SlideShare a Scribd company logo
Assignment 4: Designing Compliance within the LAN-to-WAN
Domain
Note:
Review the page requirements and formatting instructions for
this assignment closely. Graphically depicted solutions, as well
as the standardized formatting requirements, do NOT count
toward the overall page length.
Imagine you are an Information Systems Security Officer for a
medium-sized financial services firm that has operations in four
(4) states (Virginia, Florida, Arizona, and California). Due to
the highly sensitive data created, stored, and transported by
your organization, the CIO is concerned with implementing
proper security controls for the LAN-to-WAN domain.
Specifically, the CIO is concerned with the following areas:
Protecting data privacy across the WAN
Filtering undesirable network traffic from the Internet
Filtering the traffic to the Internet that does not adhere to the
organizational acceptable use policy (AUP) for the Web
Having a zone that allows access for anonymous users but
aggressively controls information exchange with internal
resources
Having an area designed to trap attackers in order to monitor
attacker activities
Allowing a means to monitor network traffic in real time as a
means to identify and block unusual activity
Hiding internal IP addresses
Allowing operating system and application patch management
The CIO has tasked you with proposing a series of hardware and
software controls designed to provide security for the LAN-to-
WAN domain. The CIO anticipates receiving both a written
report and diagram(s) to support your recommendations.
Write a three to five (3-5) page paper in which you:
Use MS Visio or an open source equivalent to graphically depict
a solution for the provided scenario that will:
filter undesirable network traffic from the Internet
filter Web traffic to the Internet that does not adhere to the
organizational AUP for the Web
allow for a zone for anonymous users but aggressively controls
information exchange with internal resources
allow for an area designed to trap attackers in order to monitor
attacker activities
offer a means to monitor network traffic in real time as a means
to identify and block unusual activity
hide internal IP addresses
Identify the fundamentals of public key infrastructure (PKI).
Describe the manner in which your solution will protect the
privacy of data transmitted across the WAN.
Analyze the requirements necessary to allow for proper
operating system and application patch management and
describe a solution that would be effective.
Use at least three (3) quality resources in this assignment.
Note:
Wikipedia and similar Websites do not qualify as quality
resources.
Note:
The graphically depicted solution is not included in the
required page length.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size
12), with one-inch margins on all sides; citations and references
must follow APA or school-specific format. Check with your
professor for any additional instructions.
Include a cover page containing the title of the assignment, the
student’s name, the professor’s name, the course title, and the
date. The cover page and the reference page are not included in
the required assignment page length.
Include charts or diagrams created in Visio or an equivalent
such as Dia or OpenOffice. The completed diagrams / charts
must be imported into the Word document before the paper is
submitted.
The specific course learning outcomes associated with this
assignment are:
Analyze information security systems compliance requirements
within the Workstation and LAN Domains.
Use technology and information resources to research issues in
security strategy and policy formation.
Write clearly and concisely about topics related to information
technology audit and control using proper writing mechanics
and technical style conventions.
Click
here
to view the grading rubric.
Grading for this assignment will be based on answer quality,
logic / organization of the paper, and language and writing
skills, using the following rubric.
Points: 130
Assignment 4: Designing Compliance within the LAN-to-WAN
Domain
Criteria
Unacceptable
Below 60% F
Meets Minimum Expectations
60-69% D
Fair
70-79% C
Proficient
80-89% B
Exemplary
90-100% A
1. Use MS Visio or an open source equivalent to graphically
depict a solution for the provided scenario.
Weight: 30%
Did not submit or incompletely
used MS Visio or an open source equivalent to graphically
depict a solution for the provided scenario.
Insufficiently used MS Visio or an open source equivalent to
graphically depict a solution for the provided scenario.
Partially used MS Visio or an open source equivalent to
graphically depict a solution for the provided scenario.
Satisfactorily used MS Visio or an open source equivalent to
graphically depict a solution for the provided scenario.
Thoroughly used MS Visio or an open source equivalent to
graphically depict a solution for the provided scenario.
2. Identify the fundamentals of public key infrastructure (PKI).
Weight: 10%
Did not submit or incompletely
identified the fundamentals of public key infrastructure (PKI).
Insufficiently identified the fundamentals of public key
infrastructure (PKI).
Partially identified the fundamentals of public key
infrastructure (PKI).
Satisfactorily identified the fundamentals of public key
infrastructure (PKI).
Thoroughly identified the fundamentals of public key
infrastructure (PKI).
3. Describe the manner in which your solution will protect the
privacy of data transmitted across the WAN.
Weight: 15%
Did not submit or incompletely
described the manner in which your solution will protect the
privacy of data transmitted across the WAN.
Insufficiently described the manner in which your solution will
protect the privacy of data transmitted across the WAN.
Partially described the manner in which your solution will
protect the privacy of data transmitted across the WAN.
Satisfactorily described the manner in which your solution will
protect the privacy of data transmitted across the WAN.
Thoroughly described the manner in which your solution will
protect the privacy of data transmitted across the WAN.
4. Analyze the requirements necessary to allow for proper
operating system and application patch management and
describe a solution that would be effective.
Weight: 15%
Did not submit or incompletely
analyzed the requirements necessary to allow for proper
operating system and application patch management and did not
submit or incompletely
described a solution that would be effective.
Insufficiently analyzed the requirements necessary to allow for
proper operating system and application patch management and
insufficiently described a solution that would be effective.
Partially analyzed the requirements necessary to allow for
proper operating system and application patch management and
partially described a solution that would be effective.
Satisfactorily analyzed the requirements necessary to allow for
proper operating system and application patch management and
satisfactorily described a solution that would be effective.
Thoroughly analyzed the requirements necessary to allow for
proper operating system and application patch management and
thoroughly described a solution that would be effective.
5. 3 references
Weight: 5%
No references provided
Does not meet the required number of references; all references
poor quality choices.
Does not meet the required number of references; some
references poor quality choices.
Meets number of required references; all references high quality
choices.
Exceeds number of required references; all references high
quality choices.
6. Clarity, writing mechanics, and formatting requirements
Weight: 10%
More than 8 errors present
7-8 errors present
5-6 errors present
3-4 errors present
0-2 errors present

More Related Content

Similar to Assignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docx

Note Review the page requirements and formatting instructions for.docx
Note Review the page requirements and formatting instructions for.docxNote Review the page requirements and formatting instructions for.docx
Note Review the page requirements and formatting instructions for.docx
carlibradley31429
 
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docxAssignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
astonrenna
 
Imagine you are an Information Systems Security Officer for a medium.docx
Imagine you are an Information Systems Security Officer for a medium.docxImagine you are an Information Systems Security Officer for a medium.docx
Imagine you are an Information Systems Security Officer for a medium.docx
nolanalgernon
 
Imagine you are an Information Systems Security Officer for a medium.docx
Imagine you are an Information Systems Security Officer for a medium.docxImagine you are an Information Systems Security Officer for a medium.docx
Imagine you are an Information Systems Security Officer for a medium.docx
gordienaysmythe
 
Assignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docx
Assignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docxAssignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docx
Assignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docx
danielfoster65629
 
Project Deliverable 5 Network Infrastructure and SecurityDue Week.docx
Project Deliverable 5 Network Infrastructure and SecurityDue Week.docxProject Deliverable 5 Network Infrastructure and SecurityDue Week.docx
Project Deliverable 5 Network Infrastructure and SecurityDue Week.docx
bfingarjcmc
 
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domainUop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
uopassignment
 
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domainUop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
eyavagal
 
erm Paper Penetration TestingDue Week 10 and worth 120 points.docx
erm Paper Penetration TestingDue Week 10 and worth 120 points.docxerm Paper Penetration TestingDue Week 10 and worth 120 points.docx
erm Paper Penetration TestingDue Week 10 and worth 120 points.docx
mealsdeidre
 
Assignment 5 Technical Term PaperThe Technical Term Paper will in.docx
Assignment 5 Technical Term PaperThe Technical Term Paper will in.docxAssignment 5 Technical Term PaperThe Technical Term Paper will in.docx
Assignment 5 Technical Term PaperThe Technical Term Paper will in.docx
rosemariebrayshaw
 
Cis 436 Technology levels--snaptutorial.com
Cis 436 Technology levels--snaptutorial.comCis 436 Technology levels--snaptutorial.com
Cis 436 Technology levels--snaptutorial.com
sholingarjosh61
 
Cis 436 Enthusiastic Study / snaptutorial.com
Cis 436 Enthusiastic Study / snaptutorial.comCis 436 Enthusiastic Study / snaptutorial.com
Cis 436 Enthusiastic Study / snaptutorial.com
Stephenson03
 
Due 12 10 2016Week 10 Term PaperClick the link above to submit.docx
Due 12 10 2016Week 10 Term PaperClick the link above to submit.docxDue 12 10 2016Week 10 Term PaperClick the link above to submit.docx
Due 12 10 2016Week 10 Term PaperClick the link above to submit.docx
sagarlesley
 
Imagine you are an Information Systems Security Officer for a me.docx
Imagine you are an Information Systems Security Officer for a me.docxImagine you are an Information Systems Security Officer for a me.docx
Imagine you are an Information Systems Security Officer for a me.docx
terirasco
 
Project Deliverable 5 Infrastructure and SecurityThis assignm.docx
Project Deliverable 5 Infrastructure and SecurityThis assignm.docxProject Deliverable 5 Infrastructure and SecurityThis assignm.docx
Project Deliverable 5 Infrastructure and SecurityThis assignm.docx
woodruffeloisa
 
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...
shyaminfo30
 
Unit1 - Individual Project Due on 03292014A company wan.docx
Unit1 - Individual Project       Due on  03292014A company wan.docxUnit1 - Individual Project       Due on  03292014A company wan.docx
Unit1 - Individual Project Due on 03292014A company wan.docx
dickonsondorris
 
Term Paper WirelessSecurityPlanDue Week 10 and worth 150 po.docx
Term Paper WirelessSecurityPlanDue Week 10 and worth 150 po.docxTerm Paper WirelessSecurityPlanDue Week 10 and worth 150 po.docx
Term Paper WirelessSecurityPlanDue Week 10 and worth 150 po.docx
jonghollingberry
 
Executive Proposal ProjectThe purpose of this project is to evalua.docx
Executive Proposal ProjectThe purpose of this project is to evalua.docxExecutive Proposal ProjectThe purpose of this project is to evalua.docx
Executive Proposal ProjectThe purpose of this project is to evalua.docx
rhetttrevannion
 
Technical Paper Risk AssessmentGlobal Finance, Inc. Netwo.docx
Technical Paper Risk AssessmentGlobal Finance, Inc. Netwo.docxTechnical Paper Risk AssessmentGlobal Finance, Inc. Netwo.docx
Technical Paper Risk AssessmentGlobal Finance, Inc. Netwo.docx
mattinsonjanel
 

Similar to Assignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docx (20)

Note Review the page requirements and formatting instructions for.docx
Note Review the page requirements and formatting instructions for.docxNote Review the page requirements and formatting instructions for.docx
Note Review the page requirements and formatting instructions for.docx
 
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docxAssignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
 
Imagine you are an Information Systems Security Officer for a medium.docx
Imagine you are an Information Systems Security Officer for a medium.docxImagine you are an Information Systems Security Officer for a medium.docx
Imagine you are an Information Systems Security Officer for a medium.docx
 
Imagine you are an Information Systems Security Officer for a medium.docx
Imagine you are an Information Systems Security Officer for a medium.docxImagine you are an Information Systems Security Officer for a medium.docx
Imagine you are an Information Systems Security Officer for a medium.docx
 
Assignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docx
Assignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docxAssignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docx
Assignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docx
 
Project Deliverable 5 Network Infrastructure and SecurityDue Week.docx
Project Deliverable 5 Network Infrastructure and SecurityDue Week.docxProject Deliverable 5 Network Infrastructure and SecurityDue Week.docx
Project Deliverable 5 Network Infrastructure and SecurityDue Week.docx
 
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domainUop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
 
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domainUop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
 
erm Paper Penetration TestingDue Week 10 and worth 120 points.docx
erm Paper Penetration TestingDue Week 10 and worth 120 points.docxerm Paper Penetration TestingDue Week 10 and worth 120 points.docx
erm Paper Penetration TestingDue Week 10 and worth 120 points.docx
 
Assignment 5 Technical Term PaperThe Technical Term Paper will in.docx
Assignment 5 Technical Term PaperThe Technical Term Paper will in.docxAssignment 5 Technical Term PaperThe Technical Term Paper will in.docx
Assignment 5 Technical Term PaperThe Technical Term Paper will in.docx
 
Cis 436 Technology levels--snaptutorial.com
Cis 436 Technology levels--snaptutorial.comCis 436 Technology levels--snaptutorial.com
Cis 436 Technology levels--snaptutorial.com
 
Cis 436 Enthusiastic Study / snaptutorial.com
Cis 436 Enthusiastic Study / snaptutorial.comCis 436 Enthusiastic Study / snaptutorial.com
Cis 436 Enthusiastic Study / snaptutorial.com
 
Due 12 10 2016Week 10 Term PaperClick the link above to submit.docx
Due 12 10 2016Week 10 Term PaperClick the link above to submit.docxDue 12 10 2016Week 10 Term PaperClick the link above to submit.docx
Due 12 10 2016Week 10 Term PaperClick the link above to submit.docx
 
Imagine you are an Information Systems Security Officer for a me.docx
Imagine you are an Information Systems Security Officer for a me.docxImagine you are an Information Systems Security Officer for a me.docx
Imagine you are an Information Systems Security Officer for a me.docx
 
Project Deliverable 5 Infrastructure and SecurityThis assignm.docx
Project Deliverable 5 Infrastructure and SecurityThis assignm.docxProject Deliverable 5 Infrastructure and SecurityThis assignm.docx
Project Deliverable 5 Infrastructure and SecurityThis assignm.docx
 
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...
 
Unit1 - Individual Project Due on 03292014A company wan.docx
Unit1 - Individual Project       Due on  03292014A company wan.docxUnit1 - Individual Project       Due on  03292014A company wan.docx
Unit1 - Individual Project Due on 03292014A company wan.docx
 
Term Paper WirelessSecurityPlanDue Week 10 and worth 150 po.docx
Term Paper WirelessSecurityPlanDue Week 10 and worth 150 po.docxTerm Paper WirelessSecurityPlanDue Week 10 and worth 150 po.docx
Term Paper WirelessSecurityPlanDue Week 10 and worth 150 po.docx
 
Executive Proposal ProjectThe purpose of this project is to evalua.docx
Executive Proposal ProjectThe purpose of this project is to evalua.docxExecutive Proposal ProjectThe purpose of this project is to evalua.docx
Executive Proposal ProjectThe purpose of this project is to evalua.docx
 
Technical Paper Risk AssessmentGlobal Finance, Inc. Netwo.docx
Technical Paper Risk AssessmentGlobal Finance, Inc. Netwo.docxTechnical Paper Risk AssessmentGlobal Finance, Inc. Netwo.docx
Technical Paper Risk AssessmentGlobal Finance, Inc. Netwo.docx
 

More from astonrenna

Assignment 4 Special Problems and Challenges and the Future of Poli.docx
Assignment 4 Special Problems and Challenges and the Future of Poli.docxAssignment 4 Special Problems and Challenges and the Future of Poli.docx
Assignment 4 Special Problems and Challenges and the Future of Poli.docx
astonrenna
 
Assignment 5 Integrated Business Communication1 As a future execu.docx
Assignment 5 Integrated Business Communication1 As a future execu.docxAssignment 5 Integrated Business Communication1 As a future execu.docx
Assignment 5 Integrated Business Communication1 As a future execu.docx
astonrenna
 
Assignment 4 The Future of Digital Crimes and Digital TerrorismDu.docx
Assignment 4 The Future of Digital Crimes and Digital TerrorismDu.docxAssignment 4 The Future of Digital Crimes and Digital TerrorismDu.docx
Assignment 4 The Future of Digital Crimes and Digital TerrorismDu.docx
astonrenna
 
Assignment 4 Network Design Executive PowerPoint PresentationIn t.docx
Assignment 4 Network Design Executive PowerPoint PresentationIn t.docxAssignment 4 Network Design Executive PowerPoint PresentationIn t.docx
Assignment 4 Network Design Executive PowerPoint PresentationIn t.docx
astonrenna
 
Assignment 4 Presentation Due Week 10 and worth 280 pointsCho.docx
Assignment 4 Presentation Due Week 10 and worth 280 pointsCho.docxAssignment 4 Presentation Due Week 10 and worth 280 pointsCho.docx
Assignment 4 Presentation Due Week 10 and worth 280 pointsCho.docx
astonrenna
 
Assignment 4 Engaging Families and the Community in Early Childhood.docx
Assignment 4 Engaging Families and the Community in Early Childhood.docxAssignment 4 Engaging Families and the Community in Early Childhood.docx
Assignment 4 Engaging Families and the Community in Early Childhood.docx
astonrenna
 
Assignment 4 Changing Our Lives” Thesis Statement Adaliza Rodr.docx
Assignment 4 Changing Our Lives” Thesis Statement Adaliza Rodr.docxAssignment 4 Changing Our Lives” Thesis Statement Adaliza Rodr.docx
Assignment 4 Changing Our Lives” Thesis Statement Adaliza Rodr.docx
astonrenna
 
Assignment 3PurposeIn assignment 3, the saga of Joseph Dunn.docx
Assignment 3PurposeIn assignment 3, the saga of Joseph Dunn.docxAssignment 3PurposeIn assignment 3, the saga of Joseph Dunn.docx
Assignment 3PurposeIn assignment 3, the saga of Joseph Dunn.docx
astonrenna
 
Assignment 3 Views on Diversity FOR SOLUTIONS PRO.Pablo.docx
Assignment 3 Views on Diversity FOR SOLUTIONS PRO.Pablo.docxAssignment 3 Views on Diversity FOR SOLUTIONS PRO.Pablo.docx
Assignment 3 Views on Diversity FOR SOLUTIONS PRO.Pablo.docx
astonrenna
 
Assignment 3 Views on DiversityPablo believes that diversity is t.docx
Assignment 3 Views on DiversityPablo believes that diversity is t.docxAssignment 3 Views on DiversityPablo believes that diversity is t.docx
Assignment 3 Views on DiversityPablo believes that diversity is t.docx
astonrenna
 
Assignment 3 Outline a New IT Security PolicyDue Week 9 and wor.docx
Assignment 3 Outline a New IT Security PolicyDue Week 9 and wor.docxAssignment 3 Outline a New IT Security PolicyDue Week 9 and wor.docx
Assignment 3 Outline a New IT Security PolicyDue Week 9 and wor.docx
astonrenna
 
Assignment 3 Nonverbal CommunicationImagine that you are forming .docx
Assignment 3 Nonverbal CommunicationImagine that you are forming .docxAssignment 3 Nonverbal CommunicationImagine that you are forming .docx
Assignment 3 Nonverbal CommunicationImagine that you are forming .docx
astonrenna
 
Assignment 3 Incident Response (IR) Strategic DecisionsSuppose th.docx
Assignment 3 Incident Response (IR) Strategic DecisionsSuppose th.docxAssignment 3 Incident Response (IR) Strategic DecisionsSuppose th.docx
Assignment 3 Incident Response (IR) Strategic DecisionsSuppose th.docx
astonrenna
 
Assignment 3 Leadership of Richard BransonWrite a paper in whic.docx
Assignment 3 Leadership of Richard BransonWrite a paper in whic.docxAssignment 3 Leadership of Richard BransonWrite a paper in whic.docx
Assignment 3 Leadership of Richard BransonWrite a paper in whic.docx
astonrenna
 
Assignment 3 Gender Identity We are socialized at every stage in .docx
Assignment 3 Gender Identity We are socialized at every stage in .docxAssignment 3 Gender Identity We are socialized at every stage in .docx
Assignment 3 Gender Identity We are socialized at every stage in .docx
astonrenna
 
Assignment 3 Fraud Techniques Due Week 7 and worth 50 points .docx
Assignment 3 Fraud Techniques Due Week 7 and worth 50 points .docxAssignment 3 Fraud Techniques Due Week 7 and worth 50 points .docx
Assignment 3 Fraud Techniques Due Week 7 and worth 50 points .docx
astonrenna
 
Assignment 3 Exploring Your CulturePart of successfully exploring.docx
Assignment 3 Exploring Your CulturePart of successfully exploring.docxAssignment 3 Exploring Your CulturePart of successfully exploring.docx
Assignment 3 Exploring Your CulturePart of successfully exploring.docx
astonrenna
 
Assignment 3 Exploring Your CulturePart of successfully explo.docx
Assignment 3 Exploring Your CulturePart of successfully explo.docxAssignment 3 Exploring Your CulturePart of successfully explo.docx
Assignment 3 Exploring Your CulturePart of successfully explo.docx
astonrenna
 
Assignment 3 Legal Ethics, Patients’ Rights, and HIV AIDSDue We.docx
Assignment 3 Legal Ethics, Patients’ Rights, and HIV  AIDSDue We.docxAssignment 3 Legal Ethics, Patients’ Rights, and HIV  AIDSDue We.docx
Assignment 3 Legal Ethics, Patients’ Rights, and HIV AIDSDue We.docx
astonrenna
 
Assignment 3 Kotter Change Management ModelDue Week 6Using .docx
Assignment 3 Kotter Change Management ModelDue Week 6Using .docxAssignment 3 Kotter Change Management ModelDue Week 6Using .docx
Assignment 3 Kotter Change Management ModelDue Week 6Using .docx
astonrenna
 

More from astonrenna (20)

Assignment 4 Special Problems and Challenges and the Future of Poli.docx
Assignment 4 Special Problems and Challenges and the Future of Poli.docxAssignment 4 Special Problems and Challenges and the Future of Poli.docx
Assignment 4 Special Problems and Challenges and the Future of Poli.docx
 
Assignment 5 Integrated Business Communication1 As a future execu.docx
Assignment 5 Integrated Business Communication1 As a future execu.docxAssignment 5 Integrated Business Communication1 As a future execu.docx
Assignment 5 Integrated Business Communication1 As a future execu.docx
 
Assignment 4 The Future of Digital Crimes and Digital TerrorismDu.docx
Assignment 4 The Future of Digital Crimes and Digital TerrorismDu.docxAssignment 4 The Future of Digital Crimes and Digital TerrorismDu.docx
Assignment 4 The Future of Digital Crimes and Digital TerrorismDu.docx
 
Assignment 4 Network Design Executive PowerPoint PresentationIn t.docx
Assignment 4 Network Design Executive PowerPoint PresentationIn t.docxAssignment 4 Network Design Executive PowerPoint PresentationIn t.docx
Assignment 4 Network Design Executive PowerPoint PresentationIn t.docx
 
Assignment 4 Presentation Due Week 10 and worth 280 pointsCho.docx
Assignment 4 Presentation Due Week 10 and worth 280 pointsCho.docxAssignment 4 Presentation Due Week 10 and worth 280 pointsCho.docx
Assignment 4 Presentation Due Week 10 and worth 280 pointsCho.docx
 
Assignment 4 Engaging Families and the Community in Early Childhood.docx
Assignment 4 Engaging Families and the Community in Early Childhood.docxAssignment 4 Engaging Families and the Community in Early Childhood.docx
Assignment 4 Engaging Families and the Community in Early Childhood.docx
 
Assignment 4 Changing Our Lives” Thesis Statement Adaliza Rodr.docx
Assignment 4 Changing Our Lives” Thesis Statement Adaliza Rodr.docxAssignment 4 Changing Our Lives” Thesis Statement Adaliza Rodr.docx
Assignment 4 Changing Our Lives” Thesis Statement Adaliza Rodr.docx
 
Assignment 3PurposeIn assignment 3, the saga of Joseph Dunn.docx
Assignment 3PurposeIn assignment 3, the saga of Joseph Dunn.docxAssignment 3PurposeIn assignment 3, the saga of Joseph Dunn.docx
Assignment 3PurposeIn assignment 3, the saga of Joseph Dunn.docx
 
Assignment 3 Views on Diversity FOR SOLUTIONS PRO.Pablo.docx
Assignment 3 Views on Diversity FOR SOLUTIONS PRO.Pablo.docxAssignment 3 Views on Diversity FOR SOLUTIONS PRO.Pablo.docx
Assignment 3 Views on Diversity FOR SOLUTIONS PRO.Pablo.docx
 
Assignment 3 Views on DiversityPablo believes that diversity is t.docx
Assignment 3 Views on DiversityPablo believes that diversity is t.docxAssignment 3 Views on DiversityPablo believes that diversity is t.docx
Assignment 3 Views on DiversityPablo believes that diversity is t.docx
 
Assignment 3 Outline a New IT Security PolicyDue Week 9 and wor.docx
Assignment 3 Outline a New IT Security PolicyDue Week 9 and wor.docxAssignment 3 Outline a New IT Security PolicyDue Week 9 and wor.docx
Assignment 3 Outline a New IT Security PolicyDue Week 9 and wor.docx
 
Assignment 3 Nonverbal CommunicationImagine that you are forming .docx
Assignment 3 Nonverbal CommunicationImagine that you are forming .docxAssignment 3 Nonverbal CommunicationImagine that you are forming .docx
Assignment 3 Nonverbal CommunicationImagine that you are forming .docx
 
Assignment 3 Incident Response (IR) Strategic DecisionsSuppose th.docx
Assignment 3 Incident Response (IR) Strategic DecisionsSuppose th.docxAssignment 3 Incident Response (IR) Strategic DecisionsSuppose th.docx
Assignment 3 Incident Response (IR) Strategic DecisionsSuppose th.docx
 
Assignment 3 Leadership of Richard BransonWrite a paper in whic.docx
Assignment 3 Leadership of Richard BransonWrite a paper in whic.docxAssignment 3 Leadership of Richard BransonWrite a paper in whic.docx
Assignment 3 Leadership of Richard BransonWrite a paper in whic.docx
 
Assignment 3 Gender Identity We are socialized at every stage in .docx
Assignment 3 Gender Identity We are socialized at every stage in .docxAssignment 3 Gender Identity We are socialized at every stage in .docx
Assignment 3 Gender Identity We are socialized at every stage in .docx
 
Assignment 3 Fraud Techniques Due Week 7 and worth 50 points .docx
Assignment 3 Fraud Techniques Due Week 7 and worth 50 points .docxAssignment 3 Fraud Techniques Due Week 7 and worth 50 points .docx
Assignment 3 Fraud Techniques Due Week 7 and worth 50 points .docx
 
Assignment 3 Exploring Your CulturePart of successfully exploring.docx
Assignment 3 Exploring Your CulturePart of successfully exploring.docxAssignment 3 Exploring Your CulturePart of successfully exploring.docx
Assignment 3 Exploring Your CulturePart of successfully exploring.docx
 
Assignment 3 Exploring Your CulturePart of successfully explo.docx
Assignment 3 Exploring Your CulturePart of successfully explo.docxAssignment 3 Exploring Your CulturePart of successfully explo.docx
Assignment 3 Exploring Your CulturePart of successfully explo.docx
 
Assignment 3 Legal Ethics, Patients’ Rights, and HIV AIDSDue We.docx
Assignment 3 Legal Ethics, Patients’ Rights, and HIV  AIDSDue We.docxAssignment 3 Legal Ethics, Patients’ Rights, and HIV  AIDSDue We.docx
Assignment 3 Legal Ethics, Patients’ Rights, and HIV AIDSDue We.docx
 
Assignment 3 Kotter Change Management ModelDue Week 6Using .docx
Assignment 3 Kotter Change Management ModelDue Week 6Using .docxAssignment 3 Kotter Change Management ModelDue Week 6Using .docx
Assignment 3 Kotter Change Management ModelDue Week 6Using .docx
 

Recently uploaded

special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
Nguyen Thanh Tu Collection
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
PedroFerreira53928
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
EduSkills OECD
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
GeoBlogs
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
PedroFerreira53928
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 

Recently uploaded (20)

special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 

Assignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docx

  • 1. Assignment 4: Designing Compliance within the LAN-to-WAN Domain Note: Review the page requirements and formatting instructions for this assignment closely. Graphically depicted solutions, as well as the standardized formatting requirements, do NOT count toward the overall page length. Imagine you are an Information Systems Security Officer for a medium-sized financial services firm that has operations in four (4) states (Virginia, Florida, Arizona, and California). Due to the highly sensitive data created, stored, and transported by your organization, the CIO is concerned with implementing proper security controls for the LAN-to-WAN domain. Specifically, the CIO is concerned with the following areas: Protecting data privacy across the WAN Filtering undesirable network traffic from the Internet Filtering the traffic to the Internet that does not adhere to the organizational acceptable use policy (AUP) for the Web Having a zone that allows access for anonymous users but aggressively controls information exchange with internal resources Having an area designed to trap attackers in order to monitor attacker activities Allowing a means to monitor network traffic in real time as a means to identify and block unusual activity Hiding internal IP addresses Allowing operating system and application patch management The CIO has tasked you with proposing a series of hardware and software controls designed to provide security for the LAN-to- WAN domain. The CIO anticipates receiving both a written report and diagram(s) to support your recommendations. Write a three to five (3-5) page paper in which you: Use MS Visio or an open source equivalent to graphically depict a solution for the provided scenario that will: filter undesirable network traffic from the Internet
  • 2. filter Web traffic to the Internet that does not adhere to the organizational AUP for the Web allow for a zone for anonymous users but aggressively controls information exchange with internal resources allow for an area designed to trap attackers in order to monitor attacker activities offer a means to monitor network traffic in real time as a means to identify and block unusual activity hide internal IP addresses Identify the fundamentals of public key infrastructure (PKI). Describe the manner in which your solution will protect the privacy of data transmitted across the WAN. Analyze the requirements necessary to allow for proper operating system and application patch management and describe a solution that would be effective. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Note: The graphically depicted solution is not included in the required page length. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. Include charts or diagrams created in Visio or an equivalent such as Dia or OpenOffice. The completed diagrams / charts must be imported into the Word document before the paper is submitted. The specific course learning outcomes associated with this
  • 3. assignment are: Analyze information security systems compliance requirements within the Workstation and LAN Domains. Use technology and information resources to research issues in security strategy and policy formation. Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions. Click here to view the grading rubric. Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric. Points: 130 Assignment 4: Designing Compliance within the LAN-to-WAN Domain Criteria Unacceptable Below 60% F Meets Minimum Expectations 60-69% D Fair 70-79% C Proficient 80-89% B Exemplary 90-100% A 1. Use MS Visio or an open source equivalent to graphically depict a solution for the provided scenario. Weight: 30%
  • 4. Did not submit or incompletely used MS Visio or an open source equivalent to graphically depict a solution for the provided scenario. Insufficiently used MS Visio or an open source equivalent to graphically depict a solution for the provided scenario. Partially used MS Visio or an open source equivalent to graphically depict a solution for the provided scenario. Satisfactorily used MS Visio or an open source equivalent to graphically depict a solution for the provided scenario. Thoroughly used MS Visio or an open source equivalent to graphically depict a solution for the provided scenario. 2. Identify the fundamentals of public key infrastructure (PKI). Weight: 10% Did not submit or incompletely identified the fundamentals of public key infrastructure (PKI). Insufficiently identified the fundamentals of public key infrastructure (PKI). Partially identified the fundamentals of public key infrastructure (PKI). Satisfactorily identified the fundamentals of public key infrastructure (PKI). Thoroughly identified the fundamentals of public key infrastructure (PKI). 3. Describe the manner in which your solution will protect the privacy of data transmitted across the WAN. Weight: 15% Did not submit or incompletely described the manner in which your solution will protect the privacy of data transmitted across the WAN. Insufficiently described the manner in which your solution will protect the privacy of data transmitted across the WAN. Partially described the manner in which your solution will protect the privacy of data transmitted across the WAN. Satisfactorily described the manner in which your solution will protect the privacy of data transmitted across the WAN. Thoroughly described the manner in which your solution will
  • 5. protect the privacy of data transmitted across the WAN. 4. Analyze the requirements necessary to allow for proper operating system and application patch management and describe a solution that would be effective. Weight: 15% Did not submit or incompletely analyzed the requirements necessary to allow for proper operating system and application patch management and did not submit or incompletely described a solution that would be effective. Insufficiently analyzed the requirements necessary to allow for proper operating system and application patch management and insufficiently described a solution that would be effective. Partially analyzed the requirements necessary to allow for proper operating system and application patch management and partially described a solution that would be effective. Satisfactorily analyzed the requirements necessary to allow for proper operating system and application patch management and satisfactorily described a solution that would be effective. Thoroughly analyzed the requirements necessary to allow for proper operating system and application patch management and thoroughly described a solution that would be effective. 5. 3 references Weight: 5% No references provided Does not meet the required number of references; all references poor quality choices. Does not meet the required number of references; some references poor quality choices. Meets number of required references; all references high quality choices. Exceeds number of required references; all references high quality choices. 6. Clarity, writing mechanics, and formatting requirements Weight: 10% More than 8 errors present
  • 6. 7-8 errors present 5-6 errors present 3-4 errors present 0-2 errors present