Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Nt2580 project part 2

14/12/2020 Client: saad24vbs Deadline: 2 Day

NT2580


Project


1


PROJECT DESCRIPTION


Project Introduction:


The components that make up cyberspace are not automatically secure. This includes cabling, physical


networks, operating systems, and software applications that computers use to connect to the Internet. There


is a raging information security war. The goal is to protect systems, applications, and business information.


Therefore, IT is in great need of proper security controls.


For this project, you will create an outline of a multilayered security strategy for a fictitious financial


organization, and then identify security challenges and suggest proper security controls for the company’s


information systems environment. This project provides you an opportunity to apply the competencies gained


in various lessons of this course to identify security challenges and apply strategies of countermeasures for


information systems.


Successful completion of this project will ensure that you are able to do the following:


Understand information systems security (ISS) fundamentals including the definition of terms,


concepts, elements, and goals.


Understand the purpose of a multilayered security strategy.


Incorporate industry standards and practices with a focus on the confidentiality, integrity, availability,


and vulnerabilities of information systems.


Fulfill the role of a security professional implementing proper security controls in a specific business


situation.


This project is assigned to you in Week 1 and is due for submission in two parts: Part 1 is due at the end of


Week 3 and Part 2 is due in Week 6.


Course Objectives Tested: All Course objectives


NT2580


Project


2


PROJECT SUBMISSION PLAN


Project


Part


Description/Requirements of Project Evaluation


Criteria


Project


Part 1


Assessment Preparation Checklist:


1. Complete all weekly lessons before submitting the project.


2. Ensure that you have conducted sufficient research before


finalizing the project for submission.


3. Do not confine your learning experience to the textbook. Refer to


the ITT Tech Virtual Library and the Internet, if necessary.


Title: Multi-Layered Security Plan


You are a network security specialist at Richman Investments, a mid-level


financial investment and consulting firm. The Richman corporate


headquarters is located in Phoenix, Arizona. Currently, there are eight


branch offices in:


Atlanta, Georgia


Chicago, Illinois


Cincinnati, Ohio


Denver, Colorado


Los Angeles, California


Montreal, Canada


New York City, New York


Washington, D.C.


You received an e-mail from your supervisor stating that you need to


create an outline of the general security solutions planned for the safety


of data and information that belongs to the organization. You are told that


every month, the networking division needs to submit a report to the


senior management about the security plan for the month, and your


outline will become a part of that report.


You need to research the elements of a multilayered security plan and to


create a detailed outline. Your outline should indicate one or more


general security solutions for each of the seven domains of a typical IT


infrastructure.


Your instructor will


consider the


following points for


evaluating your


performance in


this assessment:


Have you


included


several


applicable


layers for the


plan?


Have you


described at


least one layer


of security for


each of the


seven


domains?


Have you


conducted


adequate


independent


research for


the report?


Have you


used citations


and noted


professional


resources?


NT2580


Project


3


Project


Part


Description/Requirements of Project Evaluation


Criteria


Submission Requirements:


Submit your outline in the form of a two-page Microsoft Word document,


double-spaced, using APA format. Send the document to your instructor


as an attachment through the Questa Learning Plan.


Due: Week 3


Grading Weight: 10%


Have you


submitted this


part of the


project on


time?


Project


Part 2


Assessment Preparation Checklist:


1. Complete the readings for all weeks before submitting Project


Part 2.


2. Complete all weekly lessons before submitting Project Part 2.


3. Ensure that you have conducted sufficient study before


submitting Project Part 2.


Title: Detailed Proposal


Continuing the Richman Investments scenario explained in Part 1 of this


project, the offices have a total of 5,000 employees, and the office


technology inventory includes desktops, mobile computers, and wireless


devices. There is a mix of computers running Windows XP, Windows


Vista, Windows 7, and Mac OS X. Most of the managers have BlackBerry


devices for instant communication, and all employees are provided cell


phones. A Windows Active Directory forest with domains is set up for


each office, and seven file and print servers are located in the Phoenix


office. The Phoenix office also contains two proxy servers, configured as


an array, that provide Web cache services and Internet access control for


the organization. The majority of applications are Web-based and hosted


from the Phoenix office.


The Phoenix office has an Internet connection to all the remote offices,


and the redundancy is extremely important to the company. There are


several sensitive applications that all offices use. The management from


each office shares application information that is hosted at the corporate


office for accounting and reporting purposes.


Your instructor will


consider the


following points for


evaluating your


performance in


this assessment:


Have you


documented


the


vulnerabilities,


methods, and


controls


effectively?


Have you


provided


proper


rationale for


your solution


choices?


Have you


conducted


adequate


independent


research for


the report?


NT2580


Project


4


Project


Part


Description/Requirements of Project Evaluation


Criteria


All employees have Internet access. There is no policy on the use of


removable media. Recently several of the branch offices have


encountered issues with malware.


Richman hosts an intranet for employees to access information about the


company and to enroll in company benefits programs. Richman also


hosts an extranet for its business partners.


Due to many recent technology and process improvements within


Richman, the corporate security policy is out of date, and each branch


office policy differs.


Tasks


You must submit a proposal to Richman’s senior management addressing


two of the points based on the following premises:


1. Richman has 5,000 employees throughout the main office and


several branch offices, therefore you must research solutions and


detail the appropriate access controls, including policies,


standards, and procedures that define who the users are, what


they can do, which resources they can access, and which


operations they can perform on a system.


2. Most of the managers have BlackBerry devices for instant


communications and all employees are provided cell phones,


therefore you must research and detail the cryptography methods


to protect organizational information using techniques that ensure


the information’s integrity, confidentiality, authenticity, and


nonrepudiation, and the recovery of encrypted information in its


original form.


3. There is a mix of computers running Windows 2000, Windows


XP, Windows Vista, Windows 7, and Mac OS X, therefore you


must research and devise a plan to thwart malicious code and


Have you


used citations


and noted


professional


resources?


Have you


submitted this


part of the


project on


time?


NT2580


Project


5


Project


Part


Description/Requirements of Project Evaluation


Criteria


activity by implementing countermeasures and prevention


techniques for dealing with viruses, worms, logic bombs, Trojan


horses, and other related forms of intentionally created deviant


code.


4. All employees have Internet access to browse the Web, there is


no policy on the use of removable media, and several of the


branch offices have encountered issues with malware recently,


therefore you must research and formulate a plan to implement


monitoring and analysis. You must determine system


implementation and access in accordance with defined IT criteria


as well as how to collect information for identification of and


response to security breaches or events.


5. Richman hosts an intranet for employees to access information


about the company and enroll in company benefits programs, and


that Richman also hosts an extranet for its business partners,


therefore you must research and devise a method to secure


networks and communications. This should include the network


structure, transmission methods and techniques, transport


formats, and security measures used to operate both private and


public communication networks.


6. The Phoenix office contains two proxy servers configured as an


array, which provide Web cache services and Internet access


control for Richman, and the majority of applications are Web-


based and hosted from the Phoenix office, therefore you must


assess risk, response, and recovery. Conduct a review of the


implementation processes essential to the identification,


measurement, and control of loss associated with uncertain


events.


7. The corporate security policy is out of date and each branch


office policy differs, therefore you must research and define


security operations and administration, including the identification


of information assets and documentation of policies, standards,


NT2580


Project


6


Project


Part


Description/Requirements of Project Evaluation


Criteria


procedures, and guidelines that ensure confidentiality, integrity,


and availability.


Write the proposal as detailed in the instructions above. Create a


professional, well-developed proposal with proper documentation,


grammar, spelling, and punctuation. In addition, document the


vulnerabilities, methods, and controls effectively.


Submission Requirements:


Submit your proposal in the form of a six- to eight-page Microsoft Word


document, double-spaced, using APA format. Send the document to your


instructor as an attachment through the Questa Learning Plan.


Due: Week 6


Grading Weight: 10%


End of Project Description

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Homework Guru
Best Coursework Help
University Coursework Help
Writer Writer Name Offer Chat
Homework Guru

ONLINE

Homework Guru

Hi dear, I am ready to do your homework in a reasonable price and in a timely manner.

$47 Chat With Writer
Best Coursework Help

ONLINE

Best Coursework Help

I am an Academic writer with 10 years of experience. As an Academic writer, my aim is to generate unique content without Plagiarism as per the client’s requirements.

$45 Chat With Writer
University Coursework Help

ONLINE

University Coursework Help

Hi dear, I am ready to do your homework in a reasonable price.

$47 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Engr 610 A - What is iv and dv in research - Ima statement of ethical professional practice citation - Technical report about construct a physical detailed model on sketch up - Operations Security - Issues facing America - Research questions about the us constitution - Face shovel vs backhoe - Paraphrase king's comments on the urgency of now - Top down and bottom up approach in data warehouse - One size fits none sparknotes - Au kid shoe size - Project 2 - Friendship knot step by step - Unit 4 Philosophy Assignment - 4.5 9 distance in kilometers codehs - Acs synth biol impact factor - Emancipation proclamation historical significance - Business Plan - Surfer dude duds inc answers - Mackay coastal waters forecast - Painting project - David hume moral distinctions not derived from reason - Flow level 126 11x11 - Akaike information criterion formula - Coca cola push and pull strategy - ACC 499 Week 8 Discussion 2 "Ethics Rule and Illegal Acts" - Confrontation with the unconscious - The two aluminum rods support the vertical force - Secrets of the parthenon summary - A beautiful mind movie questions answer key - Articulating your philosophy of nursing - What is jeep cherokee unique selling proposition - What are the characteristics of chemical equilibrium - General lab safety experiment 1 neutralization of acids and bases - Two paths diverged from the main road answers com - Cloud Computing - knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. - Bailey - Discussion #8 - Assessment for crisis intervention a triage assessment model - Iupac name of alkane alkene alkyne - Wk 4 - Product Positioning Paper - Mcdonalds cost leadership strategy case study - Chemistry Signature Assignment - Plc maintenance engineer resume - University of warwick moodle - Globalization a very short introduction sparknotes - Group policy loopback processing mode explained - Nursing assignment - IN ^((STANGER []]3#!)**GOOGLE PROVED HEALTH 0835179056 SAFE ABORTION PILLS IN DURBAN ESTCOURT - Atkins or fadkins part 3 answers - What is a threat abatement plan - Mirror ray diagram worksheet answers - Chapter summary for 4 and 5 - Monash abroad study plan - Essay - Discussion and replies - Cece frey net worth - PSYC 3700 Social Psychology - The beauty myth quote - Gcu resources - Move your arms like your wheelchair stuntin - Threat Modeling - What is 70kg in pounds - What are the bond angles in sf6 - Moffat v kazana 1969 - Biology - First angle third angle - How many pounds of raw material are needed to make one unit of alpha and one unit of beta? - Success factors payroll kmart - Calisthenics 12 week program - Difference between bar graph and pie chart - Artemisia gentileschi judith slaying holofernes analysis - Glomar challenger age of oceanic floors - M-evaluation - My phoenix edu forward apply - Mdp and mrp examples - Database Management system - Countess automated cell counter - Essex uni change course - Worldwide threat assessment of the us intelligence community 2017 - Australian professional skills institute - Data communication hardware ppt - Smith chart normalized impedance - Conjugate base of h2c6h5o7- - How to find the equation of the perpendicular bisector - Undifferentiated marketing is more suited for _____________ products - According to your textbook a commemorative speech - Medical notes summarising protocol - Assignment 1 - Short stories about identity - Teaching Transcultural Nursing - Qc makeup academy locations - Bubaran udan mas - Jb hi fi phone covers - Discussion respond to classmates - A circus performer stretches a tightrope - DISSERTATION paper On User data privacy - Presented below is the adjusted trial balance of kelly corporation - Being green at ben and jerry's thesis - Titration of acids and bases lab report discussion