Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Internet ingress egress traffic policy definition

08/01/2021 Client: saad24vbs Deadline: 12 Hours

Week 3 Assignment: Lab Project


Defining an Information Systems Security Policy Framework for an IT Infrastructure


In any company, a security policy helps to mitigate the risks and threats the business encounters. However, unless a company happens to be in the information security industry, the task of identifying, assessing, and categorizing the myriad of risks can be an overwhelming one. Thankfully, a company’s IT infrastructure can be divided in a logical manner to more easily sort the risks. These divisions are the seven IT domains.


The purpose of the seven domains of a typical IT infrastructure is to help organize the roles, responsibilities, and accountabilities for risk management and risk mitigation.


In this lab, you will identify known risks, threats, and vulnerabilities, and you will determine which domain of a typical IT infrastructure is affected. You will then discuss security policies to address each identified risk and threat within the seven domains of a typical IT infrastructure. You will next determine which appropriate security policy definition will help mitigate the identified risk, threat, or vulnerability. You will organize your results into a framework that can become part of a layered security strategy.


You will submit 2 files at the end of this lab: 1) Lab Report file, and 2) Lab 3 Assessment worksheet


Steps:


1. This assignment also includes a link to download the Lab 3 Assessment worksheet. Review the objectives and the questions from this worksheet. You will find answers to these questions as you proceed through the lab steps.


2. Review the seven domains of a typical IT infrastructure. You can find a chart showing these domains and their components on page 80 of the textbook, or you can search the powerpoint over chapter 4.


3. Go to this link: http://www.continuitycompliance.org/security-policy-components-of-a-good-policy/ and review the information to determine the components of an information systems security policy.


4. Create a Lab Report file, a word document recording the information you find. For the first section of this file, identify the major components of an information systems security policy.


5. Review the following table of risks, threats, and vulnerabilities that were found in a health care IT infrastructure:


Risks, Threats, and Vulnerabilities


Domain


Unauthorized access from public Internet


Hacker penetrates IT infrastructure


Communication circuit outages


Workstation operating system (OS) has a known software vulnerability


Unauthorized access to organization-owned data


Denial of service attack on organization’s email


Remote communications from home office


Workstation browser has software vulnerability


Weak ingress/egress traffic-filtering degrades performance


Wireless Local Area Network (WLAN) access points are needed for Local Area Network (LAN) connectivity within a warehouse


User destroys data in application, deletes all files, and gains access to internal network


Fire destroys primary data center


Intraoffice employee romance gone bad


Loss of production data


Need to prevent rogue users from unauthorized WLAN access


LAN server OS has a known software vulnerability


User downloads an unknown email attachment


Service provider has a major network outage


User inserts CDs and USB hard drives with personal photos, music, and videos on organization-owned computers


Virtual Private Network (VPN) tunneling between the remote computer and ingress/egress router


6. In your Lab Report file, copy the chart and align or assign reach of the risks, threats, and vulnerabilities identified in the previous table to the domain impacted (refer to step 2 above).


7. In your Lab Report file, explain how risks like these can be mitigated with an information systems security policy.


8. Go to this link: https://pdfs.semanticscholar.org/231b/c2ca1c556cb7b46bc46dd49e86f0e6ab8050.pdf and read the SANS Institute document, “A Short Primer for Developing Security Policies.”


9. In your Lab Report file, define what a policy is according to the SANS Institute.


[Note: It is important to understand how and why a policy differs from a standard, a procedure, and a guideline. From the top down, the policy should not change or need modification unless a major shift in corporate values or business process occurs. On the contrary, guidelines should be reviewed, and possibly changed, often. Similarly, even though a policy should be written clearly and concisely, it is a high-level document answering the “why” questions. Standards are also high-level, but instead should answer the “what” questions. Finally, the procedures and guidelines provide the “how.”]


10. Using the SANS primer, in your Lab Report file, describe the basic requirements of policies, their benefits, the control factors, and policies every organization needs.


11. Review the identified risks, threats, and vulnerabilities in the table in step 8, and then select an appropriate policy definition that might help mitigate each of them. You can select one of the SANS policies or choose one from the following list:


a. Acceptable Use Policy


b. Access Control Policy Definition


c. Business Continuity—Business Impact Analysis (BIA) Policy Definition


d. Business Continuity & Disaster Recovery Policy Definition


e. Data Classification Standard & Encryption Policy Definition


f. Internet Ingress/Egress Traffic Policy Definition


g. Mandated Security Awareness Training Policy Definition


h. Production Data Backup Policy Definition


i. Remote Access Policy Definition


j. Vulnerability Management & Vulnerability Window Policy Definition


k. Wide Area Network (WAN) Service Availability Policy Definition


12. In your Lab Report file, add your selected security policies and definitions, identifying what risks, threats, or vulnerabilities each selected policy would mitigate.


This completes the Lab Report file. Save your file using a name that includes your last name.


Now, complete the Lab 3 Assessment Worksheet. You can type in this PDF file, adding your answers. Make sure you also enter your name in the field at the top. Resave the worksheet with a new name that includes your last name.


Submit both files when you submit the Week 3 Assignment.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

University Coursework Help
Top Essay Tutor
Helping Hand
Writer Writer Name Offer Chat
University Coursework Help

ONLINE

University Coursework Help

Hi dear, I am ready to do your homework in a reasonable price.

$77 Chat With Writer
Top Essay Tutor

ONLINE

Top Essay Tutor

I have more than 12 years of experience in managing online classes, exams, and quizzes on different websites like; Connect, McGraw-Hill, and Blackboard. I always provide a guarantee to my clients for their grades.

$80 Chat With Writer
Helping Hand

ONLINE

Helping Hand

I am an Academic writer with 10 years of experience. As an Academic writer, my aim is to generate unique content without Plagiarism as per the client’s requirements.

$75 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

How to create a cost benefit analysis in excel - National gang intelligence center - Brunswick inferno blue flame - SQL Database expert Needed - A point charge of 5nc is located at the origin - Liberal arts lenses chart - Absorbance and concentration graph - Dramatic irony in the cask of amontillado - Mips assembly converter - BUSN601 Week 2 - The glass castle summer reading assignment answers - Tlingit totem pole animals - The professor and the madman sparknotes - Applying Performance Improvement Tools - Pa 46 500tp poh - Direct and inverse variation practice worksheet answers - Marketing excellence nike case study solution - Nursing - Automatic brightness control in fluoroscopy - Hyllus maris spiritual song of the aboriginal - Psychiatrist ballarat bulk billing - How to calculate paint required for a wall - 81 in index form - Bsbmgt502 assessment task 2 - The story of an hour pdf - Student school Experience - Only muscle cells are multinucleated - Clinic plus shampoo advertisement - Chapter 7 similarity chapter test form a answer key - The constant gardener scene - Threat Modeling - Percentage of acetic acid in vinegar by titration - The redstockings manifesto - Reynolds george w information technology for managers 2016 pdf - Fish philosophy video free download - Order 2436110: Comprehensive Discipline Management Plan Investigation - Emerging contemporary readings for writers 4th edition free pdf - Stolen jane harrison quotes - Air preheater in boiler diagram - The red cap poem - We shall remain after the mayflower questions and answers - Richard is an employee of the dun construction corp - Lascia ch io pianga - Erm adoption and implementation in the higher education environment - Please see attachment - Siemens builds a strategy oriented hr system solution - Marilyn wann yay scale - Norfolk recycling paint amnesty - Quotes from the tempest - As a limited partner in a construction business joe - 33 kv double pole structure drawing - Why cell phones should not be allowed in school - Pseudo code notepad++ - Electron dot structure of c2h5oh - Conclusion for superposition theorem - Boral terracotta shingle roof tiles - Threat agents in cloud computing - Cmmi maturity levels ppt - Subnetting practice exercises - Evan company reports net income of - Natural vs synthetic vitamin e - Erin brockovich movie answers - Set up a rational equation and then solve the following 5 problems showing your work. - Dunkin donuts human resource management - Grasslin time clock wiring diagram - I need a discussion answered for my Marketing in a Global environment and 2 respond to 2 other classmate - Words with prefix tri - Leadership multiple choice quiz - Patrick yu audiologist burwood - St andrews tennis club - Explain how whitman develops an extended metaphor in his poem - Introduction to programming with c++ pdf liang - Year 10 english acara - Project on integers for class 7 - Square inc financing a unicorn case solution - Determination of amount of acetic acid in vinegar - Fife council employee local discounts - Psychology tests and measurements - Crime shame and reintegration - What was doubting thomas occupation - In 520 bce, the newfound athenian democracy was threatened by - Finance discussion 7 - Casual tafe teacher jobs - Hoverboard remote key instructions - El doctor salinas caer radiografías - Gce guide a level past papers - Port fairy community notice boardfluid mosaic model animation mcgraw hill - Java code for gym management system - Need some work done in accounting - Se 204 cam specs - Jack hartmann the silly pirate song - Mercury company reports depreciation expense - SOCW 6103 Week 1 Assignment: Drugs of Abuse - Assignment - In medias res meaning - Is cockapoo a recognized breed - The wiggles live hot potatoes 2005 screening dvd - Assignment 1: Emerging/Current Health-Care Issue - Cost of gear to climb everest - Bsbinm601 assessment 3