 -- vol. 49, .docx
 
The chart is a guide rather than an absolute – feel free to modify.docx
The chart is a guide rather than an absolute – feel free to modify.docxThe chart is a guide rather than an absolute – feel free to modify.docx
The chart is a guide rather than an absolute – feel free to modify.docx
 
The Challenge of Choosing FoodFor this forum, please read http.docx
The Challenge of Choosing FoodFor this forum, please read http.docxThe Challenge of Choosing FoodFor this forum, please read http.docx
The Challenge of Choosing FoodFor this forum, please read http.docx
 
The Civil Rights Movem.docx
The Civil Rights Movem.docxThe Civil Rights Movem.docx
The Civil Rights Movem.docx
 
The Churchill CentreReturn to Full GraphicsThe Churchi.docx
The Churchill CentreReturn to Full GraphicsThe Churchi.docxThe Churchill CentreReturn to Full GraphicsThe Churchi.docx
The Churchill CentreReturn to Full GraphicsThe Churchi.docx
 
The Categorical Imperative (selections taken from The Foundati.docx
The Categorical Imperative (selections taken from The Foundati.docxThe Categorical Imperative (selections taken from The Foundati.docx
The Categorical Imperative (selections taken from The Foundati.docx
 
The cave represents how we are trained to think, fell or act accor.docx
The cave represents how we are trained to think, fell or act accor.docxThe cave represents how we are trained to think, fell or act accor.docx
The cave represents how we are trained to think, fell or act accor.docx
 
The Case Superior Foods Corporation Faces a ChallengeOn his way.docx
The Case Superior Foods Corporation Faces a ChallengeOn his way.docxThe Case Superior Foods Corporation Faces a ChallengeOn his way.docx
The Case Superior Foods Corporation Faces a ChallengeOn his way.docx
 
The Case You can choose to discuss relativism in view of one .docx
The Case You can choose to discuss relativism in view of one .docxThe Case You can choose to discuss relativism in view of one .docx
The Case You can choose to discuss relativism in view of one .docx
 
The Case Study of Jim, Week Six The body or text (i.e., not rest.docx
The Case Study of Jim, Week Six The body or text (i.e., not rest.docxThe Case Study of Jim, Week Six The body or text (i.e., not rest.docx
The Case Study of Jim, Week Six The body or text (i.e., not rest.docx
 
The Case of Missing Boots Made in ItalyYou can lead a shipper to.docx
The Case of Missing Boots Made in ItalyYou can lead a shipper to.docxThe Case of Missing Boots Made in ItalyYou can lead a shipper to.docx
The Case of Missing Boots Made in ItalyYou can lead a shipper to.docx
 
The Cardiovascular SystemNSCI281 Version 51University of .docx
The Cardiovascular SystemNSCI281 Version 51University of .docxThe Cardiovascular SystemNSCI281 Version 51University of .docx
The Cardiovascular SystemNSCI281 Version 51University of .docx
 
The Cardiovascular SystemNSCI281 Version 55University of .docx
The Cardiovascular SystemNSCI281 Version 55University of .docxThe Cardiovascular SystemNSCI281 Version 55University of .docx
The Cardiovascular SystemNSCI281 Version 55University of .docx
 
The Case of Jeff Pedophile in InstitutionJeff is a 35-year-old .docx
The Case of Jeff Pedophile in InstitutionJeff is a 35-year-old .docxThe Case of Jeff Pedophile in InstitutionJeff is a 35-year-old .docx
The Case of Jeff Pedophile in InstitutionJeff is a 35-year-old .docx
 
The British Airways Swipe Card Debacle case study;On Friday, Jul.docx
The British Airways Swipe Card Debacle case study;On Friday, Jul.docxThe British Airways Swipe Card Debacle case study;On Friday, Jul.docx
The British Airways Swipe Card Debacle case study;On Friday, Jul.docx
 
The Case Abstract Accuracy International (AI) is a s.docx
The Case  Abstract  Accuracy International (AI) is a s.docxThe Case  Abstract  Accuracy International (AI) is a s.docx
The Case Abstract Accuracy International (AI) is a s.docx
 

Recently uploaded

ANTI PARKISON DRUGS.pptx
ANTI         PARKISON          DRUGS.pptxANTI         PARKISON          DRUGS.pptx
ANTI PARKISON DRUGS.pptxPoojaSen20
 
Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesAmanpreetKaur157993
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxAdelaideRefugio
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...Nguyen Thanh Tu Collection
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...EADTU
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...Nguyen Thanh Tu Collection
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...Nguyen Thanh Tu Collection
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....Ritu480198
 
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhĐề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhleson0603
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxLimon Prince
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽中 央社
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital ManagementMBA Assignment Experts
 
Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppCeline George
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxneillewis46
 
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSean M. Fox
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17Celine George
 
MOOD STABLIZERS DRUGS.pptx
MOOD     STABLIZERS           DRUGS.pptxMOOD     STABLIZERS           DRUGS.pptx
MOOD STABLIZERS DRUGS.pptxPoojaSen20
 
male presentation...pdf.................
male presentation...pdf.................male presentation...pdf.................
male presentation...pdf.................MirzaAbrarBaig5
 

Recently uploaded (20)

ANTI PARKISON DRUGS.pptx
ANTI         PARKISON          DRUGS.pptxANTI         PARKISON          DRUGS.pptx
ANTI PARKISON DRUGS.pptx
 
Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategies
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptx
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhĐề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
Supporting Newcomer Multilingual Learners
Supporting Newcomer  Multilingual LearnersSupporting Newcomer  Multilingual Learners
Supporting Newcomer Multilingual Learners
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management
 
Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio App
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptx
 
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17
 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
 
MOOD STABLIZERS DRUGS.pptx
MOOD     STABLIZERS           DRUGS.pptxMOOD     STABLIZERS           DRUGS.pptx
MOOD STABLIZERS DRUGS.pptx
 
male presentation...pdf.................
male presentation...pdf.................male presentation...pdf.................
male presentation...pdf.................
 

Technical Paper Risk AssessmentGlobal Finance, Inc. Netwo.docx

  • 1. Technical Paper: Risk Assessment Global Finance, Inc. Network Diagram Above is the Global Finance, Inc. (GFI) network diagram. GFI has grown rapidly this past year and acquired many network devices as displayed in the diagram. The company invested in the network and designed it to be fault tolerant and resilient from any network failures. However, although the company’s financial status has matured and its network has expanded at a rapid pace, its network security has not kept up with the company growth. GFI’s network is fairly stabilized as it has not experienced many outages due to network failures. GFI has hired three (3) network engineers to keep up with the network growth and the bandwidth demand by the company employees and the clients. However, the company has not hired any security personnel who can take care of the operational security responsibility. The trusted computing base (TCB) internal network in the Global Finance, Inc. Network Diagram hosts the company’s mission critical systems without which the company’s operations and financial situation would suffer. The Oracle database and email systems are among the most intensively used application servers in the company. GFI cannot afford system outages because its cash flow and financial systems heavily depend on the network stability. GFI has experienced DOS network attacks twice this year and its Oracle database and email servers had been down for a week. The recovery process required GFI to use $25,000 to restore its operations back to normal. GFI estimated the loss from these network attacks at more than $100,000 including lost customer confidence.
  • 2. Write a twelve to fifteen (12-15) page formal risk assessment proposal and redraw the above diagram of a secure and risk- mitigating model in which you: 1. Describe the company network, interconnection, and communication environment. 2. Assess risk based on the Global Finance, Inc. Network Diagram scenario. Note: Your risk assessment should cover all the necessary details for your client, GFI Inc., to understand the risk factors of the organization and risk posture of the current environment. The company management will decide what to mitigate based on your risk assessment. Your risk assessment must be comprehensive for the organization to make data-driven decisions. a. Describe and defend your assumptions as there is no further information from this company. The company does not wish to release any security-related information per company policy. b. Assess security vulnerabilities, including the possibility of faulty network design, and recommend mitigation procedures for each vulnerability. c. Justify your cryptography recommendations based on data- driven decision making and objective opinions. 3. Examine whether your risk assessment methodology is quantitative, qualitative, hybrid, or a combination of these. 4. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. 5. Create the redrawn diagram of a secure and risk-mitigating model using Microsoft Visio or its open source equivalent. Note: The graphically depicted solution is not included in the required page length. Your assignment must follow these formatting requirements: · Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your
  • 3. professor for any additional instructions. · Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. · Include charts or diagrams created in Excel, Visio, MS Project, or one of their equivalents such as Open Project, Dia, and OpenOffice. The completed diagrams/charts must be imported into the Word document before the paper is submitted. The specific course learning outcomes associated with this assignment are: · Evaluate an organization’s security policies and risk management procedures, and its ability to provide security countermeasures. · Describe the details and the importance of application security models and their implementation from a management perspective. · Analyze the methods of managing, controlling, and mitigating security risks and vulnerabilities. · Evaluate and explain from a management perspective the industry-standard equipment, tools, and technologies organizations can employ to mitigate risks and thwart both internal and external attacks. · Explain access control methods and attacks. · Use technology and information resources to research issues in security management. · Write clearly and concisely about the theories of security management using proper writing mechanics and technical style conventions. Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric. Points: 150 Technical Paper: Risk Assessment
  • 4. Criteria Unacceptable Below 70% F Fair 70-79% C Proficient 80-89% B Exemplary 90-100% A 1. Describe the company network, interconnection, and communication environment. Weight: 25% Did not submit or incompletely described the company network, interconnection, and communication environment. Partially described the company network, interconnection, and communication environment. Satisfactorily described the company network, interconnection, and communication environment. Thoroughly described the company network, interconnection, and communication environment. 2a. Describe and defend your assumptions as there is no further information from this company. Weight: 5% Did not submit or incompletely described and defended your assumptions as there is no further information from this company. Partially described and defended your assumptions as there is no further information from this company. Satisfactorily described and defended your assumptions as there is no further information from this company. Thoroughly described and defended your assumptions as there is no further information from this company. 2b. Assess security vulnerabilities, including the possibility of faulty network design, and recommend mitigation procedures for each vulnerability. Weight: 5%
  • 5. Did not submit or incompletely assessed security vulnerabilities, including the possibility of faulty network design; did not submit or incompletely recommended mitigation procedures for each vulnerability. Partially assessed security vulnerabilities, including the possibility of faulty network design; partially recommended mitigation procedures for each vulnerability. Satisfactorily assessed security vulnerabilities, including the possibility of faulty network design; satisfactorily recommended mitigation procedures for each vulnerability. Thoroughly assessed security vulnerabilities, including the possibility of faulty network design; thoroughly recommended mitigation procedures for each vulnerability. 2c. Justify your cryptography recommendations based on data- driven decision making and objective opinions. Weight: 5% Did not submit or incompletely justified your cryptography recommendations based on data-driven decision making and objective opinions. Partially justified your cryptography recommendations based on data-driven decision making and objective opinions. Satisfactorily justified your cryptography recommendations based on data-driven decision making and objective opinions. Thoroughly justified your cryptography recommendations based on data-driven decision making and objective opinions. 3. Examine whether your risk assessment methodology is quantitative, qualitative, hybrid, or a combination of these. Weight: 20% Did not submit or incompletely examined whether your risk assessment methodology is quantitative, qualitative, hybrid, or a combination of these. Partially examined whether your risk assessment methodology is quantitative, qualitative, hybrid, or a combination of these. Satisfactorily examined whether your risk assessment methodology is quantitative, qualitative, hybrid, or a combination of these.
  • 6. Thoroughly examined whether your risk assessment methodology is quantitative, qualitative, hybrid, or a combination of these. 4. 3 references Weight: 5% No references provided Does not meet the required number of references; some or all references poor quality choices. Meets number of required references; all references high quality choices. Exceeds number of required references; all references high quality choices. 5. Clarity, writing mechanics, and formatting requirements Weight: 10% More than 6 errors present 5-6 errors present 3-4 errors present 0-2 errors present 6. Create the redrawn diagram of a secure and risk-mitigating model using Microsoft Visio or its open source equivalent. Weight: 25% Did not submit or incompletely created the redrawn diagram of a secure and risk-mitigating model using Microsoft Visio or its open source equivalent. Partially created the redrawn diagram of a secure and risk- mitigating model using Microsoft Visio or its open source equivalent. Satisfactorily created the redrawn diagram of a secure and risk- mitigating model using Microsoft Visio or its open source equivalent. Thoroughly created the redrawn diagram of a secure and risk- mitigating model using Microsoft Visio or its open source equivalent. CIS 502 – Assignments and Rubrics
  • 7. Remote Dial UpUsers Trusted Computing Base Internal Network Off-Site Office Internet Global Finance, Inc. VPN Gateway VPN Gateway PBX PSTN Worstations (x25) Worstations (x12) Worstations (x63) Worstations (x5) Worstations (x10) Worstations (x49) Border (Core) Routers Accounting Loan Dept Customer Services Mgmt Credit Dept Finance Internal DNS
  • 8. Exchange 2000 Email Distribution Routers DMZ File and Print Server Oracle 9i DB Server Intranet Web Server Printers (x7) Printers (x5) Printers (x3) Printers (x3) Printers (x3) Printers (x5) Workstations (x7) SUS Server Access Layer VLAN Switch 10 Gbps 100Mbps 10Gbps 10Gbps 10 Gbps OC193 10Gbps RAS
  • 9. 10 Gbps 10 Gbps 10 Gbps OC193 10Gbps PBX Laptop Server Computer Workstation