Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Internet ingress egress traffic policy definition

08/01/2021 Client: saad24vbs Deadline: 12 Hours

Week 3 Assignment: Lab Project


Defining an Information Systems Security Policy Framework for an IT Infrastructure


In any company, a security policy helps to mitigate the risks and threats the business encounters. However, unless a company happens to be in the information security industry, the task of identifying, assessing, and categorizing the myriad of risks can be an overwhelming one. Thankfully, a company’s IT infrastructure can be divided in a logical manner to more easily sort the risks. These divisions are the seven IT domains.


The purpose of the seven domains of a typical IT infrastructure is to help organize the roles, responsibilities, and accountabilities for risk management and risk mitigation.


In this lab, you will identify known risks, threats, and vulnerabilities, and you will determine which domain of a typical IT infrastructure is affected. You will then discuss security policies to address each identified risk and threat within the seven domains of a typical IT infrastructure. You will next determine which appropriate security policy definition will help mitigate the identified risk, threat, or vulnerability. You will organize your results into a framework that can become part of a layered security strategy.


You will submit 2 files at the end of this lab: 1) Lab Report file, and 2) Lab 3 Assessment worksheet


Steps:


1. This assignment also includes a link to download the Lab 3 Assessment worksheet. Review the objectives and the questions from this worksheet. You will find answers to these questions as you proceed through the lab steps.


2. Review the seven domains of a typical IT infrastructure. You can find a chart showing these domains and their components on page 80 of the textbook, or you can search the powerpoint over chapter 4.


3. Go to this link: http://www.continuitycompliance.org/security-policy-components-of-a-good-policy/ and review the information to determine the components of an information systems security policy.


4. Create a Lab Report file, a word document recording the information you find. For the first section of this file, identify the major components of an information systems security policy.


5. Review the following table of risks, threats, and vulnerabilities that were found in a health care IT infrastructure:


Risks, Threats, and Vulnerabilities


Domain


Unauthorized access from public Internet


Hacker penetrates IT infrastructure


Communication circuit outages


Workstation operating system (OS) has a known software vulnerability


Unauthorized access to organization-owned data


Denial of service attack on organization’s email


Remote communications from home office


Workstation browser has software vulnerability


Weak ingress/egress traffic-filtering degrades performance


Wireless Local Area Network (WLAN) access points are needed for Local Area Network (LAN) connectivity within a warehouse


User destroys data in application, deletes all files, and gains access to internal network


Fire destroys primary data center


Intraoffice employee romance gone bad


Loss of production data


Need to prevent rogue users from unauthorized WLAN access


LAN server OS has a known software vulnerability


User downloads an unknown email attachment


Service provider has a major network outage


User inserts CDs and USB hard drives with personal photos, music, and videos on organization-owned computers


Virtual Private Network (VPN) tunneling between the remote computer and ingress/egress router


6. In your Lab Report file, copy the chart and align or assign reach of the risks, threats, and vulnerabilities identified in the previous table to the domain impacted (refer to step 2 above).


7. In your Lab Report file, explain how risks like these can be mitigated with an information systems security policy.


8. Go to this link: https://pdfs.semanticscholar.org/231b/c2ca1c556cb7b46bc46dd49e86f0e6ab8050.pdf and read the SANS Institute document, “A Short Primer for Developing Security Policies.”


9. In your Lab Report file, define what a policy is according to the SANS Institute.


[Note: It is important to understand how and why a policy differs from a standard, a procedure, and a guideline. From the top down, the policy should not change or need modification unless a major shift in corporate values or business process occurs. On the contrary, guidelines should be reviewed, and possibly changed, often. Similarly, even though a policy should be written clearly and concisely, it is a high-level document answering the “why” questions. Standards are also high-level, but instead should answer the “what” questions. Finally, the procedures and guidelines provide the “how.”]


10. Using the SANS primer, in your Lab Report file, describe the basic requirements of policies, their benefits, the control factors, and policies every organization needs.


11. Review the identified risks, threats, and vulnerabilities in the table in step 8, and then select an appropriate policy definition that might help mitigate each of them. You can select one of the SANS policies or choose one from the following list:


a. Acceptable Use Policy


b. Access Control Policy Definition


c. Business Continuity—Business Impact Analysis (BIA) Policy Definition


d. Business Continuity & Disaster Recovery Policy Definition


e. Data Classification Standard & Encryption Policy Definition


f. Internet Ingress/Egress Traffic Policy Definition


g. Mandated Security Awareness Training Policy Definition


h. Production Data Backup Policy Definition


i. Remote Access Policy Definition


j. Vulnerability Management & Vulnerability Window Policy Definition


k. Wide Area Network (WAN) Service Availability Policy Definition


12. In your Lab Report file, add your selected security policies and definitions, identifying what risks, threats, or vulnerabilities each selected policy would mitigate.


This completes the Lab Report file. Save your file using a name that includes your last name.


Now, complete the Lab 3 Assessment Worksheet. You can type in this PDF file, adding your answers. Make sure you also enter your name in the field at the top. Resave the worksheet with a new name that includes your last name.


Submit both files when you submit the Week 3 Assignment.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

University Coursework Help
Top Essay Tutor
Helping Hand
Writer Writer Name Offer Chat
University Coursework Help

ONLINE

University Coursework Help

Hi dear, I am ready to do your homework in a reasonable price.

$77 Chat With Writer
Top Essay Tutor

ONLINE

Top Essay Tutor

I have more than 12 years of experience in managing online classes, exams, and quizzes on different websites like; Connect, McGraw-Hill, and Blackboard. I always provide a guarantee to my clients for their grades.

$80 Chat With Writer
Helping Hand

ONLINE

Helping Hand

I am an Academic writer with 10 years of experience. As an Academic writer, my aim is to generate unique content without Plagiarism as per the client’s requirements.

$75 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Record the entry - Exrx one rep max - Giving of notice identifier ppsr - Animal farm pictures of characters - Week-6 - What is the difference between nude and naked - Difference between single bus and multiple bus architecture - Morrisons cooked meat counter - Plantwide overhead rate example - Criminal Justice Paper due at midnight - 800 word assignment- help needed by TODAY Sept. 27 11pm ESt - Sanatansociety org hindu_gods_and_goddesses - John maddocks jazz band - Harley davidson vision statement - Fm assist city west - Lemond g force ut craigslist - The least squares regression line minimizes the sum of the - The iodide ion reacts with hypochlorite ion - Sampson and taylor pants - What are the seed leaves that provide energy - Boy flying poem - Blidworth and ravenshead surgery - Fair n lovely new ad - Puppies for sale template - Sota instruments model zbb5 ionic silver generator - Mcdougal littell algebra 2 online textbook activation code - Probability sum of three dice - Technology mandatory units of work - Apple store indianapolis genius bar appointment - From blossoms poem analysis - How many square feet in 144 inches - Siop powerpoint presentation - 01.04 service learning project part a - We re the millers kissing trick - Inter enterprise information system examples - English - Merton council recycling centre - Commonwealth bank old statements - Capsim - Week 3 Assignment- data mining - What zone is pakistan in cie - 2.4 3 two's complement arithmetic answer key - Nad on physical exam - DISCUSSION(One girl did all wrong)fix in 5days - Baking soda and vinegar limiting reactant lab - Ndis payment request rejected - Reflection - Factors that may inhibit capacity utilization - Red cross objectives and goals - Computer architecture a quantitative approach 5th edition appendix c solutions - Persuasive speech outline on social networking - Adverse possession application fee - Extended response vs essay - Bland altman excel template - Objects measured in nanometers - Abbies takeaway pendle hill - Learning styles and behavior change - Lorenzo maria raimondo de medici in campitelli di calabria - Dyson distribution and supply chain strategy - Teamwork - Online discussion bhar - Financial analysis - The museum leila aboulela - Macbeth act 4 scene 3 - 24 in kids shoes - 60 martin place sydney nsw - Graduate Education Assistance - Urgent 3 - Cloud Computing - Chartered accountants golf society - History first mobile phone 1973 - The lean startup page count - Kennings worksheet answer key - Phet electric field hockey - Smart helmet using raspberry pi - Hunter united employees credit union limited - Animal farm chapter summaries - Fish scales tell the age of a fish worksheet answers - Kate cut a square into equal shares - A major purpose of cost accounting is to - Fraser island camping zones map - BUS 5112 - What is math 1010 - Indian camp hemingway - Exfat max file size - Week 1 Discussion - Chapter 7 kitchen and dining areas answers - Virtual task in systemverilog - Gautrain bus routes midrand - What color does potassium iodide burn - Chapter 4 video quiz project repat - Boral terracotta shingle roof tiles - Target market for bikes - My brother sam is dead questions - Early christian architecture comparative analysis - What are skew lines in geometry - Pavilion reit annual report 2019 - Specific purpose statement for informative speech example - Investment decision under certainty - Https www youtube com watch v ymyofrec5jk