Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Internet ingress egress traffic policy definition

08/01/2021 Client: saad24vbs Deadline: 12 Hours

Week 3 Assignment: Lab Project


Defining an Information Systems Security Policy Framework for an IT Infrastructure


In any company, a security policy helps to mitigate the risks and threats the business encounters. However, unless a company happens to be in the information security industry, the task of identifying, assessing, and categorizing the myriad of risks can be an overwhelming one. Thankfully, a company’s IT infrastructure can be divided in a logical manner to more easily sort the risks. These divisions are the seven IT domains.


The purpose of the seven domains of a typical IT infrastructure is to help organize the roles, responsibilities, and accountabilities for risk management and risk mitigation.


In this lab, you will identify known risks, threats, and vulnerabilities, and you will determine which domain of a typical IT infrastructure is affected. You will then discuss security policies to address each identified risk and threat within the seven domains of a typical IT infrastructure. You will next determine which appropriate security policy definition will help mitigate the identified risk, threat, or vulnerability. You will organize your results into a framework that can become part of a layered security strategy.


You will submit 2 files at the end of this lab: 1) Lab Report file, and 2) Lab 3 Assessment worksheet


Steps:


1. This assignment also includes a link to download the Lab 3 Assessment worksheet. Review the objectives and the questions from this worksheet. You will find answers to these questions as you proceed through the lab steps.


2. Review the seven domains of a typical IT infrastructure. You can find a chart showing these domains and their components on page 80 of the textbook, or you can search the powerpoint over chapter 4.


3. Go to this link: http://www.continuitycompliance.org/security-policy-components-of-a-good-policy/ and review the information to determine the components of an information systems security policy.


4. Create a Lab Report file, a word document recording the information you find. For the first section of this file, identify the major components of an information systems security policy.


5. Review the following table of risks, threats, and vulnerabilities that were found in a health care IT infrastructure:


Risks, Threats, and Vulnerabilities


Domain


Unauthorized access from public Internet


Hacker penetrates IT infrastructure


Communication circuit outages


Workstation operating system (OS) has a known software vulnerability


Unauthorized access to organization-owned data


Denial of service attack on organization’s email


Remote communications from home office


Workstation browser has software vulnerability


Weak ingress/egress traffic-filtering degrades performance


Wireless Local Area Network (WLAN) access points are needed for Local Area Network (LAN) connectivity within a warehouse


User destroys data in application, deletes all files, and gains access to internal network


Fire destroys primary data center


Intraoffice employee romance gone bad


Loss of production data


Need to prevent rogue users from unauthorized WLAN access


LAN server OS has a known software vulnerability


User downloads an unknown email attachment


Service provider has a major network outage


User inserts CDs and USB hard drives with personal photos, music, and videos on organization-owned computers


Virtual Private Network (VPN) tunneling between the remote computer and ingress/egress router


6. In your Lab Report file, copy the chart and align or assign reach of the risks, threats, and vulnerabilities identified in the previous table to the domain impacted (refer to step 2 above).


7. In your Lab Report file, explain how risks like these can be mitigated with an information systems security policy.


8. Go to this link: https://pdfs.semanticscholar.org/231b/c2ca1c556cb7b46bc46dd49e86f0e6ab8050.pdf and read the SANS Institute document, “A Short Primer for Developing Security Policies.”


9. In your Lab Report file, define what a policy is according to the SANS Institute.


[Note: It is important to understand how and why a policy differs from a standard, a procedure, and a guideline. From the top down, the policy should not change or need modification unless a major shift in corporate values or business process occurs. On the contrary, guidelines should be reviewed, and possibly changed, often. Similarly, even though a policy should be written clearly and concisely, it is a high-level document answering the “why” questions. Standards are also high-level, but instead should answer the “what” questions. Finally, the procedures and guidelines provide the “how.”]


10. Using the SANS primer, in your Lab Report file, describe the basic requirements of policies, their benefits, the control factors, and policies every organization needs.


11. Review the identified risks, threats, and vulnerabilities in the table in step 8, and then select an appropriate policy definition that might help mitigate each of them. You can select one of the SANS policies or choose one from the following list:


a. Acceptable Use Policy


b. Access Control Policy Definition


c. Business Continuity—Business Impact Analysis (BIA) Policy Definition


d. Business Continuity & Disaster Recovery Policy Definition


e. Data Classification Standard & Encryption Policy Definition


f. Internet Ingress/Egress Traffic Policy Definition


g. Mandated Security Awareness Training Policy Definition


h. Production Data Backup Policy Definition


i. Remote Access Policy Definition


j. Vulnerability Management & Vulnerability Window Policy Definition


k. Wide Area Network (WAN) Service Availability Policy Definition


12. In your Lab Report file, add your selected security policies and definitions, identifying what risks, threats, or vulnerabilities each selected policy would mitigate.


This completes the Lab Report file. Save your file using a name that includes your last name.


Now, complete the Lab 3 Assessment Worksheet. You can type in this PDF file, adding your answers. Make sure you also enter your name in the field at the top. Resave the worksheet with a new name that includes your last name.


Submit both files when you submit the Week 3 Assignment.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

University Coursework Help
Top Essay Tutor
Helping Hand
Writer Writer Name Offer Chat
University Coursework Help

ONLINE

University Coursework Help

Hi dear, I am ready to do your homework in a reasonable price.

$77 Chat With Writer
Top Essay Tutor

ONLINE

Top Essay Tutor

I have more than 12 years of experience in managing online classes, exams, and quizzes on different websites like; Connect, McGraw-Hill, and Blackboard. I always provide a guarantee to my clients for their grades.

$80 Chat With Writer
Helping Hand

ONLINE

Helping Hand

I am an Academic writer with 10 years of experience. As an Academic writer, my aim is to generate unique content without Plagiarism as per the client’s requirements.

$75 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Lokar gas pedal install - WK15 - Labor Relations and Management Final Exam - Keith rn case study answers pdf - 142 bonds road lower plenty - 3 8 present value of investments answers - Difference between romantic and modernist poetry - John dollard and neal miller learning theory - The last stop brian cable analysis - Final Project Submission: Strategic HR Plan - Maxim street family medical practice - American red cross strategic plan - Pittman company is a small but growing - Otisline number - James hardie easylap panel - Management daft 13th edition pdf - Cause and effect essay format - Quality and safety in nursing wgu - Femme connection ingle farm - Residency - What is a mid shot - Evaluate Employment Law - Grammatical rule of interpretation - Risk Management - Nmit electrical pre apprenticeship - Hexaware station h password reset - How many atoms are in 0.70 mol of iron - Eavan boland child of our time poetic techniques - Budget Cycle - Express rational functions as partial fractions - How vitamins and minerals/trace elements affect health/human body ? - Acn business center login independent business owners - VERY HURY!!! IF U CAN DO IT IN 10HS!!!!!!! - Aalsmeer flower auction perfect competition - Bitcoin - Elements of film powerpoint - Discussion - MEE 5801 Unit 6 - How does the price of a motorcycle in Japan compare to other countries? - Firms that lack competitive advantages will - Pata pata just dance - Gas meter box replacement responsibility - Angle between polarizer and analyzer - Robert kiyosaki best friend mike - Mt400 swift message definition - How to draw a pond ecosystem - Kellogg hkust emba fees - Qiba professional year brisbane - New invention junior school - I don t know where doritos live - State of the given angles are coterminal - Source document for petty cash book - Faith without works illustration - Nsls online leadership training day answers - HW 2 - Comment t appelles tu - Disadvantages of trenchless technology - Essay 500 words - Saudi building code 303 - Damien hirst shark value - Treatment goals should be included in the discharge summary - Blank business plan template - David damrosch how to read world literature - 1984 part 1 summary - Biztalk 2010 system requirements - Ethical leadership - Symptoms of anorexia nervosa include all of the following except - Forensic psychology Discussion 2 - Kids shoe size 31 conversion - GEOG Assignment 5 - Things fall apart essay thesis - Quality management assignment - Galvanic cell lab report discussion - Commonwealth coat of arms meaning - Fanatec v2 pedals manual - Http gateway vpn onsemi com - Colorado energy skate park - Sexual repression in the crucible - DQ - Juvenile court proceedings were originally conceptualized as civil proceedings - Alaska airlines volunteer for later flight - Example of grand nursing theory - Britcay premier health insurance - Short time withstand current - Tom and jerry tennis chumps vimeo - 50.6 kg in stone - Los mineros documentary - Luke the drifter just waiting - Miele washing machine guarantee - South reddish medical centre - Teach writing as a process not product - How many electrons does calcium ion have - Bath uni accommodation map - Acct - Work-14 - Chasing coral video questions answers - Difference between spermatogenesis and oogenesis - Yaesu cross band repeat - #2 Two Discussion Posts 200 words each - +971561686603 Abortion pills in Dubai/Abu Dhabi-mifepristone & misoprostol in DUBAI