Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Internet ingress egress traffic policy definition

08/01/2021 Client: saad24vbs Deadline: 12 Hours

Week 3 Assignment: Lab Project


Defining an Information Systems Security Policy Framework for an IT Infrastructure


In any company, a security policy helps to mitigate the risks and threats the business encounters. However, unless a company happens to be in the information security industry, the task of identifying, assessing, and categorizing the myriad of risks can be an overwhelming one. Thankfully, a company’s IT infrastructure can be divided in a logical manner to more easily sort the risks. These divisions are the seven IT domains.


The purpose of the seven domains of a typical IT infrastructure is to help organize the roles, responsibilities, and accountabilities for risk management and risk mitigation.


In this lab, you will identify known risks, threats, and vulnerabilities, and you will determine which domain of a typical IT infrastructure is affected. You will then discuss security policies to address each identified risk and threat within the seven domains of a typical IT infrastructure. You will next determine which appropriate security policy definition will help mitigate the identified risk, threat, or vulnerability. You will organize your results into a framework that can become part of a layered security strategy.


You will submit 2 files at the end of this lab: 1) Lab Report file, and 2) Lab 3 Assessment worksheet


Steps:


1. This assignment also includes a link to download the Lab 3 Assessment worksheet. Review the objectives and the questions from this worksheet. You will find answers to these questions as you proceed through the lab steps.


2. Review the seven domains of a typical IT infrastructure. You can find a chart showing these domains and their components on page 80 of the textbook, or you can search the powerpoint over chapter 4.


3. Go to this link: http://www.continuitycompliance.org/security-policy-components-of-a-good-policy/ and review the information to determine the components of an information systems security policy.


4. Create a Lab Report file, a word document recording the information you find. For the first section of this file, identify the major components of an information systems security policy.


5. Review the following table of risks, threats, and vulnerabilities that were found in a health care IT infrastructure:


Risks, Threats, and Vulnerabilities


Domain


Unauthorized access from public Internet


Hacker penetrates IT infrastructure


Communication circuit outages


Workstation operating system (OS) has a known software vulnerability


Unauthorized access to organization-owned data


Denial of service attack on organization’s email


Remote communications from home office


Workstation browser has software vulnerability


Weak ingress/egress traffic-filtering degrades performance


Wireless Local Area Network (WLAN) access points are needed for Local Area Network (LAN) connectivity within a warehouse


User destroys data in application, deletes all files, and gains access to internal network


Fire destroys primary data center


Intraoffice employee romance gone bad


Loss of production data


Need to prevent rogue users from unauthorized WLAN access


LAN server OS has a known software vulnerability


User downloads an unknown email attachment


Service provider has a major network outage


User inserts CDs and USB hard drives with personal photos, music, and videos on organization-owned computers


Virtual Private Network (VPN) tunneling between the remote computer and ingress/egress router


6. In your Lab Report file, copy the chart and align or assign reach of the risks, threats, and vulnerabilities identified in the previous table to the domain impacted (refer to step 2 above).


7. In your Lab Report file, explain how risks like these can be mitigated with an information systems security policy.


8. Go to this link: https://pdfs.semanticscholar.org/231b/c2ca1c556cb7b46bc46dd49e86f0e6ab8050.pdf and read the SANS Institute document, “A Short Primer for Developing Security Policies.”


9. In your Lab Report file, define what a policy is according to the SANS Institute.


[Note: It is important to understand how and why a policy differs from a standard, a procedure, and a guideline. From the top down, the policy should not change or need modification unless a major shift in corporate values or business process occurs. On the contrary, guidelines should be reviewed, and possibly changed, often. Similarly, even though a policy should be written clearly and concisely, it is a high-level document answering the “why” questions. Standards are also high-level, but instead should answer the “what” questions. Finally, the procedures and guidelines provide the “how.”]


10. Using the SANS primer, in your Lab Report file, describe the basic requirements of policies, their benefits, the control factors, and policies every organization needs.


11. Review the identified risks, threats, and vulnerabilities in the table in step 8, and then select an appropriate policy definition that might help mitigate each of them. You can select one of the SANS policies or choose one from the following list:


a. Acceptable Use Policy


b. Access Control Policy Definition


c. Business Continuity—Business Impact Analysis (BIA) Policy Definition


d. Business Continuity & Disaster Recovery Policy Definition


e. Data Classification Standard & Encryption Policy Definition


f. Internet Ingress/Egress Traffic Policy Definition


g. Mandated Security Awareness Training Policy Definition


h. Production Data Backup Policy Definition


i. Remote Access Policy Definition


j. Vulnerability Management & Vulnerability Window Policy Definition


k. Wide Area Network (WAN) Service Availability Policy Definition


12. In your Lab Report file, add your selected security policies and definitions, identifying what risks, threats, or vulnerabilities each selected policy would mitigate.


This completes the Lab Report file. Save your file using a name that includes your last name.


Now, complete the Lab 3 Assessment Worksheet. You can type in this PDF file, adding your answers. Make sure you also enter your name in the field at the top. Resave the worksheet with a new name that includes your last name.


Submit both files when you submit the Week 3 Assignment.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

University Coursework Help
Top Essay Tutor
Helping Hand
Writer Writer Name Offer Chat
University Coursework Help

ONLINE

University Coursework Help

Hi dear, I am ready to do your homework in a reasonable price.

$77 Chat With Writer
Top Essay Tutor

ONLINE

Top Essay Tutor

I have more than 12 years of experience in managing online classes, exams, and quizzes on different websites like; Connect, McGraw-Hill, and Blackboard. I always provide a guarantee to my clients for their grades.

$80 Chat With Writer
Helping Hand

ONLINE

Helping Hand

I am an Academic writer with 10 years of experience. As an Academic writer, my aim is to generate unique content without Plagiarism as per the client’s requirements.

$75 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

What is the formula mass for diboron tetrachloride - Research Paper - 0.1 m sodium carbonate - Geertz definition of culture - Businesspeople who compose messages for mobile devices should - Explain the juxtaposition in poe's the tell tale heart - Voy a nadar en la piscina necesito - Social ventures australia salary - 10 dollars is how many quarters - Busschaert racing pigeons for sale - Q2 - Nfpa 99 pdf free - Java 2d api graphics pdf - Functionalist perspective on crime and deviance - Assignment 6 - Alliteration in still i rise - Student central western sydney - How difficult can this be dvd - HRM 522 - Explain iot design methodology - Curse of the rosin eating zombies from outer space pdf - Nursing Informatics - Welding blueprint reading test - Romeo and juliet catholic protestant - Board of intermediate education karachi - The company man ellen goodman thesis - Ammonium hydroxide and silver nitrate chemical equation - Bom waikerie 14 day forecast - Alpha cell deep cycle battery - How many ml is 4 units of insulin - Australian rite of passage - Hy-clor p150 pump parts - 04.04 civil rights assessment - Monash endnote product key - Cpni approved security furniture - Case study on production and operation management with solution - Unspecified trauma and stressor related disorder icd 10 code - Unable to attend class email - Andrew driggs attorney las vegas - Business Finance Discussion - Security architecture - Https members nursing quality org ndnqipressureulcertraining - Www sociology uk net a2 - Developing effective communication in health and social care - W8 Research Case - Research paper - Hba training and assessment - Journal: Cloud Computing - 5 Page paper APA format single spaced - BHS380 Module 4 Discussion - Qse ci 4m d - Agency - Logic level shifter jaycar - Week 1 Discussion - Dr michael tong haematologist - And the weak suffer what they must pdf - Persuasive Speak and self review - Cultural considerations presentation - Btec engineering level 3 assignments answers - Byron bay cookies sydney - Angus biofuels bill watson - Family Interview - What is monkey management - Botticelli's landmark painting the birth of venus - Assignment 2 - Adobe acrobat reader dc shopfloor xi - Year 9 body systems test - Mary cover jones achieved counterconditioning with little peter by using - Impact factor nanoscale research letters - Spanish role play examples - Introduction to industrial organization luis m cabral pdf - Questions - Discourse on the noble quest - Human Resource Management - How the body uses food - Jeff pegues black and blue - Miami dade police department court services bureau - The body shop history - Oedipus the king research paper topics - Assignment3091720 - Research proposal example on depression - 200-300 word answer - 나는 믿네 사도 신경 - Dusk garden city booragoon - 1905 shirtwaist kansas city mo bargain mansions - Www ehbplayersystem co uk - Burning hunk of thermal love worksheet answers - Parmalat fraud case - Cook hall howard university - Mulitnational Corporations Case Study - Managing the diverse workforce chapter 11 - A new soft drink is being market tested - 1776 massachusetts liberty and virtue coin - How to find answers to homework - Sri lanka public sector accounting standards - Pre-Residency Essay - Hotel assassination gta 5 sticky bomb - Rocksmith no sound windows 10 - October glory red maple tree problems - Miranda priestly leadership style