Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Nt2580 project part 2

14/12/2020 Client: saad24vbs Deadline: 2 Day

NT2580


Project


1


PROJECT DESCRIPTION


Project Introduction:


The components that make up cyberspace are not automatically secure. This includes cabling, physical


networks, operating systems, and software applications that computers use to connect to the Internet. There


is a raging information security war. The goal is to protect systems, applications, and business information.


Therefore, IT is in great need of proper security controls.


For this project, you will create an outline of a multilayered security strategy for a fictitious financial


organization, and then identify security challenges and suggest proper security controls for the company’s


information systems environment. This project provides you an opportunity to apply the competencies gained


in various lessons of this course to identify security challenges and apply strategies of countermeasures for


information systems.


Successful completion of this project will ensure that you are able to do the following:


Understand information systems security (ISS) fundamentals including the definition of terms,


concepts, elements, and goals.


Understand the purpose of a multilayered security strategy.


Incorporate industry standards and practices with a focus on the confidentiality, integrity, availability,


and vulnerabilities of information systems.


Fulfill the role of a security professional implementing proper security controls in a specific business


situation.


This project is assigned to you in Week 1 and is due for submission in two parts: Part 1 is due at the end of


Week 3 and Part 2 is due in Week 6.


Course Objectives Tested: All Course objectives


NT2580


Project


2


PROJECT SUBMISSION PLAN


Project


Part


Description/Requirements of Project Evaluation


Criteria


Project


Part 1


Assessment Preparation Checklist:


1. Complete all weekly lessons before submitting the project.


2. Ensure that you have conducted sufficient research before


finalizing the project for submission.


3. Do not confine your learning experience to the textbook. Refer to


the ITT Tech Virtual Library and the Internet, if necessary.


Title: Multi-Layered Security Plan


You are a network security specialist at Richman Investments, a mid-level


financial investment and consulting firm. The Richman corporate


headquarters is located in Phoenix, Arizona. Currently, there are eight


branch offices in:


Atlanta, Georgia


Chicago, Illinois


Cincinnati, Ohio


Denver, Colorado


Los Angeles, California


Montreal, Canada


New York City, New York


Washington, D.C.


You received an e-mail from your supervisor stating that you need to


create an outline of the general security solutions planned for the safety


of data and information that belongs to the organization. You are told that


every month, the networking division needs to submit a report to the


senior management about the security plan for the month, and your


outline will become a part of that report.


You need to research the elements of a multilayered security plan and to


create a detailed outline. Your outline should indicate one or more


general security solutions for each of the seven domains of a typical IT


infrastructure.


Your instructor will


consider the


following points for


evaluating your


performance in


this assessment:


Have you


included


several


applicable


layers for the


plan?


Have you


described at


least one layer


of security for


each of the


seven


domains?


Have you


conducted


adequate


independent


research for


the report?


Have you


used citations


and noted


professional


resources?


NT2580


Project


3


Project


Part


Description/Requirements of Project Evaluation


Criteria


Submission Requirements:


Submit your outline in the form of a two-page Microsoft Word document,


double-spaced, using APA format. Send the document to your instructor


as an attachment through the Questa Learning Plan.


Due: Week 3


Grading Weight: 10%


Have you


submitted this


part of the


project on


time?


Project


Part 2


Assessment Preparation Checklist:


1. Complete the readings for all weeks before submitting Project


Part 2.


2. Complete all weekly lessons before submitting Project Part 2.


3. Ensure that you have conducted sufficient study before


submitting Project Part 2.


Title: Detailed Proposal


Continuing the Richman Investments scenario explained in Part 1 of this


project, the offices have a total of 5,000 employees, and the office


technology inventory includes desktops, mobile computers, and wireless


devices. There is a mix of computers running Windows XP, Windows


Vista, Windows 7, and Mac OS X. Most of the managers have BlackBerry


devices for instant communication, and all employees are provided cell


phones. A Windows Active Directory forest with domains is set up for


each office, and seven file and print servers are located in the Phoenix


office. The Phoenix office also contains two proxy servers, configured as


an array, that provide Web cache services and Internet access control for


the organization. The majority of applications are Web-based and hosted


from the Phoenix office.


The Phoenix office has an Internet connection to all the remote offices,


and the redundancy is extremely important to the company. There are


several sensitive applications that all offices use. The management from


each office shares application information that is hosted at the corporate


office for accounting and reporting purposes.


Your instructor will


consider the


following points for


evaluating your


performance in


this assessment:


Have you


documented


the


vulnerabilities,


methods, and


controls


effectively?


Have you


provided


proper


rationale for


your solution


choices?


Have you


conducted


adequate


independent


research for


the report?


NT2580


Project


4


Project


Part


Description/Requirements of Project Evaluation


Criteria


All employees have Internet access. There is no policy on the use of


removable media. Recently several of the branch offices have


encountered issues with malware.


Richman hosts an intranet for employees to access information about the


company and to enroll in company benefits programs. Richman also


hosts an extranet for its business partners.


Due to many recent technology and process improvements within


Richman, the corporate security policy is out of date, and each branch


office policy differs.


Tasks


You must submit a proposal to Richman’s senior management addressing


two of the points based on the following premises:


1. Richman has 5,000 employees throughout the main office and


several branch offices, therefore you must research solutions and


detail the appropriate access controls, including policies,


standards, and procedures that define who the users are, what


they can do, which resources they can access, and which


operations they can perform on a system.


2. Most of the managers have BlackBerry devices for instant


communications and all employees are provided cell phones,


therefore you must research and detail the cryptography methods


to protect organizational information using techniques that ensure


the information’s integrity, confidentiality, authenticity, and


nonrepudiation, and the recovery of encrypted information in its


original form.


3. There is a mix of computers running Windows 2000, Windows


XP, Windows Vista, Windows 7, and Mac OS X, therefore you


must research and devise a plan to thwart malicious code and


Have you


used citations


and noted


professional


resources?


Have you


submitted this


part of the


project on


time?


NT2580


Project


5


Project


Part


Description/Requirements of Project Evaluation


Criteria


activity by implementing countermeasures and prevention


techniques for dealing with viruses, worms, logic bombs, Trojan


horses, and other related forms of intentionally created deviant


code.


4. All employees have Internet access to browse the Web, there is


no policy on the use of removable media, and several of the


branch offices have encountered issues with malware recently,


therefore you must research and formulate a plan to implement


monitoring and analysis. You must determine system


implementation and access in accordance with defined IT criteria


as well as how to collect information for identification of and


response to security breaches or events.


5. Richman hosts an intranet for employees to access information


about the company and enroll in company benefits programs, and


that Richman also hosts an extranet for its business partners,


therefore you must research and devise a method to secure


networks and communications. This should include the network


structure, transmission methods and techniques, transport


formats, and security measures used to operate both private and


public communication networks.


6. The Phoenix office contains two proxy servers configured as an


array, which provide Web cache services and Internet access


control for Richman, and the majority of applications are Web-


based and hosted from the Phoenix office, therefore you must


assess risk, response, and recovery. Conduct a review of the


implementation processes essential to the identification,


measurement, and control of loss associated with uncertain


events.


7. The corporate security policy is out of date and each branch


office policy differs, therefore you must research and define


security operations and administration, including the identification


of information assets and documentation of policies, standards,


NT2580


Project


6


Project


Part


Description/Requirements of Project Evaluation


Criteria


procedures, and guidelines that ensure confidentiality, integrity,


and availability.


Write the proposal as detailed in the instructions above. Create a


professional, well-developed proposal with proper documentation,


grammar, spelling, and punctuation. In addition, document the


vulnerabilities, methods, and controls effectively.


Submission Requirements:


Submit your proposal in the form of a six- to eight-page Microsoft Word


document, double-spaced, using APA format. Send the document to your


instructor as an attachment through the Questa Learning Plan.


Due: Week 6


Grading Weight: 10%


End of Project Description

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Homework Guru
Best Coursework Help
University Coursework Help
Writer Writer Name Offer Chat
Homework Guru

ONLINE

Homework Guru

Hi dear, I am ready to do your homework in a reasonable price and in a timely manner.

$47 Chat With Writer
Best Coursework Help

ONLINE

Best Coursework Help

I am an Academic writer with 10 years of experience. As an Academic writer, my aim is to generate unique content without Plagiarism as per the client’s requirements.

$45 Chat With Writer
University Coursework Help

ONLINE

University Coursework Help

Hi dear, I am ready to do your homework in a reasonable price.

$47 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

John deere 42 hydraulic tiller manual - Journal - Administrative closure project management - Amp flexible super letter of compliance - Social learning theory bowlby ainsworth piaget vygotsky - Family resources in home economics - The devil wears prada discussion questions - Consent order examples australia - Roland's overhead doors reports the following financial information - Successful Aging Paper - Week 6 Peregrine Assessment Exam Submission - Product of sums from k map - In n out burger boston ma - Project - Cr - Different figurative language examples - Political cartoon analysis essay example - Essbase report script level 0 - Esb new connection form - Research Methods in Criminal Justice - Chapter 13. - Integrated windows authentication sso - Zig zag diet bodybuilding - Value based care - How to make dns reagent - Briefly describe how supportive and interpersonal psychotherapies are similar - How to write formulas for binary ionic compounds - Saudi arabian cultural mission - 1.5 kw electric motor - Lord of the flies chapter 12 fire quotes - English literature mark scheme - Cirque du soleil san francisco december 2014 - Ni usb 6212 driver - Rikki tikki tavi questions - Covid Newsletters - Write a quadratic function whose zeros are and - Instruments of the woodwind family - Gcse music structure and form - For the system of capacitors shown in figure - Discussion post - Vitovalor 300 p cost - Workplace harassment case study examples - The hobbit teaching guide pdf - Java runtime version 1.4.2 - Transatlantic telegraph cable apush - Vygotsky's theory zone of proximal development - Fonthill kinsmen craft show 2019 - A firm offers routine physical examinations - Faye sayer time team - Cloud Computing week 4 - Educational prenuptials to consider before co teaching - What is the purpose of the fasb codification system - Advantages and disadvantages of honey and mumford learning styles - How to become a genetic counsellor australia - Discussion: Social Media and Persuasion - Family therapy goldenberg 9th edition pdf - CASE 30 ST. BENEDICT’S TEACHING HOSPITAL Merger Analysis - Why is the long run aggregate supply curve vertical - Johnson & johnson case analysis - Essay edit work - Polit and beck 2008 reference - 4.2 divided by 2 - Le reve perfume chemist warehouse - Higher admin past papers - Need 1 page apa paper in next 2 hrs. - Medallion club of marvel stadium - Why is tropical rainforest also called evergreen forest - Project - Primitive rule of the templars - Rankin and regan 2004 - 685 bus timetable katoomba - Alyeska services company a division of a major oil company - 5 5 7x 8 4x 6 - Nanomaterials ppt presentation download - Lesson - Discourse on the noble quest - How to harvard reference the eyfs - As 2124 vs as 4000 - Cost of merchandise sold equals beginning inventory - Social research methods qualitative and quantitative approaches 6th edition - Dc power supply polarity - Di - Arabic alphabet with pictures - Toad brigade to trick track hall - Article 1 national territory explanation tagalog - Ebay evolves case study - When a company borrows cash from the bank - Abc us history project - Employee value proposition deloitte - Sunsuper intent to claim form - Criminal justice trends paper - Emerson network power liebert services inc - How to take chally assessment - Business Communication - Networking foundations pdf - What is the greatest common factor of 12a and 9a2? 9 36 3a 12a2 - Semiotic systems in multimodal texts - Customer relationship management systems help firms achieve customer intimacy - Georg fischer piping systems switzerland ltd - Fossil fuels for kids - Billing for laboratory services