SlideShare a Scribd company logo
1 of 6
G
Assignment 4: Designing Compliance within the LAN-to-WAN
Domain
Due Week 8 and worth 100 points
Note:
Review the page requirements and formatting instructions for
this assignment closely. Graphically depicted solutions, as well
as the standardized formatting requirements, do NOT count
toward the overall page length.
Imagine you are an Information Systems Security Officer for a
medium-sized financial services firm that has operations in four
(4) states (Virginia, Florida, Arizona, and California). Due to
the highly sensitive data created, stored, and transported by
your organization, the CIO is concerned with implementing
proper security controls for the LAN-to-WAN domain.
Specifically, the CIO is concerned with the following areas:
Protecting data privacy across the WAN
Filtering undesirable network traffic from the Internet
Filtering the traffic to the Internet that does not adhere to the
organizational acceptable use policy (AUP) for the Web
Having a zone that allows access for anonymous users but
aggressively controls information exchange with internal
resources
Having an area designed to trap attackers in order to monitor
attacker activities
Allowing a means to monitor network traffic in real time as a
means to identify and block unusual activity
Hiding internal IP addresses
Allowing operating system and application patch management
The CIO has tasked you with proposing a series of hardware and
software controls designed to provide security for the LAN-to-
WAN domain. The CIO anticipates receiving both a written
report and diagram(s) to support your recommendations.
Write a three to five page paper in which you:
Use MS Visio or an open source equivalent to graphically depict
a solution for the provided scenario that will:
filter undesirable network traffic from the Internet
filter Web traffic to the Internet that does not adhere to the
organizational AUP for the Web
allow for a zone for anonymous users but aggressively controls
information exchange with internal resources
allow for an area designed to trap attackers in order to monitor
attacker activities
offer a means to monitor network traffic in real time as a means
to identify and block unusual activity
hide internal IP addresses
Identify the fundamentals of public key infrastructure (PKI).
Describe the manner in which your solution will protect the
privacy of data transmitted across the WAN.
Analyze the requirements necessary to allow for proper
operating system and application patch management and
describe a solution that would be effective.
Use at least three quality resources in this assignment.
Note:
Wikipedia and similar Websites do not qualify as quality
resources.
Note:
The graphically depicted solution is not included in the required
page length.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size
12), with one-inch margins on all sides; citations and references
must follow APA or school-specific format. Check with your
professor for any additional instructions.
Include a cover page containing the title of the assignment, the
student's name, the professor's name, the course title, and the
date. The cover page and the reference page are not included in
the required assignment page length.
Include charts or diagrams created in Visio or an equivalent
such as Dia or OpenOffice. The completed diagrams / charts
must be imported into the Word document before the paper is
submitted.
The specific course learning outcomes associated with this
assignment are:
Analyze information security systems compliance requirements
within the Workstation and LAN Domains.
Use technology and information resources to research issues in
security strategy and policy formation.
Write clearly and concisely about topics related to information
technology audit and control using proper writing mechanics
and technical style conventions.
Click
here
to view the grading rubric.
ing for this assignment will be based on answer quality, logic /
organization of the paper, and language and writing skills, using
the following rubric.
Points: 100
Assignment 4: Designing Compliance within the LAN-to-WAN
Domain
Criteria
Unacceptable
Below 60% F
Meets Minimum Expectations
60-69% D
Fair
70-79% C
Proficient
80-89% B
Exemplary
90-100% A
1. Use MS Visio or an open source equivalent to graphically
depict a solution for the provided scenario.
Weight: 30%
Did not submit or incompletely
used MS Visio or an open source equivalent to graphically
depict a solution for the provided scenario.
Insufficiently used MS Visio or an open source equivalent to
graphically depict a solution for the provided scenario.
Partially used MS Visio or an open source equivalent to
graphically depict a solution for the provided scenario.
Satisfactorily used MS Visio or an open source equivalent to
graphically depict a solution for the provided scenario.
Thoroughly used MS Visio or an open source equivalent to
graphically depict a solution for the provided scenario.
2. Identify the fundamentals of public key infrastructure (PKI).
Weight: 15%
Did not submit or incompletely
identified the fundamentals of public key infrastructure (PKI).
Insufficiently identified the fundamentals of public key
infrastructure (PKI).
Partially identified the fundamentals of public key
infrastructure (PKI).
Satisfactorily identified the fundamentals of public key
infrastructure (PKI).
Thoroughly identified the fundamentals of public key
infrastructure (PKI).
3. Describe the manner in which your solution will protect the
privacy of data transmitted across the WAN.
Weight: 20%
Did not submit or incompletely
described the manner in which your solution will protect the
privacy of data transmitted across the WAN.
Insufficiently described the manner in which your solution will
protect the privacy of data transmitted across the WAN.
Partially described the manner in which your solution will
protect the privacy of data transmitted across the WAN.
Satisfactorily described the manner in which your solution will
protect the privacy of data transmitted across the WAN.
Thoroughly described the manner in which your solution will
protect the privacy of data transmitted across the WAN.
4. Analyze the requirements necessary to allow for proper
operating system and application patch management and
describe a solution that would be effective.
Weight: 20%
Did not submit or incompletely
analyzed the requirements necessary to allow for proper
operating system and application patch management and did not
submit or incompletely
described a solution that would be effective.
Insufficiently analyzed the requirements necessary to allow for
proper operating system and application patch management and
insufficiently described a solution that would be effective.
Partially analyzed the requirements necessary to allow for
proper operating system and application patch management and
partially described a solution that would be effective.
Satisfactorily analyzed the requirements necessary to allow for
proper operating system and application patch management and
satisfactorily described a solution that would be effective.
Thoroughly analyzed the requirements necessary to allow for
proper operating system and application patch management and
thoroughly described a solution that would be effective.
5. Three references
Weight: 5%
No references provided
Does not meet the required number of references; all references
poor quality choices.
Does not meet the required number of references; some
references poor quality choices.
Meets number of required references; all references high quality
choices.
Exceeds number of required references; all references high
quality choices.
6. Clarity, writing mechanics, and formatting requirements
Weight: 10%
More than eight errors present
Seven to eight errors present
Five to six errors present
Three to four errors present
Zero to two errors present

More Related Content

Similar to GAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docx

Note Review the page requirements and formatting instructions for.docx
Note Review the page requirements and formatting instructions for.docxNote Review the page requirements and formatting instructions for.docx
Note Review the page requirements and formatting instructions for.docx
carlibradley31429
 
Assignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docx
Assignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docxAssignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docx
Assignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docx
danielfoster65629
 
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docxAssignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
astonrenna
 
Project Deliverable 5 Network Infrastructure and SecurityDue Week.docx
Project Deliverable 5 Network Infrastructure and SecurityDue Week.docxProject Deliverable 5 Network Infrastructure and SecurityDue Week.docx
Project Deliverable 5 Network Infrastructure and SecurityDue Week.docx
bfingarjcmc
 
Imagine you are an Information Systems Security Officer for a medium.docx
Imagine you are an Information Systems Security Officer for a medium.docxImagine you are an Information Systems Security Officer for a medium.docx
Imagine you are an Information Systems Security Officer for a medium.docx
gordienaysmythe
 
Imagine you are an Information Systems Security Officer for a medium.docx
Imagine you are an Information Systems Security Officer for a medium.docxImagine you are an Information Systems Security Officer for a medium.docx
Imagine you are an Information Systems Security Officer for a medium.docx
nolanalgernon
 
Assignment 5 Technical Term PaperThe Technical Term Paper will in.docx
Assignment 5 Technical Term PaperThe Technical Term Paper will in.docxAssignment 5 Technical Term PaperThe Technical Term Paper will in.docx
Assignment 5 Technical Term PaperThe Technical Term Paper will in.docx
rosemariebrayshaw
 
erm Paper Penetration TestingDue Week 10 and worth 120 points.docx
erm Paper Penetration TestingDue Week 10 and worth 120 points.docxerm Paper Penetration TestingDue Week 10 and worth 120 points.docx
erm Paper Penetration TestingDue Week 10 and worth 120 points.docx
mealsdeidre
 
Due 12 10 2016Week 10 Term PaperClick the link above to submit.docx
Due 12 10 2016Week 10 Term PaperClick the link above to submit.docxDue 12 10 2016Week 10 Term PaperClick the link above to submit.docx
Due 12 10 2016Week 10 Term PaperClick the link above to submit.docx
sagarlesley
 
Technical Paper Risk AssessmentGlobal Finance, Inc. Netwo.docx
Technical Paper Risk AssessmentGlobal Finance, Inc. Netwo.docxTechnical Paper Risk AssessmentGlobal Finance, Inc. Netwo.docx
Technical Paper Risk AssessmentGlobal Finance, Inc. Netwo.docx
mattinsonjanel
 
Project Deliverable 5 Infrastructure and SecurityThis assignm.docx
Project Deliverable 5 Infrastructure and SecurityThis assignm.docxProject Deliverable 5 Infrastructure and SecurityThis assignm.docx
Project Deliverable 5 Infrastructure and SecurityThis assignm.docx
woodruffeloisa
 
Term Paper WirelessSecurityPlanDue Week 10 and worth 150 po.docx
Term Paper WirelessSecurityPlanDue Week 10 and worth 150 po.docxTerm Paper WirelessSecurityPlanDue Week 10 and worth 150 po.docx
Term Paper WirelessSecurityPlanDue Week 10 and worth 150 po.docx
jonghollingberry
 
Executive Proposal ProjectThe purpose of this project is to evalua.docx
Executive Proposal ProjectThe purpose of this project is to evalua.docxExecutive Proposal ProjectThe purpose of this project is to evalua.docx
Executive Proposal ProjectThe purpose of this project is to evalua.docx
rhetttrevannion
 
Week 10 Assignment 1 SubmissionClick the link above to submit yo.docx
Week 10 Assignment 1 SubmissionClick the link above to submit yo.docxWeek 10 Assignment 1 SubmissionClick the link above to submit yo.docx
Week 10 Assignment 1 SubmissionClick the link above to submit yo.docx
dannies7qbuggie
 
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docxTerm Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
manningchassidy
 
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and woerm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
eleanorabarrington
 

Similar to GAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docx (20)

Note Review the page requirements and formatting instructions for.docx
Note Review the page requirements and formatting instructions for.docxNote Review the page requirements and formatting instructions for.docx
Note Review the page requirements and formatting instructions for.docx
 
Assignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docx
Assignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docxAssignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docx
Assignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docx
 
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docxAssignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
 
Project Deliverable 5 Network Infrastructure and SecurityDue Week.docx
Project Deliverable 5 Network Infrastructure and SecurityDue Week.docxProject Deliverable 5 Network Infrastructure and SecurityDue Week.docx
Project Deliverable 5 Network Infrastructure and SecurityDue Week.docx
 
Imagine you are an Information Systems Security Officer for a medium.docx
Imagine you are an Information Systems Security Officer for a medium.docxImagine you are an Information Systems Security Officer for a medium.docx
Imagine you are an Information Systems Security Officer for a medium.docx
 
Imagine you are an Information Systems Security Officer for a medium.docx
Imagine you are an Information Systems Security Officer for a medium.docxImagine you are an Information Systems Security Officer for a medium.docx
Imagine you are an Information Systems Security Officer for a medium.docx
 
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domainUop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
 
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domainUop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
 
Assignment 5 Technical Term PaperThe Technical Term Paper will in.docx
Assignment 5 Technical Term PaperThe Technical Term Paper will in.docxAssignment 5 Technical Term PaperThe Technical Term Paper will in.docx
Assignment 5 Technical Term PaperThe Technical Term Paper will in.docx
 
erm Paper Penetration TestingDue Week 10 and worth 120 points.docx
erm Paper Penetration TestingDue Week 10 and worth 120 points.docxerm Paper Penetration TestingDue Week 10 and worth 120 points.docx
erm Paper Penetration TestingDue Week 10 and worth 120 points.docx
 
Due 12 10 2016Week 10 Term PaperClick the link above to submit.docx
Due 12 10 2016Week 10 Term PaperClick the link above to submit.docxDue 12 10 2016Week 10 Term PaperClick the link above to submit.docx
Due 12 10 2016Week 10 Term PaperClick the link above to submit.docx
 
Technical Paper Risk AssessmentGlobal Finance, Inc. Netwo.docx
Technical Paper Risk AssessmentGlobal Finance, Inc. Netwo.docxTechnical Paper Risk AssessmentGlobal Finance, Inc. Netwo.docx
Technical Paper Risk AssessmentGlobal Finance, Inc. Netwo.docx
 
Cis 436 Technology levels--snaptutorial.com
Cis 436 Technology levels--snaptutorial.comCis 436 Technology levels--snaptutorial.com
Cis 436 Technology levels--snaptutorial.com
 
Cis 436 Enthusiastic Study / snaptutorial.com
Cis 436 Enthusiastic Study / snaptutorial.comCis 436 Enthusiastic Study / snaptutorial.com
Cis 436 Enthusiastic Study / snaptutorial.com
 
Project Deliverable 5 Infrastructure and SecurityThis assignm.docx
Project Deliverable 5 Infrastructure and SecurityThis assignm.docxProject Deliverable 5 Infrastructure and SecurityThis assignm.docx
Project Deliverable 5 Infrastructure and SecurityThis assignm.docx
 
Term Paper WirelessSecurityPlanDue Week 10 and worth 150 po.docx
Term Paper WirelessSecurityPlanDue Week 10 and worth 150 po.docxTerm Paper WirelessSecurityPlanDue Week 10 and worth 150 po.docx
Term Paper WirelessSecurityPlanDue Week 10 and worth 150 po.docx
 
Executive Proposal ProjectThe purpose of this project is to evalua.docx
Executive Proposal ProjectThe purpose of this project is to evalua.docxExecutive Proposal ProjectThe purpose of this project is to evalua.docx
Executive Proposal ProjectThe purpose of this project is to evalua.docx
 
Week 10 Assignment 1 SubmissionClick the link above to submit yo.docx
Week 10 Assignment 1 SubmissionClick the link above to submit yo.docxWeek 10 Assignment 1 SubmissionClick the link above to submit yo.docx
Week 10 Assignment 1 SubmissionClick the link above to submit yo.docx
 
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docxTerm Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
 
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and woerm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
 

More from starkeykellye

Create a theme study with the University of Phoenix Material .docx
Create a theme study with the University of Phoenix Material .docxCreate a theme study with the University of Phoenix Material .docx
Create a theme study with the University of Phoenix Material .docx
starkeykellye
 

More from starkeykellye (20)

Create a theme study with the University of Phoenix Material .docx
Create a theme study with the University of Phoenix Material .docxCreate a theme study with the University of Phoenix Material .docx
Create a theme study with the University of Phoenix Material .docx
 
Create a PowerPoint® Presentation geared toward teaching a you.docx
Create a PowerPoint® Presentation geared toward teaching a you.docxCreate a PowerPoint® Presentation geared toward teaching a you.docx
Create a PowerPoint® Presentation geared toward teaching a you.docx
 
Create a Microsoft® PowerPoint® presentation discussing th.docx
Create a Microsoft® PowerPoint® presentation discussing th.docxCreate a Microsoft® PowerPoint® presentation discussing th.docx
Create a Microsoft® PowerPoint® presentation discussing th.docx
 
Create a 10- to 12-slide Microsoft® PowerPoint® presentation with .docx
Create a 10- to 12-slide Microsoft® PowerPoint® presentation with .docxCreate a 10- to 12-slide Microsoft® PowerPoint® presentation with .docx
Create a 10- to 12-slide Microsoft® PowerPoint® presentation with .docx
 
Create a matrix between the pluralistic and elitist perspective. W.docx
Create a matrix between the pluralistic and elitist perspective. W.docxCreate a matrix between the pluralistic and elitist perspective. W.docx
Create a matrix between the pluralistic and elitist perspective. W.docx
 
Create a graphic organizer using a Venn diagram, Web diagram, T-.docx
Create a graphic organizer using a Venn diagram, Web diagram, T-.docxCreate a graphic organizer using a Venn diagram, Web diagram, T-.docx
Create a graphic organizer using a Venn diagram, Web diagram, T-.docx
 
Create a detailed diagram or set of diagrams to show how the lette.docx
Create a detailed diagram or set of diagrams to show how the lette.docxCreate a detailed diagram or set of diagrams to show how the lette.docx
Create a detailed diagram or set of diagrams to show how the lette.docx
 
Create a concept map using Microsoft® Word or another similar .docx
Create a concept map using Microsoft® Word or another similar .docxCreate a concept map using Microsoft® Word or another similar .docx
Create a concept map using Microsoft® Word or another similar .docx
 
Create a 4- to 6-slide Microsoft® PowerPoint® presentation exa.docx
Create a 4- to 6-slide Microsoft® PowerPoint® presentation exa.docxCreate a 4- to 6-slide Microsoft® PowerPoint® presentation exa.docx
Create a 4- to 6-slide Microsoft® PowerPoint® presentation exa.docx
 
Create a 15- to 20-slide Microsoft® PowerPoint® presentation dis.docx
Create a 15- to 20-slide Microsoft® PowerPoint® presentation dis.docxCreate a 15- to 20-slide Microsoft® PowerPoint® presentation dis.docx
Create a 15- to 20-slide Microsoft® PowerPoint® presentation dis.docx
 
Create a 15- to 20-slide Microsoft® PowerPoint® presentation d.docx
Create a 15- to 20-slide Microsoft® PowerPoint® presentation d.docxCreate a 15- to 20-slide Microsoft® PowerPoint® presentation d.docx
Create a 15- to 20-slide Microsoft® PowerPoint® presentation d.docx
 
Create a 12- to 15-slide visual presentation that highlights all f.docx
Create a 12- to 15-slide visual presentation that highlights all f.docxCreate a 12- to 15-slide visual presentation that highlights all f.docx
Create a 12- to 15-slide visual presentation that highlights all f.docx
 
Create a 10- to 12-slide, multimedia-rich presentation in whic.docx
Create a 10- to 12-slide, multimedia-rich presentation in whic.docxCreate a 10- to 12-slide, multimedia-rich presentation in whic.docx
Create a 10- to 12-slide, multimedia-rich presentation in whic.docx
 
Create a 10- to 12-slide presentation comparing 2 of the follo.docx
Create a 10- to 12-slide presentation comparing 2 of the follo.docxCreate a 10- to 12-slide presentation comparing 2 of the follo.docx
Create a 10- to 12-slide presentation comparing 2 of the follo.docx
 
Create a 10- to 12-slide presentation, with speaker notes, to a no.docx
Create a 10- to 12-slide presentation, with speaker notes, to a no.docxCreate a 10- to 12-slide presentation, with speaker notes, to a no.docx
Create a 10- to 12-slide presentation, with speaker notes, to a no.docx
 
Create a 10- to 12-slide presentation comparing 2 of the f.docx
Create a 10- to 12-slide presentation comparing 2 of the f.docxCreate a 10- to 12-slide presentation comparing 2 of the f.docx
Create a 10- to 12-slide presentation comparing 2 of the f.docx
 
Create a 10- to 12-slide Microsoft® PowerPoint® presentation t.docx
Create a 10- to 12-slide Microsoft® PowerPoint® presentation t.docxCreate a 10- to 12-slide Microsoft® PowerPoint® presentation t.docx
Create a 10- to 12-slide Microsoft® PowerPoint® presentation t.docx
 
Create a 10- to 12-slide Microsoft® PowerPoint® presentation o.docx
Create a 10- to 12-slide Microsoft® PowerPoint® presentation o.docxCreate a 10- to 12-slide Microsoft® PowerPoint® presentation o.docx
Create a 10- to 12-slide Microsoft® PowerPoint® presentation o.docx
 
Create a 10- to 12-slide Microsoft® PowerPoint® presentation i.docx
Create a 10- to 12-slide Microsoft® PowerPoint® presentation i.docxCreate a 10- to 12-slide Microsoft® PowerPoint® presentation i.docx
Create a 10- to 12-slide Microsoft® PowerPoint® presentation i.docx
 
Create a 10- to 12-slide (not including title and reference slides) .docx
Create a 10- to 12-slide (not including title and reference slides) .docxCreate a 10- to 12-slide (not including title and reference slides) .docx
Create a 10- to 12-slide (not including title and reference slides) .docx
 

Recently uploaded

Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
EADTU
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
中 央社
 

Recently uploaded (20)

Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptx
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
 
An Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge AppAn Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge App
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17
 
MOOD STABLIZERS DRUGS.pptx
MOOD     STABLIZERS           DRUGS.pptxMOOD     STABLIZERS           DRUGS.pptx
MOOD STABLIZERS DRUGS.pptx
 
Including Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdfIncluding Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdf
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in Hinduism
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategies
 
How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 
Book Review of Run For Your Life Powerpoint
Book Review of Run For Your Life PowerpointBook Review of Run For Your Life Powerpoint
Book Review of Run For Your Life Powerpoint
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 

GAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docx

  • 1. G Assignment 4: Designing Compliance within the LAN-to-WAN Domain Due Week 8 and worth 100 points Note: Review the page requirements and formatting instructions for this assignment closely. Graphically depicted solutions, as well as the standardized formatting requirements, do NOT count toward the overall page length. Imagine you are an Information Systems Security Officer for a medium-sized financial services firm that has operations in four (4) states (Virginia, Florida, Arizona, and California). Due to the highly sensitive data created, stored, and transported by your organization, the CIO is concerned with implementing proper security controls for the LAN-to-WAN domain. Specifically, the CIO is concerned with the following areas: Protecting data privacy across the WAN Filtering undesirable network traffic from the Internet Filtering the traffic to the Internet that does not adhere to the organizational acceptable use policy (AUP) for the Web Having a zone that allows access for anonymous users but aggressively controls information exchange with internal resources Having an area designed to trap attackers in order to monitor attacker activities Allowing a means to monitor network traffic in real time as a means to identify and block unusual activity Hiding internal IP addresses Allowing operating system and application patch management The CIO has tasked you with proposing a series of hardware and software controls designed to provide security for the LAN-to- WAN domain. The CIO anticipates receiving both a written report and diagram(s) to support your recommendations. Write a three to five page paper in which you: Use MS Visio or an open source equivalent to graphically depict
  • 2. a solution for the provided scenario that will: filter undesirable network traffic from the Internet filter Web traffic to the Internet that does not adhere to the organizational AUP for the Web allow for a zone for anonymous users but aggressively controls information exchange with internal resources allow for an area designed to trap attackers in order to monitor attacker activities offer a means to monitor network traffic in real time as a means to identify and block unusual activity hide internal IP addresses Identify the fundamentals of public key infrastructure (PKI). Describe the manner in which your solution will protect the privacy of data transmitted across the WAN. Analyze the requirements necessary to allow for proper operating system and application patch management and describe a solution that would be effective. Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Note: The graphically depicted solution is not included in the required page length. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. Include charts or diagrams created in Visio or an equivalent such as Dia or OpenOffice. The completed diagrams / charts must be imported into the Word document before the paper is
  • 3. submitted. The specific course learning outcomes associated with this assignment are: Analyze information security systems compliance requirements within the Workstation and LAN Domains. Use technology and information resources to research issues in security strategy and policy formation. Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions. Click here to view the grading rubric. ing for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric. Points: 100 Assignment 4: Designing Compliance within the LAN-to-WAN Domain Criteria Unacceptable Below 60% F Meets Minimum Expectations 60-69% D Fair 70-79% C Proficient 80-89% B
  • 4. Exemplary 90-100% A 1. Use MS Visio or an open source equivalent to graphically depict a solution for the provided scenario. Weight: 30% Did not submit or incompletely used MS Visio or an open source equivalent to graphically depict a solution for the provided scenario. Insufficiently used MS Visio or an open source equivalent to graphically depict a solution for the provided scenario. Partially used MS Visio or an open source equivalent to graphically depict a solution for the provided scenario. Satisfactorily used MS Visio or an open source equivalent to graphically depict a solution for the provided scenario. Thoroughly used MS Visio or an open source equivalent to graphically depict a solution for the provided scenario. 2. Identify the fundamentals of public key infrastructure (PKI). Weight: 15% Did not submit or incompletely identified the fundamentals of public key infrastructure (PKI). Insufficiently identified the fundamentals of public key infrastructure (PKI). Partially identified the fundamentals of public key infrastructure (PKI). Satisfactorily identified the fundamentals of public key infrastructure (PKI). Thoroughly identified the fundamentals of public key infrastructure (PKI). 3. Describe the manner in which your solution will protect the privacy of data transmitted across the WAN. Weight: 20% Did not submit or incompletely described the manner in which your solution will protect the privacy of data transmitted across the WAN. Insufficiently described the manner in which your solution will
  • 5. protect the privacy of data transmitted across the WAN. Partially described the manner in which your solution will protect the privacy of data transmitted across the WAN. Satisfactorily described the manner in which your solution will protect the privacy of data transmitted across the WAN. Thoroughly described the manner in which your solution will protect the privacy of data transmitted across the WAN. 4. Analyze the requirements necessary to allow for proper operating system and application patch management and describe a solution that would be effective. Weight: 20% Did not submit or incompletely analyzed the requirements necessary to allow for proper operating system and application patch management and did not submit or incompletely described a solution that would be effective. Insufficiently analyzed the requirements necessary to allow for proper operating system and application patch management and insufficiently described a solution that would be effective. Partially analyzed the requirements necessary to allow for proper operating system and application patch management and partially described a solution that would be effective. Satisfactorily analyzed the requirements necessary to allow for proper operating system and application patch management and satisfactorily described a solution that would be effective. Thoroughly analyzed the requirements necessary to allow for proper operating system and application patch management and thoroughly described a solution that would be effective. 5. Three references Weight: 5% No references provided Does not meet the required number of references; all references poor quality choices. Does not meet the required number of references; some references poor quality choices. Meets number of required references; all references high quality
  • 6. choices. Exceeds number of required references; all references high quality choices. 6. Clarity, writing mechanics, and formatting requirements Weight: 10% More than eight errors present Seven to eight errors present Five to six errors present Three to four errors present Zero to two errors present