SlideShare a Scribd company logo
Imagine you are an Information Systems Security Officer for a
medium-sized financial services firm that has operations in four
(4) states (Virginia, Florida, Arizona, and California). Due to
the highly sensitive data created, stored, and transported by
your organization, the CIO is concerned with implementing
proper security controls for the LAN-to-WAN domain.
Specifically, the CIO is concerned with the following areas:
Protecting data privacy across the WAN
Filtering undesirable network traffic from the Internet
Filtering the traffic to the Internet that does not adhere to the
organizational acceptable use policy (AUP) for the Web
Having a zone that allows access for anonymous users but
aggressively controls information exchange with internal
resources
Having an area designed to trap attackers in order to monitor
attacker activities
Allowing a means to monitor network traffic in real time as a
means to identify and block unusual activity
Hiding internal IP addresses
Allowing operating system and application patch management
The CIO has tasked you with proposing a series of hardware and
software controls designed to provide security for the LAN-to-
WAN domain. The CIO anticipates receiving both a written
report and diagram(s) to support your recommendations.
Write a three to five (3-5) page paper in which you:
Use MS Visio or an open source equivalent to graphically depict
a solution for the provided scenario that will:
filter undesirable network traffic from the Internet
filter Web traffic to the Internet that does not adhere to the
organizational AUP for the Web
allow for a zone for anonymous users but aggressively controls
information exchange with internal resources
allow for an area designed to trap attackers in order to monitor
attacker activities
offer a means to monitor network traffic in real time as a means
to identify and block unusual activity
hide internal IP addresses
Identify the fundamentals of public key infrastructure (PKI).
Describe the manner in which your solution will protect the
privacy of data transmitted across the WAN.
Analyze the requirements necessary to allow for proper
operating system and application patch management and
describe a solution that would be effective.
Use at least three (3) quality resources in this assignment.
Note:
Wikipedia and similar Websites do not qualify as quality
resources.
Note:
The graphically depicted solution is not included in the
required page length.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size
12), with one-inch margins on all sides; citations and references
must follow APA or school-specific format. Check with your
professor for any additional instructions.
Include a cover page containing the title of the assignment, the
student’s name, the professor’s name, the course title, and the
date. The cover page and the reference page are not included in
the required assignment page length.
Include charts or diagrams created in Visio or an equivalent
such as Dia or OpenOffice. The completed diagrams / charts
must be imported into the Word document before the paper is
submitted.
The specific course learning outcomes associated with this
assignment are:
Analyze information security systems compliance requirements
within the Workstation and LAN Domains.
Use technology and information resources to research issues in
security strategy and policy formation.
Write clearly and concisely about topics related to information
technology audit and control using proper writing mechanics
and technical style conventions.

More Related Content

Similar to Imagine you are an Information Systems Security Officer for a medium.docx

Assignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docx
Assignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docxAssignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docx
Assignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docx
danielfoster65629
 
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docxAssignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
astonrenna
 
Imagine you are an Information Systems Security Officer for a me.docx
Imagine you are an Information Systems Security Officer for a me.docxImagine you are an Information Systems Security Officer for a me.docx
Imagine you are an Information Systems Security Officer for a me.docx
terirasco
 
Assignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docxAssignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docx
astonrenna
 
Imagine you are an Information Systems Security Officer for a medium.pdf
Imagine you are an Information Systems Security Officer for a medium.pdfImagine you are an Information Systems Security Officer for a medium.pdf
Imagine you are an Information Systems Security Officer for a medium.pdf
arccreation001
 
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docxAssignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
carlibradley31429
 
The infrastructure which encompasses the network solution and securi.docx
The infrastructure which encompasses the network solution and securi.docxThe infrastructure which encompasses the network solution and securi.docx
The infrastructure which encompasses the network solution and securi.docx
kailynochseu
 
The infrastructure which encompasses the network solution and se.docx
The infrastructure which encompasses the network solution and se.docxThe infrastructure which encompasses the network solution and se.docx
The infrastructure which encompasses the network solution and se.docx
laurieellan
 
GAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
GAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docxGAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
GAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
starkeykellye
 
The infrastructure which encompasses the network solution and securi.docx
The infrastructure which encompasses the network solution and securi.docxThe infrastructure which encompasses the network solution and securi.docx
The infrastructure which encompasses the network solution and securi.docx
jmindy
 
Assignment InstructionsInstructionsNote A 15 or less origi.docx
Assignment InstructionsInstructionsNote A 15  or less origi.docxAssignment InstructionsInstructionsNote A 15  or less origi.docx
Assignment InstructionsInstructionsNote A 15 or less origi.docx
AMMY30
 
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and worCase Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
ogglili
 

Similar to Imagine you are an Information Systems Security Officer for a medium.docx (18)

Assignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docx
Assignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docxAssignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docx
Assignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docx
 
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docxAssignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
 
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domainUop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
 
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domainUop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
 
Imagine you are an Information Systems Security Officer for a me.docx
Imagine you are an Information Systems Security Officer for a me.docxImagine you are an Information Systems Security Officer for a me.docx
Imagine you are an Information Systems Security Officer for a me.docx
 
Assignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docxAssignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docx
 
Imagine you are an Information Systems Security Officer for a medium.pdf
Imagine you are an Information Systems Security Officer for a medium.pdfImagine you are an Information Systems Security Officer for a medium.pdf
Imagine you are an Information Systems Security Officer for a medium.pdf
 
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docxAssignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
 
The infrastructure which encompasses the network solution and securi.docx
The infrastructure which encompasses the network solution and securi.docxThe infrastructure which encompasses the network solution and securi.docx
The infrastructure which encompasses the network solution and securi.docx
 
The infrastructure which encompasses the network solution and se.docx
The infrastructure which encompasses the network solution and se.docxThe infrastructure which encompasses the network solution and se.docx
The infrastructure which encompasses the network solution and se.docx
 
GAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
GAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docxGAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
GAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
 
CIS 341 Success Begins / snaptutorial.com
CIS 341 Success Begins / snaptutorial.comCIS 341 Success Begins / snaptutorial.com
CIS 341 Success Begins / snaptutorial.com
 
Cis 341 Enthusiastic Study - snaptutorial.com
Cis 341 Enthusiastic Study - snaptutorial.comCis 341 Enthusiastic Study - snaptutorial.com
Cis 341 Enthusiastic Study - snaptutorial.com
 
Cis 341 Technology levels--snaptutorial.com
Cis 341 Technology levels--snaptutorial.comCis 341 Technology levels--snaptutorial.com
Cis 341 Technology levels--snaptutorial.com
 
The infrastructure which encompasses the network solution and securi.docx
The infrastructure which encompasses the network solution and securi.docxThe infrastructure which encompasses the network solution and securi.docx
The infrastructure which encompasses the network solution and securi.docx
 
Assignment InstructionsInstructionsNote A 15 or less origi.docx
Assignment InstructionsInstructionsNote A 15  or less origi.docxAssignment InstructionsInstructionsNote A 15  or less origi.docx
Assignment InstructionsInstructionsNote A 15 or less origi.docx
 
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...
 
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and worCase Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
 

More from gordienaysmythe

CLINICAL SCHOLARSHIPTuberculosis Treatment for Mexican Ame.docx
CLINICAL SCHOLARSHIPTuberculosis Treatment for Mexican Ame.docxCLINICAL SCHOLARSHIPTuberculosis Treatment for Mexican Ame.docx
CLINICAL SCHOLARSHIPTuberculosis Treatment for Mexican Ame.docx
gordienaysmythe
 
cmdfile.txtsleep 5ls -latrsleep 3pwdsleep 1wc .docx
cmdfile.txtsleep 5ls -latrsleep 3pwdsleep 1wc .docxcmdfile.txtsleep 5ls -latrsleep 3pwdsleep 1wc .docx
cmdfile.txtsleep 5ls -latrsleep 3pwdsleep 1wc .docx
gordienaysmythe
 
CLOUD COMPUTINGAssessment item 3 - AWS implementation – 10Ove.docx
CLOUD COMPUTINGAssessment item 3 - AWS implementation – 10Ove.docxCLOUD COMPUTINGAssessment item 3 - AWS implementation – 10Ove.docx
CLOUD COMPUTINGAssessment item 3 - AWS implementation – 10Ove.docx
gordienaysmythe
 
Clinical Case Studies8(6) 417 –423© The Author(s) 2009.docx
Clinical Case Studies8(6) 417 –423© The Author(s) 2009.docxClinical Case Studies8(6) 417 –423© The Author(s) 2009.docx
Clinical Case Studies8(6) 417 –423© The Author(s) 2009.docx
gordienaysmythe
 
Clinical Case Studies8(5) 383 –402© The Author(s) 2009.docx
Clinical Case Studies8(5) 383 –402© The Author(s) 2009.docxClinical Case Studies8(5) 383 –402© The Author(s) 2009.docx
Clinical Case Studies8(5) 383 –402© The Author(s) 2009.docx
gordienaysmythe
 
Climate ChangeWhat every designer should know.This i.docx
Climate ChangeWhat every designer should know.This i.docxClimate ChangeWhat every designer should know.This i.docx
Climate ChangeWhat every designer should know.This i.docx
gordienaysmythe
 
CLIENT INTERVIEW SHEETDate ______________.docx
CLIENT INTERVIEW SHEETDate     ______________.docxCLIENT INTERVIEW SHEETDate     ______________.docx
CLIENT INTERVIEW SHEETDate ______________.docx
gordienaysmythe
 
Click the link above to submit your assignment.Students, please .docx
Click the link above to submit your assignment.Students, please .docxClick the link above to submit your assignment.Students, please .docx
Click the link above to submit your assignment.Students, please .docx
gordienaysmythe
 
CLASSICSOFWESTERN PHILOSOPHY2CLASSICSO.docx
CLASSICSOFWESTERN PHILOSOPHY2CLASSICSO.docxCLASSICSOFWESTERN PHILOSOPHY2CLASSICSO.docx
CLASSICSOFWESTERN PHILOSOPHY2CLASSICSO.docx
gordienaysmythe
 
Classic Combo PlateDirectionsBefore there were all th.docx
Classic Combo PlateDirectionsBefore there were all th.docxClassic Combo PlateDirectionsBefore there were all th.docx
Classic Combo PlateDirectionsBefore there were all th.docx
gordienaysmythe
 
Classic Gardens and Landscapes counts responses to specialty pro.docx
Classic Gardens and Landscapes counts responses to specialty pro.docxClassic Gardens and Landscapes counts responses to specialty pro.docx
Classic Gardens and Landscapes counts responses to specialty pro.docx
gordienaysmythe
 
Class, this is the final forum of the course.  From our readings fro.docx
Class, this is the final forum of the course.  From our readings fro.docxClass, this is the final forum of the course.  From our readings fro.docx
Class, this is the final forum of the course.  From our readings fro.docx
gordienaysmythe
 
Class Subjects we went overWEEK 1 April 5thMULTICULTURAL.docx
Class Subjects we went overWEEK 1         April 5thMULTICULTURAL.docxClass Subjects we went overWEEK 1         April 5thMULTICULTURAL.docx
Class Subjects we went overWEEK 1 April 5thMULTICULTURAL.docx
gordienaysmythe
 
Class ProfileStudent NameEnglish Language LearnerSocio.docx
Class ProfileStudent NameEnglish Language LearnerSocio.docxClass ProfileStudent NameEnglish Language LearnerSocio.docx
Class ProfileStudent NameEnglish Language LearnerSocio.docx
gordienaysmythe
 

More from gordienaysmythe (20)

CLINICAL SCHOLARSHIPTuberculosis Treatment for Mexican Ame.docx
CLINICAL SCHOLARSHIPTuberculosis Treatment for Mexican Ame.docxCLINICAL SCHOLARSHIPTuberculosis Treatment for Mexican Ame.docx
CLINICAL SCHOLARSHIPTuberculosis Treatment for Mexican Ame.docx
 
cmdfile.txtsleep 5ls -latrsleep 3pwdsleep 1wc .docx
cmdfile.txtsleep 5ls -latrsleep 3pwdsleep 1wc .docxcmdfile.txtsleep 5ls -latrsleep 3pwdsleep 1wc .docx
cmdfile.txtsleep 5ls -latrsleep 3pwdsleep 1wc .docx
 
CLOUD COMPUTINGAssessment item 3 - AWS implementation – 10Ove.docx
CLOUD COMPUTINGAssessment item 3 - AWS implementation – 10Ove.docxCLOUD COMPUTINGAssessment item 3 - AWS implementation – 10Ove.docx
CLOUD COMPUTINGAssessment item 3 - AWS implementation – 10Ove.docx
 
Clinical Case Studies8(6) 417 –423© The Author(s) 2009.docx
Clinical Case Studies8(6) 417 –423© The Author(s) 2009.docxClinical Case Studies8(6) 417 –423© The Author(s) 2009.docx
Clinical Case Studies8(6) 417 –423© The Author(s) 2009.docx
 
Clinical Case Studies8(5) 383 –402© The Author(s) 2009.docx
Clinical Case Studies8(5) 383 –402© The Author(s) 2009.docxClinical Case Studies8(5) 383 –402© The Author(s) 2009.docx
Clinical Case Studies8(5) 383 –402© The Author(s) 2009.docx
 
Climate ChangeWhat every designer should know.This i.docx
Climate ChangeWhat every designer should know.This i.docxClimate ChangeWhat every designer should know.This i.docx
Climate ChangeWhat every designer should know.This i.docx
 
CLIENT INTERVIEW SHEETDate ______________.docx
CLIENT INTERVIEW SHEETDate     ______________.docxCLIENT INTERVIEW SHEETDate     ______________.docx
CLIENT INTERVIEW SHEETDate ______________.docx
 
Click the link above to submit your assignment.Students, please .docx
Click the link above to submit your assignment.Students, please .docxClick the link above to submit your assignment.Students, please .docx
Click the link above to submit your assignment.Students, please .docx
 
click the link and watch the following video death by socialism an.docx
click the link and watch the following video death by socialism an.docxclick the link and watch the following video death by socialism an.docx
click the link and watch the following video death by socialism an.docx
 
Click the link above to complete this journal.  The topics of the jo.docx
Click the link above to complete this journal.  The topics of the jo.docxClick the link above to complete this journal.  The topics of the jo.docx
Click the link above to complete this journal.  The topics of the jo.docx
 
Classify man from the Domain to the species and discuss each categor.docx
Classify man from the Domain to the species and discuss each categor.docxClassify man from the Domain to the species and discuss each categor.docx
Classify man from the Domain to the species and discuss each categor.docx
 
Classroom Discussion is a valuable learning tool in that it.docx
Classroom Discussion is a valuable learning tool in that it.docxClassroom Discussion is a valuable learning tool in that it.docx
Classroom Discussion is a valuable learning tool in that it.docx
 
CLASSICSOFWESTERN PHILOSOPHY2CLASSICSO.docx
CLASSICSOFWESTERN PHILOSOPHY2CLASSICSO.docxCLASSICSOFWESTERN PHILOSOPHY2CLASSICSO.docx
CLASSICSOFWESTERN PHILOSOPHY2CLASSICSO.docx
 
Classification Alternative Techniques Assignment1) Define a.docx
Classification Alternative Techniques Assignment1) Define a.docxClassification Alternative Techniques Assignment1) Define a.docx
Classification Alternative Techniques Assignment1) Define a.docx
 
Classic Combo PlateDirectionsBefore there were all th.docx
Classic Combo PlateDirectionsBefore there were all th.docxClassic Combo PlateDirectionsBefore there were all th.docx
Classic Combo PlateDirectionsBefore there were all th.docx
 
Class- As stated on in Chapter 6, Walsh & Sattes (2010) write that” .docx
Class- As stated on in Chapter 6, Walsh & Sattes (2010) write that” .docxClass- As stated on in Chapter 6, Walsh & Sattes (2010) write that” .docx
Class- As stated on in Chapter 6, Walsh & Sattes (2010) write that” .docx
 
Classic Gardens and Landscapes counts responses to specialty pro.docx
Classic Gardens and Landscapes counts responses to specialty pro.docxClassic Gardens and Landscapes counts responses to specialty pro.docx
Classic Gardens and Landscapes counts responses to specialty pro.docx
 
Class, this is the final forum of the course.  From our readings fro.docx
Class, this is the final forum of the course.  From our readings fro.docxClass, this is the final forum of the course.  From our readings fro.docx
Class, this is the final forum of the course.  From our readings fro.docx
 
Class Subjects we went overWEEK 1 April 5thMULTICULTURAL.docx
Class Subjects we went overWEEK 1         April 5thMULTICULTURAL.docxClass Subjects we went overWEEK 1         April 5thMULTICULTURAL.docx
Class Subjects we went overWEEK 1 April 5thMULTICULTURAL.docx
 
Class ProfileStudent NameEnglish Language LearnerSocio.docx
Class ProfileStudent NameEnglish Language LearnerSocio.docxClass ProfileStudent NameEnglish Language LearnerSocio.docx
Class ProfileStudent NameEnglish Language LearnerSocio.docx
 

Recently uploaded

Industrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportIndustrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training Report
Avinash Rai
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 

Recently uploaded (20)

GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Benefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational ResourcesBenefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational Resources
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptxJose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Industrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportIndustrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training Report
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
NLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptxNLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptx
 

Imagine you are an Information Systems Security Officer for a medium.docx

  • 1. Imagine you are an Information Systems Security Officer for a medium-sized financial services firm that has operations in four (4) states (Virginia, Florida, Arizona, and California). Due to the highly sensitive data created, stored, and transported by your organization, the CIO is concerned with implementing proper security controls for the LAN-to-WAN domain. Specifically, the CIO is concerned with the following areas: Protecting data privacy across the WAN Filtering undesirable network traffic from the Internet Filtering the traffic to the Internet that does not adhere to the organizational acceptable use policy (AUP) for the Web Having a zone that allows access for anonymous users but aggressively controls information exchange with internal resources Having an area designed to trap attackers in order to monitor attacker activities Allowing a means to monitor network traffic in real time as a means to identify and block unusual activity Hiding internal IP addresses Allowing operating system and application patch management The CIO has tasked you with proposing a series of hardware and software controls designed to provide security for the LAN-to- WAN domain. The CIO anticipates receiving both a written report and diagram(s) to support your recommendations. Write a three to five (3-5) page paper in which you: Use MS Visio or an open source equivalent to graphically depict a solution for the provided scenario that will: filter undesirable network traffic from the Internet filter Web traffic to the Internet that does not adhere to the organizational AUP for the Web allow for a zone for anonymous users but aggressively controls information exchange with internal resources allow for an area designed to trap attackers in order to monitor attacker activities offer a means to monitor network traffic in real time as a means
  • 2. to identify and block unusual activity hide internal IP addresses Identify the fundamentals of public key infrastructure (PKI). Describe the manner in which your solution will protect the privacy of data transmitted across the WAN. Analyze the requirements necessary to allow for proper operating system and application patch management and describe a solution that would be effective. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Note: The graphically depicted solution is not included in the required page length. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. Include charts or diagrams created in Visio or an equivalent such as Dia or OpenOffice. The completed diagrams / charts must be imported into the Word document before the paper is submitted. The specific course learning outcomes associated with this assignment are: Analyze information security systems compliance requirements within the Workstation and LAN Domains. Use technology and information resources to research issues in security strategy and policy formation. Write clearly and concisely about topics related to information
  • 3. technology audit and control using proper writing mechanics and technical style conventions.