Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Nt2580 project part 2

14/12/2020 Client: saad24vbs Deadline: 2 Day

NT2580


Project


1


PROJECT DESCRIPTION


Project Introduction:


The components that make up cyberspace are not automatically secure. This includes cabling, physical


networks, operating systems, and software applications that computers use to connect to the Internet. There


is a raging information security war. The goal is to protect systems, applications, and business information.


Therefore, IT is in great need of proper security controls.


For this project, you will create an outline of a multilayered security strategy for a fictitious financial


organization, and then identify security challenges and suggest proper security controls for the company’s


information systems environment. This project provides you an opportunity to apply the competencies gained


in various lessons of this course to identify security challenges and apply strategies of countermeasures for


information systems.


Successful completion of this project will ensure that you are able to do the following:


Understand information systems security (ISS) fundamentals including the definition of terms,


concepts, elements, and goals.


Understand the purpose of a multilayered security strategy.


Incorporate industry standards and practices with a focus on the confidentiality, integrity, availability,


and vulnerabilities of information systems.


Fulfill the role of a security professional implementing proper security controls in a specific business


situation.


This project is assigned to you in Week 1 and is due for submission in two parts: Part 1 is due at the end of


Week 3 and Part 2 is due in Week 6.


Course Objectives Tested: All Course objectives


NT2580


Project


2


PROJECT SUBMISSION PLAN


Project


Part


Description/Requirements of Project Evaluation


Criteria


Project


Part 1


Assessment Preparation Checklist:


1. Complete all weekly lessons before submitting the project.


2. Ensure that you have conducted sufficient research before


finalizing the project for submission.


3. Do not confine your learning experience to the textbook. Refer to


the ITT Tech Virtual Library and the Internet, if necessary.


Title: Multi-Layered Security Plan


You are a network security specialist at Richman Investments, a mid-level


financial investment and consulting firm. The Richman corporate


headquarters is located in Phoenix, Arizona. Currently, there are eight


branch offices in:


Atlanta, Georgia


Chicago, Illinois


Cincinnati, Ohio


Denver, Colorado


Los Angeles, California


Montreal, Canada


New York City, New York


Washington, D.C.


You received an e-mail from your supervisor stating that you need to


create an outline of the general security solutions planned for the safety


of data and information that belongs to the organization. You are told that


every month, the networking division needs to submit a report to the


senior management about the security plan for the month, and your


outline will become a part of that report.


You need to research the elements of a multilayered security plan and to


create a detailed outline. Your outline should indicate one or more


general security solutions for each of the seven domains of a typical IT


infrastructure.


Your instructor will


consider the


following points for


evaluating your


performance in


this assessment:


Have you


included


several


applicable


layers for the


plan?


Have you


described at


least one layer


of security for


each of the


seven


domains?


Have you


conducted


adequate


independent


research for


the report?


Have you


used citations


and noted


professional


resources?


NT2580


Project


3


Project


Part


Description/Requirements of Project Evaluation


Criteria


Submission Requirements:


Submit your outline in the form of a two-page Microsoft Word document,


double-spaced, using APA format. Send the document to your instructor


as an attachment through the Questa Learning Plan.


Due: Week 3


Grading Weight: 10%


Have you


submitted this


part of the


project on


time?


Project


Part 2


Assessment Preparation Checklist:


1. Complete the readings for all weeks before submitting Project


Part 2.


2. Complete all weekly lessons before submitting Project Part 2.


3. Ensure that you have conducted sufficient study before


submitting Project Part 2.


Title: Detailed Proposal


Continuing the Richman Investments scenario explained in Part 1 of this


project, the offices have a total of 5,000 employees, and the office


technology inventory includes desktops, mobile computers, and wireless


devices. There is a mix of computers running Windows XP, Windows


Vista, Windows 7, and Mac OS X. Most of the managers have BlackBerry


devices for instant communication, and all employees are provided cell


phones. A Windows Active Directory forest with domains is set up for


each office, and seven file and print servers are located in the Phoenix


office. The Phoenix office also contains two proxy servers, configured as


an array, that provide Web cache services and Internet access control for


the organization. The majority of applications are Web-based and hosted


from the Phoenix office.


The Phoenix office has an Internet connection to all the remote offices,


and the redundancy is extremely important to the company. There are


several sensitive applications that all offices use. The management from


each office shares application information that is hosted at the corporate


office for accounting and reporting purposes.


Your instructor will


consider the


following points for


evaluating your


performance in


this assessment:


Have you


documented


the


vulnerabilities,


methods, and


controls


effectively?


Have you


provided


proper


rationale for


your solution


choices?


Have you


conducted


adequate


independent


research for


the report?


NT2580


Project


4


Project


Part


Description/Requirements of Project Evaluation


Criteria


All employees have Internet access. There is no policy on the use of


removable media. Recently several of the branch offices have


encountered issues with malware.


Richman hosts an intranet for employees to access information about the


company and to enroll in company benefits programs. Richman also


hosts an extranet for its business partners.


Due to many recent technology and process improvements within


Richman, the corporate security policy is out of date, and each branch


office policy differs.


Tasks


You must submit a proposal to Richman’s senior management addressing


two of the points based on the following premises:


1. Richman has 5,000 employees throughout the main office and


several branch offices, therefore you must research solutions and


detail the appropriate access controls, including policies,


standards, and procedures that define who the users are, what


they can do, which resources they can access, and which


operations they can perform on a system.


2. Most of the managers have BlackBerry devices for instant


communications and all employees are provided cell phones,


therefore you must research and detail the cryptography methods


to protect organizational information using techniques that ensure


the information’s integrity, confidentiality, authenticity, and


nonrepudiation, and the recovery of encrypted information in its


original form.


3. There is a mix of computers running Windows 2000, Windows


XP, Windows Vista, Windows 7, and Mac OS X, therefore you


must research and devise a plan to thwart malicious code and


Have you


used citations


and noted


professional


resources?


Have you


submitted this


part of the


project on


time?


NT2580


Project


5


Project


Part


Description/Requirements of Project Evaluation


Criteria


activity by implementing countermeasures and prevention


techniques for dealing with viruses, worms, logic bombs, Trojan


horses, and other related forms of intentionally created deviant


code.


4. All employees have Internet access to browse the Web, there is


no policy on the use of removable media, and several of the


branch offices have encountered issues with malware recently,


therefore you must research and formulate a plan to implement


monitoring and analysis. You must determine system


implementation and access in accordance with defined IT criteria


as well as how to collect information for identification of and


response to security breaches or events.


5. Richman hosts an intranet for employees to access information


about the company and enroll in company benefits programs, and


that Richman also hosts an extranet for its business partners,


therefore you must research and devise a method to secure


networks and communications. This should include the network


structure, transmission methods and techniques, transport


formats, and security measures used to operate both private and


public communication networks.


6. The Phoenix office contains two proxy servers configured as an


array, which provide Web cache services and Internet access


control for Richman, and the majority of applications are Web-


based and hosted from the Phoenix office, therefore you must


assess risk, response, and recovery. Conduct a review of the


implementation processes essential to the identification,


measurement, and control of loss associated with uncertain


events.


7. The corporate security policy is out of date and each branch


office policy differs, therefore you must research and define


security operations and administration, including the identification


of information assets and documentation of policies, standards,


NT2580


Project


6


Project


Part


Description/Requirements of Project Evaluation


Criteria


procedures, and guidelines that ensure confidentiality, integrity,


and availability.


Write the proposal as detailed in the instructions above. Create a


professional, well-developed proposal with proper documentation,


grammar, spelling, and punctuation. In addition, document the


vulnerabilities, methods, and controls effectively.


Submission Requirements:


Submit your proposal in the form of a six- to eight-page Microsoft Word


document, double-spaced, using APA format. Send the document to your


instructor as an attachment through the Questa Learning Plan.


Due: Week 6


Grading Weight: 10%


End of Project Description

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Homework Guru
Best Coursework Help
University Coursework Help
Writer Writer Name Offer Chat
Homework Guru

ONLINE

Homework Guru

Hi dear, I am ready to do your homework in a reasonable price and in a timely manner.

$47 Chat With Writer
Best Coursework Help

ONLINE

Best Coursework Help

I am an Academic writer with 10 years of experience. As an Academic writer, my aim is to generate unique content without Plagiarism as per the client’s requirements.

$45 Chat With Writer
University Coursework Help

ONLINE

University Coursework Help

Hi dear, I am ready to do your homework in a reasonable price.

$47 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Circular double stranded dna molecule - Annotated Biblography - The forests of silence - Examine china's projected economic activity on the below table - Firm risk scorecard risk classification system - Discussion BI - Important metrics for operations managers - Strong interest inventory review - Firestone ride rite air bags warranty - Percent copper in brass lab answers - The player negotiation case - Intrinsic factors in sport - Brasso metal polish msds australia - PAPER - Joan shays appli bond needles - Jumbled words with answers - Standards focus exploring expository writing arthur miller biography answer key - Imaginary foundation chalkboard zip hoodie - Fm global property loss prevention data sheet 1 29 - Discussion 2 - When was buster keaton born - Strategies to extend product life cycle - Adventure Game Outline: Flowchart Development - Microsoft nokia acquisition case study - BLACK OUT SUMMER 1977 - Healthcare ecosystem - Four steps in managing external stakeholder relationships - Glendale east public school - When did the target data breach occur - Royal derby hospital switchboard - When scout questions walter's table manners - Imi ata online test - Public policy 6 chapter assignments - Aesthetics and ergonomics in product design - Coniferous forest map symbol - Rituals - Grow back receding gums naturally - Which nutrient has the most calories per gram - Icc illinois gov motorcarrier ucr aspx - Maria food service provides meals that nonprofit - Market segmentation multiple choice questions and answers - Malcolm x coming to an awareness of language essay - Global supply chain management v2 simulation answers - Accounting - Discussion - Horseplay in the workplace powerpoint - Robin hood case study strategic management - Asg5 - Weiser lock shim pick - Austral bronze crane copper limited - Cat poems for kids - The normal heart bruce niles - How it feels to be colored me imagery - Amazon sales and operations planning in supply chain integration - What are the drawbacks of a page fault when a virtual memory page is not resident? - Why might you use a perception check - What is dutiable value of used car wa - Which line best illustrates alliteration - Where is calcium stored mastering biology - Publishing with palgrave macmillan a guide for authors - How to answer sociology essay questions - Sticks and stones and other student essays pdf - Height in visual field psychology - How to append to an array in java - Methyl methacrylate msds sigma aldrich - Motorola's global strategy case study answers - Chemistry planning question o level - Itpm best practices - Realidades 1 capitulo 3a answers - Discussion: Mission Area Goals—Capabilities and Elements - Fedscope - Acsm guidelines 9th edition - Reading Response - The girl who can ama ata aidoo theme - Http www apa org pubs databases psycinfo index aspx - Andrew chinn these hands - A writers reference 7th edition by diana hacker - Assignment 3 - Reading response - Air cargo tracking system ppt - Types of staffing policy - Air force missile - Writing tutor wesleyan - Literature review - Week 1 Course Project: Topic Selection - Wk 7 fin article - 3.7v lithium battery jaycar - Relax - Default blackvue wifi password - Mixing tank baffle design - Nrs 433v week 1 assignment - 11.1 kw to amps - Enterprise Architecture - Martin cosgrove goldman sachs - Boysen jensen experiment on phototropism - Cover letter for criminal justice graduate - Shadow health cough danny rivera - Investment Firm cybercrime risk assesment - Excel chapter 4 grader project pet supplies - Puzzle 104 pandora's box