SlideShare a Scribd company logo
1 of 4
Note:
Review the page requirements and formatting instructions for
this assignment closely. Graphically depicted solutions, as well
as the standardized formatting requirements, do NOT count
toward the overall page length.
Imagine you are an Information Systems Security Officer for a
medium-sized financial services firm that has operations in
four (4) states (Virginia, Florida, Arizona, and California). Due
to the highly sensitive data created, stored, and transported by
your organization, the CIO is concerned with implementing
proper security controls for the LAN-to-WAN domain.
Specifically, the CIO is concerned with the following areas:
Protecting data privacy across the WAN
Filtering undesirable network traffic from the Internet
Filtering the traffic to the Internet that does not adhere to the
organizational acceptable use policy (AUP) for the Web
Having a zone that allows access for anonymous users but
aggressively controls information exchange with internal
resources
Having an area designed to trap attackers in order to monitor
attacker activities
Allowing a means to monitor network traffic in real time as a
means to identify and block unusual activity
Hiding internal IP addresses
Allowing operating system and application patch management
The CIO has tasked you with proposing a series of hardware and
software controls designed to provide security for the LAN-to-
WAN domain. The CIO anticipates receiving both a written
report and diagram(s) to support your recommendations.
Write a three to five page paper in which you:
Use MS Visio or an open source equivalent to graphically depict
a solution for the provided scenario that will:
filter undesirable network traffic from the Internet
filter Web traffic to the Internet that does not adhere to the
organizational AUP for the Web
allow for a zone for anonymous users but aggressively controls
information exchange with internal resources
allow for an area designed to trap attackers in order to monitor
attacker activities
offer a means to monitor network traffic in real time as a means
to identify and block unusual activity
hide internal IP addresses
Identify the fundamentals of public key infrastructure (PKI).
Describe the manner in which your solution will protect the
privacy of data transmitted across the WAN.
Analyze the requirements necessary to allow for proper
operating system and application patch management and
describe a solution that would be effective.
Use at least three quality resources in this assignment.
Note:
Wikipedia and similar Websites do not qualify as quality
resources.
Note:
The graphically depicted solution is not included in the required
page length.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size
12), with one-inch margins on all sides; citations and
references must follow APA or school-specific format. Check
with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the
student's name, the professor's name, the course title, and the
date. The cover page and the reference page are not included in
the required assignment page length.
Include charts or diagrams created in Visio or an equivalent
such as Dia or OpenOffice. The completed diagrams / charts
must be imported into the Word document before the paper is
submitted.
The specific course learning outcomes associated with this
assignment are:
Analyze information security systems compliance requirements
within the Workstation and LAN Domains.
Use technology and information resources to research issues in
security strategy and policy formation.
Write clearly and concisely about topics related to information
technology audit and control using proper writing mechanics
and technical style conventions.

More Related Content

Similar to Note Review the page requirements and formatting  instruction.docx

Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docxAssignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docxastonrenna
 
Assignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docx
Assignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docxAssignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docx
Assignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docxdanielfoster65629
 
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domainUop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domainuopassignment
 
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domainUop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domaineyavagal
 
Imagine you are an Information Systems Security Officer for a me.docx
Imagine you are an Information Systems Security Officer for a me.docxImagine you are an Information Systems Security Officer for a me.docx
Imagine you are an Information Systems Security Officer for a me.docxterirasco
 
Assignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docxAssignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docxastonrenna
 
GAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
GAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docxGAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
GAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docxstarkeykellye
 
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docxAssignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docxcarlibradley31429
 
Imagine you are an Information Systems Security Officer for a medium.pdf
Imagine you are an Information Systems Security Officer for a medium.pdfImagine you are an Information Systems Security Officer for a medium.pdf
Imagine you are an Information Systems Security Officer for a medium.pdfarccreation001
 
The infrastructure which encompasses the network solution and securi.docx
The infrastructure which encompasses the network solution and securi.docxThe infrastructure which encompasses the network solution and securi.docx
The infrastructure which encompasses the network solution and securi.docxkailynochseu
 
The infrastructure which encompasses the network solution and se.docx
The infrastructure which encompasses the network solution and se.docxThe infrastructure which encompasses the network solution and se.docx
The infrastructure which encompasses the network solution and se.docxlaurieellan
 
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...shyaminfo30
 
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docxTerm Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docxmanningchassidy
 
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and woerm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and woeleanorabarrington
 
The infrastructure which encompasses the network solution and securi.docx
The infrastructure which encompasses the network solution and securi.docxThe infrastructure which encompasses the network solution and securi.docx
The infrastructure which encompasses the network solution and securi.docxjmindy
 
CIS 341 Success Begins / snaptutorial.com
CIS 341 Success Begins / snaptutorial.comCIS 341 Success Begins / snaptutorial.com
CIS 341 Success Begins / snaptutorial.comRobinson070
 
Cis 341 Technology levels--snaptutorial.com
Cis 341 Technology levels--snaptutorial.comCis 341 Technology levels--snaptutorial.com
Cis 341 Technology levels--snaptutorial.comsholingarjosh56
 
Cis 341 Enthusiastic Study - snaptutorial.com
Cis 341 Enthusiastic Study - snaptutorial.comCis 341 Enthusiastic Study - snaptutorial.com
Cis 341 Enthusiastic Study - snaptutorial.comGeorgeDixon100
 
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and worCase Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and worogglili
 
Assignment InstructionsInstructionsNote A 15 or less origi.docx
Assignment InstructionsInstructionsNote A 15  or less origi.docxAssignment InstructionsInstructionsNote A 15  or less origi.docx
Assignment InstructionsInstructionsNote A 15 or less origi.docxAMMY30
 

Similar to Note Review the page requirements and formatting  instruction.docx (20)

Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docxAssignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
 
Assignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docx
Assignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docxAssignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docx
Assignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docx
 
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domainUop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
 
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domainUop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
 
Imagine you are an Information Systems Security Officer for a me.docx
Imagine you are an Information Systems Security Officer for a me.docxImagine you are an Information Systems Security Officer for a me.docx
Imagine you are an Information Systems Security Officer for a me.docx
 
Assignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docxAssignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docx
 
GAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
GAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docxGAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
GAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
 
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docxAssignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
 
Imagine you are an Information Systems Security Officer for a medium.pdf
Imagine you are an Information Systems Security Officer for a medium.pdfImagine you are an Information Systems Security Officer for a medium.pdf
Imagine you are an Information Systems Security Officer for a medium.pdf
 
The infrastructure which encompasses the network solution and securi.docx
The infrastructure which encompasses the network solution and securi.docxThe infrastructure which encompasses the network solution and securi.docx
The infrastructure which encompasses the network solution and securi.docx
 
The infrastructure which encompasses the network solution and se.docx
The infrastructure which encompasses the network solution and se.docxThe infrastructure which encompasses the network solution and se.docx
The infrastructure which encompasses the network solution and se.docx
 
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...
 
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docxTerm Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
 
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and woerm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
 
The infrastructure which encompasses the network solution and securi.docx
The infrastructure which encompasses the network solution and securi.docxThe infrastructure which encompasses the network solution and securi.docx
The infrastructure which encompasses the network solution and securi.docx
 
CIS 341 Success Begins / snaptutorial.com
CIS 341 Success Begins / snaptutorial.comCIS 341 Success Begins / snaptutorial.com
CIS 341 Success Begins / snaptutorial.com
 
Cis 341 Technology levels--snaptutorial.com
Cis 341 Technology levels--snaptutorial.comCis 341 Technology levels--snaptutorial.com
Cis 341 Technology levels--snaptutorial.com
 
Cis 341 Enthusiastic Study - snaptutorial.com
Cis 341 Enthusiastic Study - snaptutorial.comCis 341 Enthusiastic Study - snaptutorial.com
Cis 341 Enthusiastic Study - snaptutorial.com
 
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and worCase Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
 
Assignment InstructionsInstructionsNote A 15 or less origi.docx
Assignment InstructionsInstructionsNote A 15  or less origi.docxAssignment InstructionsInstructionsNote A 15  or less origi.docx
Assignment InstructionsInstructionsNote A 15 or less origi.docx
 

More from poulterbarbara

1 Activity Analysis of Coloring M.docx
1  Activity Analysis of Coloring M.docx1  Activity Analysis of Coloring M.docx
1 Activity Analysis of Coloring M.docxpoulterbarbara
 
0 Choose one of the organizations described in the Four Case Studie.docx
0 Choose one of the organizations described in the Four Case Studie.docx0 Choose one of the organizations described in the Four Case Studie.docx
0 Choose one of the organizations described in the Four Case Studie.docxpoulterbarbara
 
1 ITNE2003 Install, Configure, Operate and T.docx
1  ITNE2003  Install, Configure, Operate and T.docx1  ITNE2003  Install, Configure, Operate and T.docx
1 ITNE2003 Install, Configure, Operate and T.docxpoulterbarbara
 
1 Case Study #23 Is Yahoo!’s Business Model .docx
1  Case Study #23   Is Yahoo!’s Business Model .docx1  Case Study #23   Is Yahoo!’s Business Model .docx
1 Case Study #23 Is Yahoo!’s Business Model .docxpoulterbarbara
 
06identifying exceptions and RECOGNIZING WINSWe can .docx
06identifying exceptions and  RECOGNIZING WINSWe can .docx06identifying exceptions and  RECOGNIZING WINSWe can .docx
06identifying exceptions and RECOGNIZING WINSWe can .docxpoulterbarbara
 
08creating YOUR GAME PLANNothing will work unle.docx
08creating  YOUR GAME PLANNothing will work  unle.docx08creating  YOUR GAME PLANNothing will work  unle.docx
08creating YOUR GAME PLANNothing will work unle.docxpoulterbarbara
 
1 2Week 4 Evidence and Standards ACC49142020Week .docx
1     2Week 4 Evidence and Standards ACC49142020Week .docx1     2Week 4 Evidence and Standards ACC49142020Week .docx
1 2Week 4 Evidence and Standards ACC49142020Week .docxpoulterbarbara
 
02.05 The Bill of Rights AssessmentAssessmentYou learne.docx
02.05 The Bill of Rights AssessmentAssessmentYou learne.docx02.05 The Bill of Rights AssessmentAssessmentYou learne.docx
02.05 The Bill of Rights AssessmentAssessmentYou learne.docxpoulterbarbara
 
0091-4169049501-0001THE JOURNAL OF CRIMINAL LAW & CRIMINOL.docx
0091-4169049501-0001THE JOURNAL OF CRIMINAL LAW & CRIMINOL.docx0091-4169049501-0001THE JOURNAL OF CRIMINAL LAW & CRIMINOL.docx
0091-4169049501-0001THE JOURNAL OF CRIMINAL LAW & CRIMINOL.docxpoulterbarbara
 
.,Discuss power, authority, and violenceDifferentiate between .docx
.,Discuss power, authority, and violenceDifferentiate between .docx.,Discuss power, authority, and violenceDifferentiate between .docx
.,Discuss power, authority, and violenceDifferentiate between .docxpoulterbarbara
 
. Why is understanding the fundamentals of persuasion and argume.docx
. Why is understanding the fundamentals of persuasion and argume.docx. Why is understanding the fundamentals of persuasion and argume.docx
. Why is understanding the fundamentals of persuasion and argume.docxpoulterbarbara
 
09-15 PRACTICAL EXERCISE PE 4-04-1 TITL.docx
09-15 PRACTICAL EXERCISE PE 4-04-1             TITL.docx09-15 PRACTICAL EXERCISE PE 4-04-1             TITL.docx
09-15 PRACTICAL EXERCISE PE 4-04-1 TITL.docxpoulterbarbara
 
0Running Head NON-VERBAL COMMUNICATIONS 10NON-VERBAL C.docx
0Running Head NON-VERBAL COMMUNICATIONS 10NON-VERBAL C.docx0Running Head NON-VERBAL COMMUNICATIONS 10NON-VERBAL C.docx
0Running Head NON-VERBAL COMMUNICATIONS 10NON-VERBAL C.docxpoulterbarbara
 
... all men are created equal ... they are endowed by their Cre.docx
... all men are created equal ... they are endowed by their Cre.docx... all men are created equal ... they are endowed by their Cre.docx
... all men are created equal ... they are endowed by their Cre.docxpoulterbarbara
 
-Extended definition of AI and contextual overview.-Detailed d.docx
-Extended definition of AI and contextual overview.-Detailed d.docx-Extended definition of AI and contextual overview.-Detailed d.docx
-Extended definition of AI and contextual overview.-Detailed d.docxpoulterbarbara
 
1 CDU APA 6th Referencing Style Guide (Febru.docx
1  CDU APA 6th  Referencing Style Guide (Febru.docx1  CDU APA 6th  Referencing Style Guide (Febru.docx
1 CDU APA 6th Referencing Style Guide (Febru.docxpoulterbarbara
 
1 How to Overcome Public Perception Issues on Potable R.docx
1  How to Overcome Public Perception Issues on Potable R.docx1  How to Overcome Public Perception Issues on Potable R.docx
1 How to Overcome Public Perception Issues on Potable R.docxpoulterbarbara
 
. Thoroughly complete each part of the prewriting process.. .docx
. Thoroughly complete each part of the prewriting process.. .docx. Thoroughly complete each part of the prewriting process.. .docx
. Thoroughly complete each part of the prewriting process.. .docxpoulterbarbara
 
. Research Paper Give a behaviorists response to the charge t.docx
. Research Paper Give a behaviorists response to the charge t.docx. Research Paper Give a behaviorists response to the charge t.docx
. Research Paper Give a behaviorists response to the charge t.docxpoulterbarbara
 
-QuestionsDiscuss how Adam vision was formedHow did he deve.docx
-QuestionsDiscuss how Adam vision was formedHow did he deve.docx-QuestionsDiscuss how Adam vision was formedHow did he deve.docx
-QuestionsDiscuss how Adam vision was formedHow did he deve.docxpoulterbarbara
 

More from poulterbarbara (20)

1 Activity Analysis of Coloring M.docx
1  Activity Analysis of Coloring M.docx1  Activity Analysis of Coloring M.docx
1 Activity Analysis of Coloring M.docx
 
0 Choose one of the organizations described in the Four Case Studie.docx
0 Choose one of the organizations described in the Four Case Studie.docx0 Choose one of the organizations described in the Four Case Studie.docx
0 Choose one of the organizations described in the Four Case Studie.docx
 
1 ITNE2003 Install, Configure, Operate and T.docx
1  ITNE2003  Install, Configure, Operate and T.docx1  ITNE2003  Install, Configure, Operate and T.docx
1 ITNE2003 Install, Configure, Operate and T.docx
 
1 Case Study #23 Is Yahoo!’s Business Model .docx
1  Case Study #23   Is Yahoo!’s Business Model .docx1  Case Study #23   Is Yahoo!’s Business Model .docx
1 Case Study #23 Is Yahoo!’s Business Model .docx
 
06identifying exceptions and RECOGNIZING WINSWe can .docx
06identifying exceptions and  RECOGNIZING WINSWe can .docx06identifying exceptions and  RECOGNIZING WINSWe can .docx
06identifying exceptions and RECOGNIZING WINSWe can .docx
 
08creating YOUR GAME PLANNothing will work unle.docx
08creating  YOUR GAME PLANNothing will work  unle.docx08creating  YOUR GAME PLANNothing will work  unle.docx
08creating YOUR GAME PLANNothing will work unle.docx
 
1 2Week 4 Evidence and Standards ACC49142020Week .docx
1     2Week 4 Evidence and Standards ACC49142020Week .docx1     2Week 4 Evidence and Standards ACC49142020Week .docx
1 2Week 4 Evidence and Standards ACC49142020Week .docx
 
02.05 The Bill of Rights AssessmentAssessmentYou learne.docx
02.05 The Bill of Rights AssessmentAssessmentYou learne.docx02.05 The Bill of Rights AssessmentAssessmentYou learne.docx
02.05 The Bill of Rights AssessmentAssessmentYou learne.docx
 
0091-4169049501-0001THE JOURNAL OF CRIMINAL LAW & CRIMINOL.docx
0091-4169049501-0001THE JOURNAL OF CRIMINAL LAW & CRIMINOL.docx0091-4169049501-0001THE JOURNAL OF CRIMINAL LAW & CRIMINOL.docx
0091-4169049501-0001THE JOURNAL OF CRIMINAL LAW & CRIMINOL.docx
 
.,Discuss power, authority, and violenceDifferentiate between .docx
.,Discuss power, authority, and violenceDifferentiate between .docx.,Discuss power, authority, and violenceDifferentiate between .docx
.,Discuss power, authority, and violenceDifferentiate between .docx
 
. Why is understanding the fundamentals of persuasion and argume.docx
. Why is understanding the fundamentals of persuasion and argume.docx. Why is understanding the fundamentals of persuasion and argume.docx
. Why is understanding the fundamentals of persuasion and argume.docx
 
09-15 PRACTICAL EXERCISE PE 4-04-1 TITL.docx
09-15 PRACTICAL EXERCISE PE 4-04-1             TITL.docx09-15 PRACTICAL EXERCISE PE 4-04-1             TITL.docx
09-15 PRACTICAL EXERCISE PE 4-04-1 TITL.docx
 
0Running Head NON-VERBAL COMMUNICATIONS 10NON-VERBAL C.docx
0Running Head NON-VERBAL COMMUNICATIONS 10NON-VERBAL C.docx0Running Head NON-VERBAL COMMUNICATIONS 10NON-VERBAL C.docx
0Running Head NON-VERBAL COMMUNICATIONS 10NON-VERBAL C.docx
 
... all men are created equal ... they are endowed by their Cre.docx
... all men are created equal ... they are endowed by their Cre.docx... all men are created equal ... they are endowed by their Cre.docx
... all men are created equal ... they are endowed by their Cre.docx
 
-Extended definition of AI and contextual overview.-Detailed d.docx
-Extended definition of AI and contextual overview.-Detailed d.docx-Extended definition of AI and contextual overview.-Detailed d.docx
-Extended definition of AI and contextual overview.-Detailed d.docx
 
1 CDU APA 6th Referencing Style Guide (Febru.docx
1  CDU APA 6th  Referencing Style Guide (Febru.docx1  CDU APA 6th  Referencing Style Guide (Febru.docx
1 CDU APA 6th Referencing Style Guide (Febru.docx
 
1 How to Overcome Public Perception Issues on Potable R.docx
1  How to Overcome Public Perception Issues on Potable R.docx1  How to Overcome Public Perception Issues on Potable R.docx
1 How to Overcome Public Perception Issues on Potable R.docx
 
. Thoroughly complete each part of the prewriting process.. .docx
. Thoroughly complete each part of the prewriting process.. .docx. Thoroughly complete each part of the prewriting process.. .docx
. Thoroughly complete each part of the prewriting process.. .docx
 
. Research Paper Give a behaviorists response to the charge t.docx
. Research Paper Give a behaviorists response to the charge t.docx. Research Paper Give a behaviorists response to the charge t.docx
. Research Paper Give a behaviorists response to the charge t.docx
 
-QuestionsDiscuss how Adam vision was formedHow did he deve.docx
-QuestionsDiscuss how Adam vision was formedHow did he deve.docx-QuestionsDiscuss how Adam vision was formedHow did he deve.docx
-QuestionsDiscuss how Adam vision was formedHow did he deve.docx
 

Recently uploaded

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIShubhangi Sonawane
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 

Recently uploaded (20)

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 

Note Review the page requirements and formatting  instruction.docx

  • 1. Note: Review the page requirements and formatting instructions for this assignment closely. Graphically depicted solutions, as well as the standardized formatting requirements, do NOT count toward the overall page length. Imagine you are an Information Systems Security Officer for a medium-sized financial services firm that has operations in four (4) states (Virginia, Florida, Arizona, and California). Due to the highly sensitive data created, stored, and transported by your organization, the CIO is concerned with implementing proper security controls for the LAN-to-WAN domain. Specifically, the CIO is concerned with the following areas: Protecting data privacy across the WAN Filtering undesirable network traffic from the Internet Filtering the traffic to the Internet that does not adhere to the organizational acceptable use policy (AUP) for the Web Having a zone that allows access for anonymous users but aggressively controls information exchange with internal resources Having an area designed to trap attackers in order to monitor attacker activities
  • 2. Allowing a means to monitor network traffic in real time as a means to identify and block unusual activity Hiding internal IP addresses Allowing operating system and application patch management The CIO has tasked you with proposing a series of hardware and software controls designed to provide security for the LAN-to- WAN domain. The CIO anticipates receiving both a written report and diagram(s) to support your recommendations. Write a three to five page paper in which you: Use MS Visio or an open source equivalent to graphically depict a solution for the provided scenario that will: filter undesirable network traffic from the Internet filter Web traffic to the Internet that does not adhere to the organizational AUP for the Web allow for a zone for anonymous users but aggressively controls information exchange with internal resources allow for an area designed to trap attackers in order to monitor attacker activities offer a means to monitor network traffic in real time as a means to identify and block unusual activity hide internal IP addresses
  • 3. Identify the fundamentals of public key infrastructure (PKI). Describe the manner in which your solution will protect the privacy of data transmitted across the WAN. Analyze the requirements necessary to allow for proper operating system and application patch management and describe a solution that would be effective. Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Note: The graphically depicted solution is not included in the required page length. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. Include charts or diagrams created in Visio or an equivalent
  • 4. such as Dia or OpenOffice. The completed diagrams / charts must be imported into the Word document before the paper is submitted. The specific course learning outcomes associated with this assignment are: Analyze information security systems compliance requirements within the Workstation and LAN Domains. Use technology and information resources to research issues in security strategy and policy formation. Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions.