SlideShare a Scribd company logo
No plagiarized work. I need 8 to 9 page paper analyzing the
security weaknesses within the company listed below. Two
weaknesses within the existing company must be analyzed –
hardware, software, or the existing security policy not to
include the password policy. The two items (hardware,
software, or policy ) must be identified as an item that requires
security.
To clarify an item that requires improved security, you must
identify one of these items:
· one hardware and one software weakness
· one hardware and one policy weakness
· one software and one policy weakness
It must be in APA format and the Quality Web Design
organization listed below is the Project Company Overview /
Scenario.
6 Cited and verifiable resources are needed. Scholarly articles
or sources I can gain access to are a must.
The paper is due November 4th, 2014. I will pay $75 for
QUALITY and on-time delivery.
Suggested Reference – Security in Computing – Charles P.
Pfleeger and Shari Lawrence Pfleeger
Company Overview
Quality Web Design (QWD) is an organization that specializes
in Web site and Web content design for all types of
businesses. QWD's mission is to provide top quality Web
design that will increase consumer generated revenue to QWD's
customer Web sites. QWD's database contains over 250,000
proprietary images and graphical designs that will enhance most
Web site's appeal to a target demographic.
Business Processes
Quality Web Design has several mission critical business
processes. First is the use of the repository of Web site
templates, custom written scripts and/or custom applications.
This repository is stored in a Microsoft Visual Studio Team
Foundation Service (TFS) server. This application is used to
monitor the project development lifecycle of custom Visual
Studio applications from inception to deployment, including the
quality assurance testing phase. Other critical business
processes are QWD's accounting, payroll and Marketing
operations all of which are supported by IT assets. There are
strict technology-based access controls associated with each of
these systems to ensure that only authorized personnel can
access them.
Digital Assets
These are shown in the network diagrams below
WAN
· (2) T1 Frame Relay circuits connected to the Internet.
· ISP controlled Internet routers
· Corporate Firewall Model: Juniper ISG2000 integrated
Firewall, VPN, and Intrusion Detection and Prevention system.
Remote office firewall is a Juniper SSG140.
· L2TP/IPSec VPN tunnel between the corporate firewall and
the office firewall to allow for secure data flow.
Corporate Office
· Internal LAN switch is an HP 5400zl series with 147 ports
with 10/100/1000 GB connectivity.
· (2) HP ProCurve MSM410 Access Point US wireless access
points.
· Microsoft TFS code repository consists of 1 Web server, 1
application server, and 1 database code repository.
· Web server includes, Microsoft Share Point portal for
department document and Web sites. Corporate intranet site.
· Microsoft SQL 2008 Database server used for storage of
custom designed graphics and custom application image control
system.
· File and Print server services.
· Microsoft Exchange 2007 email servers, include (2) Client
Access (CAS) and Hub Transport (HT) Servers, 1 backend
mailbox servers.
· HP Storage Works SAN with 6 TB disk space.
· (2) Microsoft Windows 2008 domain controllers.
· Approximately 50 user computers, 35 laptops and 15 desktops.
· (4) network printers
· (30) Mobile devices, IPhones, and Windows Mobile 6 devices.
Remote Office:
· HP ProCurve Switch 3500yl-48G0PWR intelligent Edge. This
is a 48 10/100/1000 GB port intelligent switch.
· (2) HP ProCurve MSM410 Access Point US wireless access
points.
· Microsoft TFS code repository, consists of 1 Web server, 1
application server that connects to the database server in the
corporate office through the IPSec tunnel.
· (2) Microsoft Windows 2008 domain controllers.
· File and Print server services.
· Approximately 20 user computers, 15 laptops and 5 desktops.
· (2) Network printers
· (15) Mobile devices consisting of IPhones, and Windows
Mobile 6 devices.
Externally Published Services
Corporate and remote offices have the following services that
are accessible for employees. From corporate owned computer
or mobile device employees can access VPN, Outlook Web
Access for email, or Active Sync for Exchange server. On any
computer in the world employees can access Outlook Web
Access for email. Customers are only allowed to access to the
Corporate Web site.
Security Controls
There is a published corporate security manual that covers the
following security practices. Username standard including
having a separate account for any elevated privileges. Password
length, complexity, rotation and history requirements. Data
classification levels depend upon what type of data each system
contains and security group accounts control access to each data
classification level. Security training is also describe and
required communications quarterly and annual training classes.
SEE THE PROJECT EXAMPLE BELOW FOR A SUGGESTED
FORMAT
Course Project Format Example
Table of Contents
Executive Summary1
Company Overview1
Security Vulnerabilities3
A Hardware Example Title3
A Software Example Title4
Recommended
Solution
s5
A Hardware Example

More Related Content

Similar to No plagiarized work. I need 8 to 9 page paper analyzing the.docx

Company Profile Managemenyt company.pptx
Company Profile Managemenyt company.pptxCompany Profile Managemenyt company.pptx
Company Profile Managemenyt company.pptx
hendrik441443
 
DACHNUG50 BigFix WorkspaceAndAutomation.pdf
DACHNUG50 BigFix WorkspaceAndAutomation.pdfDACHNUG50 BigFix WorkspaceAndAutomation.pdf
DACHNUG50 BigFix WorkspaceAndAutomation.pdf
DNUG e.V.
 
Tools of noc
Tools of nocTools of noc
Tools of noc
munawarul
 
LNL Company Profile-NEW
LNL Company Profile-NEWLNL Company Profile-NEW
LNL Company Profile-NEW
Jayesh Unadkat
 
Check Point appliances brochure 2012
Check Point appliances brochure 2012Check Point appliances brochure 2012
Check Point appliances brochure 2012
Group of company MUK
 
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docxWWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
ericbrooks84875
 
Comguard expanding-portfolio
Comguard expanding-portfolioComguard expanding-portfolio
Comguard expanding-portfolio
xband
 
SoftLayer Value Proposition v1.04
SoftLayer Value Proposition v1.04SoftLayer Value Proposition v1.04
SoftLayer Value Proposition v1.04
Avinaba Basu
 
Itic 2016 global server hardware, server os reliability report
Itic 2016 global server hardware, server os reliability report Itic 2016 global server hardware, server os reliability report
Itic 2016 global server hardware, server os reliability report
Diego Alberto Tamayo
 
smart-net-total-care-data-sheet
smart-net-total-care-data-sheetsmart-net-total-care-data-sheet
smart-net-total-care-data-sheet
Gabrielle Curtis
 
Completed+Presentation+Capstone
Completed+Presentation+CapstoneCompleted+Presentation+Capstone
Completed+Presentation+Capstone
carl1968
 
DUG IT Department
DUG IT DepartmentDUG IT Department
DUG IT Department
Ali kekhia PMP,ITIL,OCP,ETM
 
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
David J Rosenthal
 
Sharanabasappa_Resume
Sharanabasappa_Resume Sharanabasappa_Resume
Sharanabasappa_Resume
Sharanabasappa Vithalrao
 
Background Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxBackground Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docx
ikirkton
 
Ashwani_Kumar_Resume
Ashwani_Kumar_ResumeAshwani_Kumar_Resume
Ashwani_Kumar_Resume
Ashwani Kumar
 
Firewall friendly pipeline for secure data access
Firewall friendly pipeline for secure data accessFirewall friendly pipeline for secure data access
Firewall friendly pipeline for secure data access
Sumit Sarkar
 
Mark_Koehler_Resume_JUN2015_v1.1
Mark_Koehler_Resume_JUN2015_v1.1Mark_Koehler_Resume_JUN2015_v1.1
Mark_Koehler_Resume_JUN2015_v1.1
Mark Koehler
 
Protech Profile Ppt
Protech Profile PptProtech Profile Ppt
Protech Profile Ppt
Sujit Amin
 
Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docxAuthentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
rock73
 

Similar to No plagiarized work. I need 8 to 9 page paper analyzing the.docx (20)

Company Profile Managemenyt company.pptx
Company Profile Managemenyt company.pptxCompany Profile Managemenyt company.pptx
Company Profile Managemenyt company.pptx
 
DACHNUG50 BigFix WorkspaceAndAutomation.pdf
DACHNUG50 BigFix WorkspaceAndAutomation.pdfDACHNUG50 BigFix WorkspaceAndAutomation.pdf
DACHNUG50 BigFix WorkspaceAndAutomation.pdf
 
Tools of noc
Tools of nocTools of noc
Tools of noc
 
LNL Company Profile-NEW
LNL Company Profile-NEWLNL Company Profile-NEW
LNL Company Profile-NEW
 
Check Point appliances brochure 2012
Check Point appliances brochure 2012Check Point appliances brochure 2012
Check Point appliances brochure 2012
 
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docxWWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
 
Comguard expanding-portfolio
Comguard expanding-portfolioComguard expanding-portfolio
Comguard expanding-portfolio
 
SoftLayer Value Proposition v1.04
SoftLayer Value Proposition v1.04SoftLayer Value Proposition v1.04
SoftLayer Value Proposition v1.04
 
Itic 2016 global server hardware, server os reliability report
Itic 2016 global server hardware, server os reliability report Itic 2016 global server hardware, server os reliability report
Itic 2016 global server hardware, server os reliability report
 
smart-net-total-care-data-sheet
smart-net-total-care-data-sheetsmart-net-total-care-data-sheet
smart-net-total-care-data-sheet
 
Completed+Presentation+Capstone
Completed+Presentation+CapstoneCompleted+Presentation+Capstone
Completed+Presentation+Capstone
 
DUG IT Department
DUG IT DepartmentDUG IT Department
DUG IT Department
 
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
 
Sharanabasappa_Resume
Sharanabasappa_Resume Sharanabasappa_Resume
Sharanabasappa_Resume
 
Background Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxBackground Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docx
 
Ashwani_Kumar_Resume
Ashwani_Kumar_ResumeAshwani_Kumar_Resume
Ashwani_Kumar_Resume
 
Firewall friendly pipeline for secure data access
Firewall friendly pipeline for secure data accessFirewall friendly pipeline for secure data access
Firewall friendly pipeline for secure data access
 
Mark_Koehler_Resume_JUN2015_v1.1
Mark_Koehler_Resume_JUN2015_v1.1Mark_Koehler_Resume_JUN2015_v1.1
Mark_Koehler_Resume_JUN2015_v1.1
 
Protech Profile Ppt
Protech Profile PptProtech Profile Ppt
Protech Profile Ppt
 
Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docxAuthentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
 

More from henrymartin15260

NT2580 Week 1 Understanding IT Infrastructure Security An.docx
NT2580 Week 1 Understanding IT Infrastructure Security An.docxNT2580 Week 1 Understanding IT Infrastructure Security An.docx
NT2580 Week 1 Understanding IT Infrastructure Security An.docx
henrymartin15260
 
NTC362 Week 3OSI Model, Switching Systems, Network Channel Pr.docx
NTC362   Week 3OSI Model, Switching Systems, Network Channel Pr.docxNTC362   Week 3OSI Model, Switching Systems, Network Channel Pr.docx
NTC362 Week 3OSI Model, Switching Systems, Network Channel Pr.docx
henrymartin15260
 
NT2580 Week 4 Hardening a NetworkAnalysis 4.2Availability, In.docx
NT2580 Week 4 Hardening a NetworkAnalysis 4.2Availability, In.docxNT2580 Week 4 Hardening a NetworkAnalysis 4.2Availability, In.docx
NT2580 Week 4 Hardening a NetworkAnalysis 4.2Availability, In.docx
henrymartin15260
 
NTNU, May 2009 ntnu.nocbm 1 LEARNING AND MEMORY .docx
NTNU, May 2009 ntnu.nocbm 1 LEARNING AND MEMORY .docxNTNU, May 2009 ntnu.nocbm 1 LEARNING AND MEMORY .docx
NTNU, May 2009 ntnu.nocbm 1 LEARNING AND MEMORY .docx
henrymartin15260
 
nowHow to be Army StrongI was 18 years old when I saw my fa.docx
nowHow to be Army StrongI was 18 years old when I saw my fa.docxnowHow to be Army StrongI was 18 years old when I saw my fa.docx
nowHow to be Army StrongI was 18 years old when I saw my fa.docx
henrymartin15260
 
NR-351 Transitions in Professional NursingWebsite Evaluation T.docx
NR-351 Transitions in Professional NursingWebsite Evaluation T.docxNR-351 Transitions in Professional NursingWebsite Evaluation T.docx
NR-351 Transitions in Professional NursingWebsite Evaluation T.docx
henrymartin15260
 
Ntc 362 Week 2, Integrative Network Design Project , Part 1By Alucar.docx
Ntc 362 Week 2, Integrative Network Design Project , Part 1By Alucar.docxNtc 362 Week 2, Integrative Network Design Project , Part 1By Alucar.docx
Ntc 362 Week 2, Integrative Network Design Project , Part 1By Alucar.docx
henrymartin15260
 
NTHEMIND OF GREATCOMPANIESBy Scott BlanchardThe.docx
NTHEMIND OF GREATCOMPANIESBy Scott BlanchardThe.docxNTHEMIND OF GREATCOMPANIESBy Scott BlanchardThe.docx
NTHEMIND OF GREATCOMPANIESBy Scott BlanchardThe.docx
henrymartin15260
 
nR E E 693 5T o c o m p l e t e th i s e x a m y o u n.docx
nR E E 693 5T o c o m p l e t e th i s e x a m y o u n.docxnR E E 693 5T o c o m p l e t e th i s e x a m y o u n.docx
nR E E 693 5T o c o m p l e t e th i s e x a m y o u n.docx
henrymartin15260
 
NSG6001 Advanced Practice Nursing I Page 1 of 5 © 2007 S.docx
NSG6001 Advanced Practice Nursing I Page 1 of 5 © 2007 S.docxNSG6001 Advanced Practice Nursing I Page 1 of 5 © 2007 S.docx
NSG6001 Advanced Practice Nursing I Page 1 of 5 © 2007 S.docx
henrymartin15260
 
NR360 We Can But Dare We.docx Revised 5 ‐ 9 .docx
NR360   We   Can   But   Dare   We.docx   Revised   5 ‐ 9 .docxNR360   We   Can   But   Dare   We.docx   Revised   5 ‐ 9 .docx
NR360 We Can But Dare We.docx Revised 5 ‐ 9 .docx
henrymartin15260
 
ns;,eilrlt.lnterviewing is one HR function.docx
ns;,eilrlt.lnterviewing is one HR function.docxns;,eilrlt.lnterviewing is one HR function.docx
ns;,eilrlt.lnterviewing is one HR function.docx
henrymartin15260
 
NR443 Guidelines for Caring for PopulationsMilestone 2 As.docx
NR443 Guidelines for Caring for PopulationsMilestone 2 As.docxNR443 Guidelines for Caring for PopulationsMilestone 2 As.docx
NR443 Guidelines for Caring for PopulationsMilestone 2 As.docx
henrymartin15260
 
NRB Dec’99 1WHITHER THE EMERGENCY MANAGER 1Neil R Bri.docx
NRB Dec’99 1WHITHER THE EMERGENCY MANAGER 1Neil R Bri.docxNRB Dec’99 1WHITHER THE EMERGENCY MANAGER 1Neil R Bri.docx
NRB Dec’99 1WHITHER THE EMERGENCY MANAGER 1Neil R Bri.docx
henrymartin15260
 
Now, its time to create that treasure map to hide the treasur.docx
Now, its time to create that treasure map to hide the treasur.docxNow, its time to create that treasure map to hide the treasur.docx
Now, its time to create that treasure map to hide the treasur.docx
henrymartin15260
 
NR361 Information Systems in HealthcareInterview with a Nursing.docx
NR361 Information Systems in HealthcareInterview with a Nursing.docxNR361 Information Systems in HealthcareInterview with a Nursing.docx
NR361 Information Systems in HealthcareInterview with a Nursing.docx
henrymartin15260
 
NR360 Information Systems in Healthcare Team Technology Pr.docx
NR360 Information Systems in Healthcare Team Technology Pr.docxNR360 Information Systems in Healthcare Team Technology Pr.docx
NR360 Information Systems in Healthcare Team Technology Pr.docx
henrymartin15260
 
NR443 Guidelines for Caring for PopulationsMilestone 2 Assess.docx
NR443 Guidelines for Caring for PopulationsMilestone 2 Assess.docxNR443 Guidelines for Caring for PopulationsMilestone 2 Assess.docx
NR443 Guidelines for Caring for PopulationsMilestone 2 Assess.docx
henrymartin15260
 
Nowak Aesthetics, was founded by Dr. Eugene Nowak in 1999, in Ch.docx
Nowak Aesthetics, was founded by Dr. Eugene Nowak in 1999, in Ch.docxNowak Aesthetics, was founded by Dr. Eugene Nowak in 1999, in Ch.docx
Nowak Aesthetics, was founded by Dr. Eugene Nowak in 1999, in Ch.docx
henrymartin15260
 
NR305 Health Assessment Course Project Milestone #2 Nursing Di.docx
NR305 Health Assessment Course Project Milestone #2 Nursing Di.docxNR305 Health Assessment Course Project Milestone #2 Nursing Di.docx
NR305 Health Assessment Course Project Milestone #2 Nursing Di.docx
henrymartin15260
 

More from henrymartin15260 (20)

NT2580 Week 1 Understanding IT Infrastructure Security An.docx
NT2580 Week 1 Understanding IT Infrastructure Security An.docxNT2580 Week 1 Understanding IT Infrastructure Security An.docx
NT2580 Week 1 Understanding IT Infrastructure Security An.docx
 
NTC362 Week 3OSI Model, Switching Systems, Network Channel Pr.docx
NTC362   Week 3OSI Model, Switching Systems, Network Channel Pr.docxNTC362   Week 3OSI Model, Switching Systems, Network Channel Pr.docx
NTC362 Week 3OSI Model, Switching Systems, Network Channel Pr.docx
 
NT2580 Week 4 Hardening a NetworkAnalysis 4.2Availability, In.docx
NT2580 Week 4 Hardening a NetworkAnalysis 4.2Availability, In.docxNT2580 Week 4 Hardening a NetworkAnalysis 4.2Availability, In.docx
NT2580 Week 4 Hardening a NetworkAnalysis 4.2Availability, In.docx
 
NTNU, May 2009 ntnu.nocbm 1 LEARNING AND MEMORY .docx
NTNU, May 2009 ntnu.nocbm 1 LEARNING AND MEMORY .docxNTNU, May 2009 ntnu.nocbm 1 LEARNING AND MEMORY .docx
NTNU, May 2009 ntnu.nocbm 1 LEARNING AND MEMORY .docx
 
nowHow to be Army StrongI was 18 years old when I saw my fa.docx
nowHow to be Army StrongI was 18 years old when I saw my fa.docxnowHow to be Army StrongI was 18 years old when I saw my fa.docx
nowHow to be Army StrongI was 18 years old when I saw my fa.docx
 
NR-351 Transitions in Professional NursingWebsite Evaluation T.docx
NR-351 Transitions in Professional NursingWebsite Evaluation T.docxNR-351 Transitions in Professional NursingWebsite Evaluation T.docx
NR-351 Transitions in Professional NursingWebsite Evaluation T.docx
 
Ntc 362 Week 2, Integrative Network Design Project , Part 1By Alucar.docx
Ntc 362 Week 2, Integrative Network Design Project , Part 1By Alucar.docxNtc 362 Week 2, Integrative Network Design Project , Part 1By Alucar.docx
Ntc 362 Week 2, Integrative Network Design Project , Part 1By Alucar.docx
 
NTHEMIND OF GREATCOMPANIESBy Scott BlanchardThe.docx
NTHEMIND OF GREATCOMPANIESBy Scott BlanchardThe.docxNTHEMIND OF GREATCOMPANIESBy Scott BlanchardThe.docx
NTHEMIND OF GREATCOMPANIESBy Scott BlanchardThe.docx
 
nR E E 693 5T o c o m p l e t e th i s e x a m y o u n.docx
nR E E 693 5T o c o m p l e t e th i s e x a m y o u n.docxnR E E 693 5T o c o m p l e t e th i s e x a m y o u n.docx
nR E E 693 5T o c o m p l e t e th i s e x a m y o u n.docx
 
NSG6001 Advanced Practice Nursing I Page 1 of 5 © 2007 S.docx
NSG6001 Advanced Practice Nursing I Page 1 of 5 © 2007 S.docxNSG6001 Advanced Practice Nursing I Page 1 of 5 © 2007 S.docx
NSG6001 Advanced Practice Nursing I Page 1 of 5 © 2007 S.docx
 
NR360 We Can But Dare We.docx Revised 5 ‐ 9 .docx
NR360   We   Can   But   Dare   We.docx   Revised   5 ‐ 9 .docxNR360   We   Can   But   Dare   We.docx   Revised   5 ‐ 9 .docx
NR360 We Can But Dare We.docx Revised 5 ‐ 9 .docx
 
ns;,eilrlt.lnterviewing is one HR function.docx
ns;,eilrlt.lnterviewing is one HR function.docxns;,eilrlt.lnterviewing is one HR function.docx
ns;,eilrlt.lnterviewing is one HR function.docx
 
NR443 Guidelines for Caring for PopulationsMilestone 2 As.docx
NR443 Guidelines for Caring for PopulationsMilestone 2 As.docxNR443 Guidelines for Caring for PopulationsMilestone 2 As.docx
NR443 Guidelines for Caring for PopulationsMilestone 2 As.docx
 
NRB Dec’99 1WHITHER THE EMERGENCY MANAGER 1Neil R Bri.docx
NRB Dec’99 1WHITHER THE EMERGENCY MANAGER 1Neil R Bri.docxNRB Dec’99 1WHITHER THE EMERGENCY MANAGER 1Neil R Bri.docx
NRB Dec’99 1WHITHER THE EMERGENCY MANAGER 1Neil R Bri.docx
 
Now, its time to create that treasure map to hide the treasur.docx
Now, its time to create that treasure map to hide the treasur.docxNow, its time to create that treasure map to hide the treasur.docx
Now, its time to create that treasure map to hide the treasur.docx
 
NR361 Information Systems in HealthcareInterview with a Nursing.docx
NR361 Information Systems in HealthcareInterview with a Nursing.docxNR361 Information Systems in HealthcareInterview with a Nursing.docx
NR361 Information Systems in HealthcareInterview with a Nursing.docx
 
NR360 Information Systems in Healthcare Team Technology Pr.docx
NR360 Information Systems in Healthcare Team Technology Pr.docxNR360 Information Systems in Healthcare Team Technology Pr.docx
NR360 Information Systems in Healthcare Team Technology Pr.docx
 
NR443 Guidelines for Caring for PopulationsMilestone 2 Assess.docx
NR443 Guidelines for Caring for PopulationsMilestone 2 Assess.docxNR443 Guidelines for Caring for PopulationsMilestone 2 Assess.docx
NR443 Guidelines for Caring for PopulationsMilestone 2 Assess.docx
 
Nowak Aesthetics, was founded by Dr. Eugene Nowak in 1999, in Ch.docx
Nowak Aesthetics, was founded by Dr. Eugene Nowak in 1999, in Ch.docxNowak Aesthetics, was founded by Dr. Eugene Nowak in 1999, in Ch.docx
Nowak Aesthetics, was founded by Dr. Eugene Nowak in 1999, in Ch.docx
 
NR305 Health Assessment Course Project Milestone #2 Nursing Di.docx
NR305 Health Assessment Course Project Milestone #2 Nursing Di.docxNR305 Health Assessment Course Project Milestone #2 Nursing Di.docx
NR305 Health Assessment Course Project Milestone #2 Nursing Di.docx
 

Recently uploaded

Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
danielkiash986
 
Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10
nitinpv4ai
 
Observational Learning
Observational Learning Observational Learning
Observational Learning
sanamushtaq922
 
How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17
Celine George
 
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptxCapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapitolTechU
 
BPSC-105 important questions for june term end exam
BPSC-105 important questions for june term end examBPSC-105 important questions for june term end exam
BPSC-105 important questions for june term end exam
sonukumargpnirsadhan
 
220711130082 Srabanti Bag Internet Resources For Natural Science
220711130082 Srabanti Bag Internet Resources For Natural Science220711130082 Srabanti Bag Internet Resources For Natural Science
220711130082 Srabanti Bag Internet Resources For Natural Science
Kalna College
 
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxxSimple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
RandolphRadicy
 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
deepaannamalai16
 
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
Nguyen Thanh Tu Collection
 
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
Kalna College
 
220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology
Kalna College
 
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
220711130083 SUBHASHREE RAKSHIT  Internet resources for social science220711130083 SUBHASHREE RAKSHIT  Internet resources for social science
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
Kalna College
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
سمير بسيوني
 
Accounting for Restricted Grants When and How To Record Properly
Accounting for Restricted Grants  When and How To Record ProperlyAccounting for Restricted Grants  When and How To Record Properly
Accounting for Restricted Grants When and How To Record Properly
TechSoup
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
nitinpv4ai
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
PsychoTech Services
 
How to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in useHow to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in use
Celine George
 
Ch-4 Forest Society and colonialism 2.pdf
Ch-4 Forest Society and colonialism 2.pdfCh-4 Forest Society and colonialism 2.pdf
Ch-4 Forest Society and colonialism 2.pdf
lakshayrojroj
 
The basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptxThe basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
 
Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10
 
Observational Learning
Observational Learning Observational Learning
Observational Learning
 
How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17
 
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptxCapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
 
BPSC-105 important questions for june term end exam
BPSC-105 important questions for june term end examBPSC-105 important questions for june term end exam
BPSC-105 important questions for june term end exam
 
220711130082 Srabanti Bag Internet Resources For Natural Science
220711130082 Srabanti Bag Internet Resources For Natural Science220711130082 Srabanti Bag Internet Resources For Natural Science
220711130082 Srabanti Bag Internet Resources For Natural Science
 
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxxSimple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
 
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
 
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
 
220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology
 
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
220711130083 SUBHASHREE RAKSHIT  Internet resources for social science220711130083 SUBHASHREE RAKSHIT  Internet resources for social science
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
 
Accounting for Restricted Grants When and How To Record Properly
Accounting for Restricted Grants  When and How To Record ProperlyAccounting for Restricted Grants  When and How To Record Properly
Accounting for Restricted Grants When and How To Record Properly
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
 
How to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in useHow to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in use
 
Ch-4 Forest Society and colonialism 2.pdf
Ch-4 Forest Society and colonialism 2.pdfCh-4 Forest Society and colonialism 2.pdf
Ch-4 Forest Society and colonialism 2.pdf
 
The basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptxThe basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptx
 

No plagiarized work. I need 8 to 9 page paper analyzing the.docx

  • 1. No plagiarized work. I need 8 to 9 page paper analyzing the security weaknesses within the company listed below. Two weaknesses within the existing company must be analyzed – hardware, software, or the existing security policy not to include the password policy. The two items (hardware, software, or policy ) must be identified as an item that requires security. To clarify an item that requires improved security, you must identify one of these items: · one hardware and one software weakness · one hardware and one policy weakness · one software and one policy weakness It must be in APA format and the Quality Web Design organization listed below is the Project Company Overview / Scenario. 6 Cited and verifiable resources are needed. Scholarly articles or sources I can gain access to are a must. The paper is due November 4th, 2014. I will pay $75 for QUALITY and on-time delivery. Suggested Reference – Security in Computing – Charles P. Pfleeger and Shari Lawrence Pfleeger Company Overview Quality Web Design (QWD) is an organization that specializes in Web site and Web content design for all types of businesses. QWD's mission is to provide top quality Web design that will increase consumer generated revenue to QWD's customer Web sites. QWD's database contains over 250,000 proprietary images and graphical designs that will enhance most
  • 2. Web site's appeal to a target demographic. Business Processes Quality Web Design has several mission critical business processes. First is the use of the repository of Web site templates, custom written scripts and/or custom applications. This repository is stored in a Microsoft Visual Studio Team Foundation Service (TFS) server. This application is used to monitor the project development lifecycle of custom Visual Studio applications from inception to deployment, including the quality assurance testing phase. Other critical business processes are QWD's accounting, payroll and Marketing operations all of which are supported by IT assets. There are strict technology-based access controls associated with each of these systems to ensure that only authorized personnel can access them. Digital Assets These are shown in the network diagrams below WAN · (2) T1 Frame Relay circuits connected to the Internet. · ISP controlled Internet routers · Corporate Firewall Model: Juniper ISG2000 integrated Firewall, VPN, and Intrusion Detection and Prevention system. Remote office firewall is a Juniper SSG140. · L2TP/IPSec VPN tunnel between the corporate firewall and the office firewall to allow for secure data flow. Corporate Office · Internal LAN switch is an HP 5400zl series with 147 ports with 10/100/1000 GB connectivity. · (2) HP ProCurve MSM410 Access Point US wireless access points. · Microsoft TFS code repository consists of 1 Web server, 1 application server, and 1 database code repository. · Web server includes, Microsoft Share Point portal for department document and Web sites. Corporate intranet site. · Microsoft SQL 2008 Database server used for storage of custom designed graphics and custom application image control
  • 3. system. · File and Print server services. · Microsoft Exchange 2007 email servers, include (2) Client Access (CAS) and Hub Transport (HT) Servers, 1 backend mailbox servers. · HP Storage Works SAN with 6 TB disk space. · (2) Microsoft Windows 2008 domain controllers. · Approximately 50 user computers, 35 laptops and 15 desktops. · (4) network printers · (30) Mobile devices, IPhones, and Windows Mobile 6 devices. Remote Office: · HP ProCurve Switch 3500yl-48G0PWR intelligent Edge. This is a 48 10/100/1000 GB port intelligent switch. · (2) HP ProCurve MSM410 Access Point US wireless access points. · Microsoft TFS code repository, consists of 1 Web server, 1 application server that connects to the database server in the corporate office through the IPSec tunnel. · (2) Microsoft Windows 2008 domain controllers. · File and Print server services. · Approximately 20 user computers, 15 laptops and 5 desktops. · (2) Network printers · (15) Mobile devices consisting of IPhones, and Windows Mobile 6 devices. Externally Published Services Corporate and remote offices have the following services that are accessible for employees. From corporate owned computer or mobile device employees can access VPN, Outlook Web Access for email, or Active Sync for Exchange server. On any computer in the world employees can access Outlook Web Access for email. Customers are only allowed to access to the Corporate Web site. Security Controls There is a published corporate security manual that covers the
  • 4. following security practices. Username standard including having a separate account for any elevated privileges. Password length, complexity, rotation and history requirements. Data classification levels depend upon what type of data each system contains and security group accounts control access to each data classification level. Security training is also describe and required communications quarterly and annual training classes. SEE THE PROJECT EXAMPLE BELOW FOR A SUGGESTED FORMAT Course Project Format Example
  • 5. Table of Contents Executive Summary1 Company Overview1 Security Vulnerabilities3 A Hardware Example Title3 A Software Example Title4 Recommended Solution s5 A Hardware Example