Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Earth's magnetic field physics lab report

26/03/2021 Client: saad24vbs Deadline: 2 Day

Scenario:

Overview: Now that you’re super knowledgeable about security, let's put your newfound know-how to the test. You may find yourself in a tech role someday, where you need to design and influence a culture of security within an organization. This project is your opportunity to practice these important skillsets.

Assignment: In this project, you’ll create a security infrastructure design document for a fictional organization. The security services and tools you describe in the document must be able to meet the needs of the organization. Your work will be evaluated according to how well you met the organization’s requirements.

About the organization: This fictional organization has a small, but growing, employee base, with 50 employees in one small office. The company is an online retailer of the world's finest artisanal, hand-crafted widgets. They've hired you on as a security consultant to help bring their operations into better shape.

Organization requirements: As the security consultant, the company needs you to add security measures to the following systems:

· An external website permitting users to browse and purchase widgets

· An internal intranet website for employees to use

· Secure remote access for engineering employees

· Reasonable, basic firewall rules

· Wireless coverage in the office

· Reasonably secure configurations for laptops

Since this is a retail company that will be handling customer payment data, the organization would like to be extra cautious about privacy. They don't want customer information falling into the hands of an attacker due to malware infections or lost devices.

Engineers will require access to internal websites, along with remote, command line access to their workstations.

Grading: This is a required assignment for the module.

What you'll do: You’ll create a security infrastructure design document for a fictional organization. Your plan needs to meet the organization's requirements and the following elements should be incorporated into your plan:

· Authentication system

· External website security

· Internal website security

· Remote access solution

· Firewall and basic rules recommendations

· Wireless security

· VLAN configuration recommendations

· Laptop security configuration

· Application policy recommendations

· Security and privacy policy recommendations

· Intrusion detection or prevention for systems containing customer data

**** This is an example*** I found same assignment on Chegg.com****

Introduction

This document describes how the functional and nonfunctional requirements recorded in the Requirements Document and the preliminary user-oriented functional design based on the design specifications.

Furthermore, it describes the design goals in accordance with the requirements, by providing a high-level overview of the system architecture, and describes the data design associated with the system, as well as the human-machine scenarios in terms of interaction and operation. The high-level system design is further decomposed into low-level detailed design specifications including hardware, software, data storage and retrieval mechanisms and external interfaces.

Purpose of the Security Infrastructure Design Document

The Security Infrastructure Design Document helps to document and track the necessary information required to effectively define architecture and system design in order to give the guidance on the security architecture of the IT environment that is going to be established.

2. General Overview and Design Approach

2.1 General Overview

The client requires an IT infrastructure to perform their business activities that involve e-commerce applications and internal VPN access for their customers as well as employees with a high priority on the security and privacy of customer information and of the client’s as well

2.2 Assumptions/Constraints/Risks

Assumptions

It has been assumed that the employees are increased by 5% every year thereby reflecting the usage of the network bandwidth and increase of the devices that are connected to the enterprise network infrastructure.

Constraints

The following are the key considerations associated with the security of the infrastructure:

· Authentication system

· External website security

· Internal website security

· Remote access solution

· Firewall and basic rules recommendations

· Wireless security

· VLAN configuration recommendations

· Laptop security configuration

· Application policy recommendations

· Security and privacy policy recommendations

· Intrusion detection or prevention for systems containing customer data

Risks

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Smart Homework Helper
Financial Hub
Buy Coursework Help
Accounting & Finance Specialist
Solutions Store
Academic Mentor
Writer Writer Name Offer Chat
Smart Homework Helper

ONLINE

Smart Homework Helper

Give me a chance, i will do this with my best efforts

$25 Chat With Writer
Financial Hub

ONLINE

Financial Hub

Give me a chance, i will do this with my best efforts

$42 Chat With Writer
Buy Coursework Help

ONLINE

Buy Coursework Help

I am known as Unrivaled Quality, Written to Standard, providing Plagiarism-free woork, and Always on Time

$34 Chat With Writer
Accounting & Finance Specialist

ONLINE

Accounting & Finance Specialist

Hello, I an ranked top 10 freelancers in academic and contents writing. I can write and updated your personal statement with great quality and free of plagiarism

$15 Chat With Writer
Solutions Store

ONLINE

Solutions Store

Hello, I an ranked top 10 freelancers in academic and contents writing. I can write and updated your personal statement with great quality and free of plagiarism

$35 Chat With Writer
Academic Mentor

ONLINE

Academic Mentor

I have read your project details. I can do this within your deadline.

$15 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

What are your personal ethics - Five promotion mix tools for communicating customer value - M bigpond com creditme2u - Decoding the ethics code 4th edition - Change over time science - Special theory of relativity time dilation - Hassra north east shop - 5 principles of counting - Target vrio analysis - Proposing a data gathering strategy at aerotech inc - 25 magpie trail crawfordville fl - Hudl camera not working - Bromothymol blue ph indicator chart - Borland's Brave Beginning - Accrual income versus cash flow for a period - Phet 2d motion and vectors simulations lab answers - Diagnosis and Best Practices Essay - Case study on bone tissue structure and repair - Lab 4 - SQL Queries(DDL Create Tables) - Which of the following would have been one of the closing entries at december 31 for booth company? - HOMEWORK - The resistible rise of arturo ui script pdf - Fenner drives b loc - Centrelink unreasonable to live at home over 18 - Ineffective tissue perfusion care plan - Macbeth act 3 study questions - Moonby house retirement village - Https www psychologistworld com tests jung archetype quiz - Database project proposal - Umuc academic integrity pledge - Deliverable 2 - Regulatory Presentation - Cape otway walking tracks - The sentinel arthur c clarke analysis - Who does macbeth betray - Application Security - 4-bit shift register using jk flip-flop - Behavior change theories and models - Super size me movie questions answer key - Title 1 lesson plan template - Conjunct or disjunct melody - Cooking meats activity d chapter 18 answers - Fidelity bank boca raton fl - Nvd nist gov 800 53 - Discussion board - Us airline industry case study - Week 4 MF - Pacific exploit fv3 mountain bike - 2015 hsc pdhpe paper - Charles lindbergh flight path - Introduction to Philosophy- 2 pages - 8-10 paragraphs. - Short summary of mirror by sylvia plath - Lenny scares mr burns - Women and criminal justice - Limiting and excess reactants assembling a race car - To walk on eggshells jean johnston - 3.01 market segmentation marty & the martins - The blind side awards - 29/46 australian infantry battalion - Why does alka seltzer fizz in water - Nommar model - The beast of bodmin moor igcse ms - Millikan oil drop experiment explained - Inherent conflicts - Test data generation using genetic algorithm - Human resource essay - Princess rhyme and reason - Stealing carol ann duffy poem - Mathscape 9 extension answers - Comprehensive Final SOAP Note - Analytical report executive summary example - Boiling temperature of petrol - Penn foster personal narrative essay examples - Did lincoln reinstate slavery in missouri - Sap hana case study pdf - Aluminum hydrogen carbonate formula - Disaster Recovery - Wavell the viceroy's journal - Topic 7 DQ 1 and DQ 2 - The professional reference guide for the catering and event industry - Suicide prevention job aid brochure - Baby bunting layby conditions - Answer the following questions - Nursing Discussion - Extracting iodine from seaweed method - Kodak hero 9.1 online printer management tool - Bachelor of clinical exercise physiology griffith - Which of the four approaches to setting a price does carmex use for its products - Who sings budweiser puppy love song - English Comp 2 - 21st century interdisciplinary themes - Pwm duty cycle vhdl - Bim suisse sa lugano - **NEED ASAP***Paper -- Fairy Tales and Gender Roles **NEED ASAP*** - Accounting Assignment - They say i say price - Gram staining microbiology lab report - John danby car sales - Final paper assignment - Project planning 4 - What game do cannibals play at parties worksheet answers