Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Internet ingress egress traffic policy definition

08/01/2021 Client: saad24vbs Deadline: 12 Hours

Week 3 Assignment: Lab Project


Defining an Information Systems Security Policy Framework for an IT Infrastructure


In any company, a security policy helps to mitigate the risks and threats the business encounters. However, unless a company happens to be in the information security industry, the task of identifying, assessing, and categorizing the myriad of risks can be an overwhelming one. Thankfully, a company’s IT infrastructure can be divided in a logical manner to more easily sort the risks. These divisions are the seven IT domains.


The purpose of the seven domains of a typical IT infrastructure is to help organize the roles, responsibilities, and accountabilities for risk management and risk mitigation.


In this lab, you will identify known risks, threats, and vulnerabilities, and you will determine which domain of a typical IT infrastructure is affected. You will then discuss security policies to address each identified risk and threat within the seven domains of a typical IT infrastructure. You will next determine which appropriate security policy definition will help mitigate the identified risk, threat, or vulnerability. You will organize your results into a framework that can become part of a layered security strategy.


You will submit 2 files at the end of this lab: 1) Lab Report file, and 2) Lab 3 Assessment worksheet


Steps:


1. This assignment also includes a link to download the Lab 3 Assessment worksheet. Review the objectives and the questions from this worksheet. You will find answers to these questions as you proceed through the lab steps.


2. Review the seven domains of a typical IT infrastructure. You can find a chart showing these domains and their components on page 80 of the textbook, or you can search the powerpoint over chapter 4.


3. Go to this link: http://www.continuitycompliance.org/security-policy-components-of-a-good-policy/ and review the information to determine the components of an information systems security policy.


4. Create a Lab Report file, a word document recording the information you find. For the first section of this file, identify the major components of an information systems security policy.


5. Review the following table of risks, threats, and vulnerabilities that were found in a health care IT infrastructure:


Risks, Threats, and Vulnerabilities


Domain


Unauthorized access from public Internet


Hacker penetrates IT infrastructure


Communication circuit outages


Workstation operating system (OS) has a known software vulnerability


Unauthorized access to organization-owned data


Denial of service attack on organization’s email


Remote communications from home office


Workstation browser has software vulnerability


Weak ingress/egress traffic-filtering degrades performance


Wireless Local Area Network (WLAN) access points are needed for Local Area Network (LAN) connectivity within a warehouse


User destroys data in application, deletes all files, and gains access to internal network


Fire destroys primary data center


Intraoffice employee romance gone bad


Loss of production data


Need to prevent rogue users from unauthorized WLAN access


LAN server OS has a known software vulnerability


User downloads an unknown email attachment


Service provider has a major network outage


User inserts CDs and USB hard drives with personal photos, music, and videos on organization-owned computers


Virtual Private Network (VPN) tunneling between the remote computer and ingress/egress router


6. In your Lab Report file, copy the chart and align or assign reach of the risks, threats, and vulnerabilities identified in the previous table to the domain impacted (refer to step 2 above).


7. In your Lab Report file, explain how risks like these can be mitigated with an information systems security policy.


8. Go to this link: https://pdfs.semanticscholar.org/231b/c2ca1c556cb7b46bc46dd49e86f0e6ab8050.pdf and read the SANS Institute document, “A Short Primer for Developing Security Policies.”


9. In your Lab Report file, define what a policy is according to the SANS Institute.


[Note: It is important to understand how and why a policy differs from a standard, a procedure, and a guideline. From the top down, the policy should not change or need modification unless a major shift in corporate values or business process occurs. On the contrary, guidelines should be reviewed, and possibly changed, often. Similarly, even though a policy should be written clearly and concisely, it is a high-level document answering the “why” questions. Standards are also high-level, but instead should answer the “what” questions. Finally, the procedures and guidelines provide the “how.”]


10. Using the SANS primer, in your Lab Report file, describe the basic requirements of policies, their benefits, the control factors, and policies every organization needs.


11. Review the identified risks, threats, and vulnerabilities in the table in step 8, and then select an appropriate policy definition that might help mitigate each of them. You can select one of the SANS policies or choose one from the following list:


a. Acceptable Use Policy


b. Access Control Policy Definition


c. Business Continuity—Business Impact Analysis (BIA) Policy Definition


d. Business Continuity & Disaster Recovery Policy Definition


e. Data Classification Standard & Encryption Policy Definition


f. Internet Ingress/Egress Traffic Policy Definition


g. Mandated Security Awareness Training Policy Definition


h. Production Data Backup Policy Definition


i. Remote Access Policy Definition


j. Vulnerability Management & Vulnerability Window Policy Definition


k. Wide Area Network (WAN) Service Availability Policy Definition


12. In your Lab Report file, add your selected security policies and definitions, identifying what risks, threats, or vulnerabilities each selected policy would mitigate.


This completes the Lab Report file. Save your file using a name that includes your last name.


Now, complete the Lab 3 Assessment Worksheet. You can type in this PDF file, adding your answers. Make sure you also enter your name in the field at the top. Resave the worksheet with a new name that includes your last name.


Submit both files when you submit the Week 3 Assignment.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

University Coursework Help
Top Essay Tutor
Helping Hand
Writer Writer Name Offer Chat
University Coursework Help

ONLINE

University Coursework Help

Hi dear, I am ready to do your homework in a reasonable price.

$77 Chat With Writer
Top Essay Tutor

ONLINE

Top Essay Tutor

I have more than 12 years of experience in managing online classes, exams, and quizzes on different websites like; Connect, McGraw-Hill, and Blackboard. I always provide a guarantee to my clients for their grades.

$80 Chat With Writer
Helping Hand

ONLINE

Helping Hand

I am an Academic writer with 10 years of experience. As an Academic writer, my aim is to generate unique content without Plagiarism as per the client’s requirements.

$75 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

The examination of sarah good - Discussion #1 - Tell us about a "causal study" you've been involved in. - Follower seamus heaney annotated - Case comfort usa - U of a ansys - Questions - Test match sabina park poem - David hume moral distinctions not derived from reason - Nsw food authority licence - Chinese cinderella chapter 11 summary - Dr sam jolayemi psychiatrist - Van ijzendoorn and kroonenberg - Education as a social sub system - How challenging is CIPD level 7 assignments? - Types of chemical reactions - Grand hyatt dubai wiki - Academic social networking sites ppt - Legal Underpinnings of Business Law - 2 responses Aug 13 - Available on or upon request - Write an equation for the buoyancy force on the empty barge - Force table and vector addition of forces lab report - Teaching of psychology - Healthy living poster assignment - Key quotes from hamlet - To bid or not to bid case study - Centrelink total net investment losses - 6 - SMART Goals - Hamilton north primary school - Security infrastructure design document for a fictional organization - Ccms helpdesk contact number - Conservation biology author guidelines - E accent grave alt code - Insert nose radius chart - Advantages and disadvantages of market penetration ansoff matrix - The master/slave configuration is a symmetric multiprocessing system. - Shellfish tags must be kept for servsafe - Accounting management in network management - Hey there delilah ukulele - Information technology related example of research proposal - Effective Teams - 200 Words - The stolen white elephant sparknotes - Building high performance teams the rocket model - Girl by jamaica kincaid - Taplow car boot sale - Solve x 2 8x 18 0 by completing the square - How much is a nolan ryan rookie card worth - Skill builders occupational therapy - Case 1 monsanto attempts to balance stakeholder interests - CRYPTOGRAPHY - I need 1000 words essay in the topic of The Short Happy Life of Francis Macomber - CRIME, DELIQUENCY AND DEVIANCE - Understanding business research terms and concepts part 2 - Excel chapter 9 grader project downtown theater - Example of a learning story - Giles corey more weight quote - Inverse square law radiation graph - 1.8 5 journal rural wireless internet answers - Bob minnix washington state university - Evaluation - Advantages of media conglomerates - Www psyarticles com - Writing an abstract - Chilled beam vs vav - Assignment 1 - When was new coke introduced - Need help with chemistry homework - Case study: Southern Cross Healthcare - Citrix xenapp 6.5 end of life - E162 halal or haram - The orphan boy and the elk dog summary - Paper helicopter experiment evaluation - Academic Research Essay Proposal - Quantitative and qualitative research articles (Each 500 words or 2 pages) - Metal and acid reaction - The internship movie discussion questions - Answer the following questions - Brent staples just walk on by ethos - Skittles taste the rainbow - Motorcycle accessories supermarket keilor east & mca indian motorcycle - Alone by maya angelou tone - Nmsu plagiarism policy - Refer to the real estate data which reports - Stat trek binomial - Dr rick o rang audio loopback dongle - +91-8306951337 vashikaran specialist near me IN Madurai - American express bank 2.0 case study solution - Crew foreman job description - 25 minutes in decimal - Innocent love astro chords - What three elements are present in glucose fructose and galactose - Premier american bank national association - How to install elfa easy glider - Beaconsfield upper primary school - 12 awg wire jaycar - Contemporary asian america a multidisciplinary reader 3rd edition pdf - Covey seek to understand - Chemicals melting point tells you - Thursford christmas spectacular seating plan - Paul tillich ultimate concern