Computer science - Computer Science
Network Security Plan This course has been composed of a series of Individual Project assignments that have contributed to a Key Assignment submission at the end of the course. Each week, you have completed a part of a network security plan. The full Key Assignment should include the following tasks: · Overview of Network and Existing Security (Week 1) · Select an organization as the target for the analysis. · Provide an overview of the organizations existing network architecture. · The overview will include description of the network, the topology, protocols allowed, connectivity methods and network equipment, number of routers, switches, and any other network equipment, such as VPN concentrators, proxies, etc. · Provide a summary of the current security devices currently in use on the network. · List the type of device, the vendor, and give a brief description of how the device is used. · Risk Assessment (Week 2) · Conduct an inventory of the devices within your network. Provide a summary of the number of desktops, laptops, network printers, and servers. · Identify key assets · Assets also include records and sensitive information that requires special protection. · Prioritize each asset or group of assets, and assign a value to each. · Identify and describe the risks within your environment. · Do not forget natural disasters. · Determine the likelihood that the risk could occur. · Identify the tools and methodology that you would use to conduct the risk assessment. · Security Architecture Plan (Week 3) · Based upon the risk assessment and your analysis, create an action plan to mitigate the risks that you have identified. · Identify and select appropriate technologies to protect the network and the organization’s information, and explain why you chose each technology. · Describe where you plan to place these technologies in the network, and explain why. · The plan should cover all layers of the OSI model. · Identify additional software that will be required to monitor the network and protect key assets. · Identify security controls that need to be implemented to assist in mitigating risks. · Security Policies (Week 4) · Create the Key Assignment first draft for peer review. · Continue the development of the plan. · Create a fourth section in the plan to list all of the policies you would have for your organization and a brief description of what each policy will contain. · Each policy will address how you plan to monitor the policy and what the appropriate punishments should be for violators. · Provide a timetable for when these policies should be reviewed and updated. · Continue development of the Network Security Plan with an Incident Response Plan of 2–3 pages. · Include the actions that need to occur when an incident is in progress. · Include how your organization will identify and classify incidents, what the response will be, and the plan to recover. · Implementation and Incident Response (Week 5) · Analyze previous submissions, and make changes as necessary to the final paper. · Submit a detailed implementation plan of 4–5 pages that will describe your proposed solution for the implementation of the Network Security Plan for the organization. · This is the last and final section of the Key Assignment and should bring together all aspects of the implementation in one cohesive paper. · Revise the previous sections so that the entire plan flows and has a strong introduction and conclusion. · Submit the final Key Assignment. Uprety2 Table of Contents Project Outline: (Week 1) 2 Outline of Network and Existing Security 3 Background 4 Current Situation of Technology 4 Description of the Network……………………………………………………………………………………………………………………..4 The Topology………………………………………………………………………………………………………………………………………4 Protocols Allowed…………………………………………………………………………………………………………………………..4 Connectivity Methods…………………………………………………………………………………………………………………….5 Network Equipment…………………………………………………………………………………………………………………………..5 Requirements for Upgrade………………………………………………………………………………………………………………………6 Risk Assessment (Week 2) 6 Inventory of Devices……………………………………………………………………………………………………………………….6 Identification of Key Assets…………………………………………………………………………………………………………….6 Identification of Risks……………………………………………………………………………………………………………………..7 Tools and Methodology for Risk Assessment………………………………………………………………………………….7 Security Architecture Plan (Week 3) 8 Security Policies (Week 4) 10 Incident Response plan 14 Implementation Plan (Week 5) 15 References 16 Outline of Network and Existing Security Background The Acme Corporation is a fictitious staffing firm situated in Denver, Colorado, which has been delivering staffing solutions to clients from across the United States since its founding in 1995. For enterprises in need of a staffing solution, Acme Corporation has been providing its highly skilled, develop teams, and highly qualified workforce at better rates. This organization not only meets the demand for qualified personnel, but also adheres to the philosophy of putting the right person in the right position. Acme Corporations main goal is to place the right applicant in the right organization with the right culture so that both the company and the individual employee may flourish. It offers staffing solutions for a variety of industries, including technology, service, hospitals, and education. Most of its functions centralized even though it has 150 branches in all 50 states. Current Situation of Technology Network Description and Topology The TCP/IP paradigm is currently in use at Acme Corporation, with client computers connecting to the primary server which is in Denver, Colorado through both physical and wireless connections. This corporation has its own WAN (Wide Area Network) which allows employees to perform company tasks using cell phones, tablets, PCs, fax machines, printers, and scanners. Each Acme Corporation branch has a few client computers that are linked to the branchs main server, which is also connected to the Denver main server. The connections and nodes of Acme Corporations communication network are connected through a combination of star and bus topology. Protocols Allowed At different tiers of Acme Corporations TCP/IP architecture, a variety of communication protocols is currently being employed. The application layer protocols are a reflection layer that indicates the shared communications and interface techniques utilized by hosts in a communication network which includes Hyper Text Transfer Protocol (HTTP), File Transfer Protocol (FTP), Post Office Protocol (POP), and the network layer protocols is a protocol which is responsible for forwarding packets, and it includes Open Shortest Path First (OSPF), Internet Control Message Protocol (ICMP), and Internet Protocol (IP). Transport layer protocols plays a crucial role on data exchange with applications by providing reliable virtual circuit and it includes Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). Datalink layer protocols include Ethernet and WLAN. All these protocols aid Acme Corporation in transferring files, network administration, application network requests segmentation of data, and end-to-end transmission, addressing, streams, and routing, as well as defining how client computers contact the network. Connectivity Methods In terms of connectivity, Acme Corporation will use the indirect access technique, where the computers in office are connected to the internet through Wi-Fi and ethernet. The organization is associated with the web through twisted pair cables. The usage of an indirect network access technique is preferred since it is quick, dependable, which allows for easy connection sharing. The firm is employing category 7 twisted pair cables because they can handle 10 Gbps speeds, which meets the companys high-speed transmission needs. Network Equipment Repeaters are used to extend the network, while bridges are used to partition overburdened networks into more modest sections, the routers are used in connectivity of same or distinct networks, Gateways are used to interpret different frame formats, and firewalls which are used by Acme Corporation (packet filtering, and proxy firewall). Acme Corporation is currently experiencing several issues because of its use of the TCP/IP model, and this model isnt a very remarkable aide for designing new networks and utilizing new innovations including its inability to address protocol stacks other than the TCP/IP suite and This model cannot even describe the Bluetooth connection because it is not generic in nature. Risk Assessment (Week 2) Inventory of Devices As a company, one should have a knowledge of their inventory of devices that is being used in their network. Acme Corporation have a list of devices which includes laptops, Pcs, routers, applicant tracking system, printers. Network Inventory Management and monitoring plays a crucial role in ensuring your organization stays solid, well planned, and functioning very well. Network inventory management also allows you to monitor what network equipment you have and all their applicable programming and equipment. Acme Corporation has 150 branches all over the states with a total of 5000 employees. It requires 4000 desktops with additional 1000 desktops and some employees are given personal laptops to work from home. The company requires 900 printers and fax machines to print the document and send it over to their clients which is required to do the paperwork. Every branch has its own server, which is required to perform the operation smoothly, and the main server is in Denver, Colorado which is also the main branch office, and it can also control the network server of almost every branch, and it helps other branches if there arises any network traffic blockage, and software update, bug fixes and so on. Acme Corporation also has been using a tool called SolarWinds Network Configuration Manager which allows the user to identify, map, and catalog your whole network, as well as provide high-quality network automation tools and performance monitors. This tool helps the company to adjust the changes that occurs in the companys environment and this tool also includes a network inventory scanner whose function is to track and document multiple devices and types of devices that are being used in many locations which includes IP addresses, serial numbers, vendors, port details, end-of-life information. Identification of Key Assets Key Assets are something that plays an essential role in your business core operation. Some of the key assets of Acme Corporation includes product design, confidential files, Computers, Clients, financial information, equipment and so on. Apart from this, the most crucial Assets for Acme Corporation is its work force, without the workforce the company is not able to sustain in the market and in the long run. To classify the level of criticality, the assets of Acme corporation are given an assigned value from 5 to 10 where 5 being the least critical and 10 being the most critical which requires crucial attention and protection. Assets Level of Severity Buildings 7 Product design 10 Computers 8 Equipment 6 Confidential files 10 Clients 10 Vehicles 6 Employees 10 Applications 10 Servers 10 Office Supplies 5 From the Above table, the Assets that require special protection are- Applications, employees, confidential files, Servers, and Clients. As these major assets play a crucial role in running operation smoothly. Clients are the reason that this company is running without its clients cannot success in the market, so the clients are to be given extra care. Just like Clients, employees are also the backbone of Acme Corporation, so the employees should be treated nicely and create a friendly environment, giving pay raise according to their performance which will certainly motivate employees to be a better version of themselves at workplace. Application, Confidential files, and Server also require special protection. Data breach, intrusion and hackers are the modern-day problems so it is better to monitor any suspicious activity in the system their arise any data breach in the system, The company might also face financial loss if there arises data breach in the system. So, the company must be fully aware about these key assets and how the company should provide extra protection before facing any consequences. Identification of Risks Risk Identification is the process of identifying risks which could potentially prevent the company from achieving its goals or objectives, it is also the critical first step of the Risk Management process. Some of the risks that is likely to occur in Acme corporation and how the preventive measures can be applied to avoid the risks are as follows- · Data Breach – The Data breach might occur due to the lack of network security which includes the lack of monitoring in the system, having a weak firewall. This risk could potentially lead to financial loss to the company, losing a sensitive data from the system, software crash in the computer. This risk can be prevented by making the firewalls stronger by locking down the VPN Access, shutting off the unused network services, and by setting a virtual perimeter. · Fire- There might occur a fire in the company, with someone’s negligence, or if there occurs any short circuit. This risk can be prevented with applying proper safety measures like having a fire extinguisher in a proper place, fire alarm to alert all the people and making staffs aware about the emergency exit if there arises any fire. · Lack of proper Training to the Employees- If an employee is not well trained, then he/she could potentially make the company lose their customers or the company might also lose some valuable information if he/she is not properly trained use the application. This can be corrected by giving an employee proper training and having an administrative control in the network which would allow the administrator to keep an eye on everyone. · Virus- The virus is typically designed to cause a damage in the system which could potentially lead to software crash, server crash or even damage to the computer. This threat can be minimized by having an antivirus and updating it. Alerting employees to not to enter in an untrusted website or not clicking any suspicious emails. · Tsunami, Earthquake, Storm- These are the natural disaster which is less likely to occur in an organization and we don’t have any control over these natural disasters. The Acme corporation could make a safety measure like making a hiding shed if there occurs any of this disaster and putting the safety measure like what needs to be done, how can one be safe if there arises any of this natural disaster. Tools and Methodology for Risk Assessment Every Organization faces risks, so to tackle those risks Acme Corporation has been using a certain tools and Method. Some of the tools and Methodology that the Acme Corporation has been using for Risk Assessment are as follows- · Failures Modes and Effects Analysis (FMEA) - This Analysis describes all the way that a design, or a product can fail. (FMEA)charts place the process steps or designs of a problem in individual rows and create maps in vertical columns which will allow the corporation to plan all the details to identify the potential failures in their network security, its cause and the actions that are required associated with the details. · A1 Tracker- Acme Corporation has also been using a software or a tool called A1 Tracker. This tool is an efficient web-based UI enough to record and manage project risks and its products are also user friendly. This software also alert company stakeholders about extended risk by region, department, or division in need. These are the tools and methodology that Acme Corporation has been using to handle the risks and prevent it from happening again. Security Architecture plan (Week 3 TBD) Security Policies (Week 4 TBD) Implementation Plan (Week 5 TBD) References Computer network: TCP/IP model - JAVATPOINT. www.javatpoint.com. (n.d.). https://www.javatpoint.com/computer-network-tcp-ip-model. Maymi, F., & Harris, S. (2018). CISSP all-in-One exam guide (8th ed.). McGraw-Hill Education. 3, C. N. on A., 15, E. T. Q. on A., & 1, C. N. on D. (2021, August 3). 4 risk assessment tools for all Quality pros. ETQ. https://www.etq.com/blog/4-risk-assessment-tools-all-quality-pros-should-have-in-their-toolbox/. Ptacek, T. (2003, November 13). 10 tips for improving security inside the firewall. Computerworld. https://www.computerworld.com/article/2573934/10-tips-for-improving-security-inside-the-firewall.html. Top 10 risk assessment and management tools and techniques. Software Testing Help. (2021, August 6). https://www.softwaretestinghelp.com/risk-management-tools/.
CATEGORIES
Economics Nursing Applied Sciences Psychology Science Management Computer Science Human Resource Management Accounting Information Systems English Anatomy Operations Management Sociology Literature Education Business & Finance Marketing Engineering Statistics Biology Political Science Reading History Financial markets Philosophy Mathematics Law Criminal Architecture and Design Government Social Science World history Chemistry Humanities Business Finance Writing Programming Telecommunications Engineering Geography Physics Spanish ach e. Embedded Entrepreneurship f. Three Social Entrepreneurship Models g. Social-Founder Identity h. Micros-enterprise Development Outcomes Subset 2. Indigenous Entrepreneurship Approaches (Outside of Canada) a. Indigenous Australian Entrepreneurs Exami Calculus (people influence of  others) processes that you perceived occurs in this specific Institution Select one of the forms of stratification highlighted (focus on inter the intersectionalities  of these three) to reflect and analyze the potential ways these ( American history Pharmacology Ancient history . Also Numerical analysis Environmental science Electrical Engineering Precalculus Physiology Civil Engineering Electronic Engineering ness Horizons Algebra Geology Physical chemistry nt When considering both O lassrooms Civil Probability ions Identify a specific consumer product that you or your family have used for quite some time. This might be a branded smartphone (if you have used several versions over the years) or the court to consider in its deliberations. Locard’s exchange principle argues that during the commission of a crime Chemical Engineering Ecology aragraphs (meaning 25 sentences or more). Your assignment may be more than 5 paragraphs but not less. INSTRUCTIONS:  To access the FNU Online Library for journals and articles you can go the FNU library link here:  https://www.fnu.edu/library/ In order to n that draws upon the theoretical reading to explain and contextualize the design choices. Be sure to directly quote or paraphrase the reading ce to the vaccine. Your campaign must educate and inform the audience on the benefits but also create for safe and open dialogue. A key metric of your campaign will be the direct increase in numbers.  Key outcomes: The approach that you take must be clear Mechanical Engineering Organic chemistry Geometry nment Topic You will need to pick one topic for your project (5 pts) Literature search You will need to perform a literature search for your topic Geophysics you been involved with a company doing a redesign of business processes Communication on Customer Relations. Discuss how two-way communication on social media channels impacts businesses both positively and negatively. Provide any personal examples from your experience od pressure and hypertension via a community-wide intervention that targets the problem across the lifespan (i.e. includes all ages). Develop a community-wide intervention to reduce elevated blood pressure and hypertension in the State of Alabama that in in body of the report Conclusions References (8 References Minimum) *** Words count = 2000 words. *** In-Text Citations and References using Harvard style. *** In Task section I’ve chose (Economic issues in overseas contracting)" Electromagnetism w or quality improvement; it was just all part of good nursing care.  The goal for quality improvement is to monitor patient outcomes using statistics for comparison to standards of care for different diseases e a 1 to 2 slide Microsoft PowerPoint presentation on the different models of case management.  Include speaker notes... .....Describe three different models of case management. visual representations of information. They can include numbers SSAY ame workbook for all 3 milestones. You do not need to download a new copy for Milestones 2 or 3. When you submit Milestone 3 pages): Provide a description of an existing intervention in Canada making the appropriate buying decisions in an ethical and professional manner. Topic: Purchasing and Technology You read about blockchain ledger technology. Now do some additional research out on the Internet and share your URL with the rest of the class be aware of which features their competitors are opting to include so the product development teams can design similar or enhanced features to attract more of the market. The more unique low (The Top Health Industry Trends to Watch in 2015) to assist you with this discussion.         https://youtu.be/fRym_jyuBc0 Next year the $2.8 trillion U.S. healthcare industry will   finally begin to look and feel more like the rest of the business wo evidence-based primary care curriculum. Throughout your nurse practitioner program Vignette Understanding Gender Fluidity Providing Inclusive Quality Care Affirming Clinical Encounters Conclusion References Nurse Practitioner Knowledge Mechanics and word limit is unit as a guide only. The assessment may be re-attempted on two further occasions (maximum three attempts in total). All assessments must be resubmitted 3 days within receiving your unsatisfactory grade. You must clearly indicate “Re-su Trigonometry Article writing Other 5. June 29 After the components sending to the manufacturing house 1. In 1972 the Furman v. Georgia case resulted in a decision that would put action into motion. Furman was originally sentenced to death because of a murder he committed in Georgia but the court debated whether or not this was a violation of his 8th amend One of the first conflicts that would need to be investigated would be whether the human service professional followed the responsibility to client ethical standard.  While developing a relationship with client it is important to clarify that if danger or Ethical behavior is a critical topic in the workplace because the impact of it can make or break a business No matter which type of health care organization With a direct sale During the pandemic Computers are being used to monitor the spread of outbreaks in different areas of the world and with this record 3. Furman v. Georgia is a U.S Supreme Court case that resolves around the Eighth Amendments ban on cruel and unsual punishment in death penalty cases. The Furman v. Georgia case was based on Furman being convicted of murder in Georgia. Furman was caught i One major ethical conflict that may arise in my investigation is the Responsibility to Client in both Standard 3 and Standard 4 of the Ethical Standards for Human Service Professionals (2015).  Making sure we do not disclose information without consent ev 4. Identify two examples of real world problems that you have observed in your personal Summary & Evaluation: Reference & 188. Academic Search Ultimate Ethics We can mention at least one example of how the violation of ethical standards can be prevented. Many organizations promote ethical self-regulation by creating moral codes to help direct their business activities *DDB is used for the first three years For example The inbound logistics for William Instrument refer to purchase components from various electronic firms. During the purchase process William need to consider the quality and price of the components. In this case 4. A U.S. Supreme Court case known as Furman v. Georgia (1972) is a landmark case that involved Eighth Amendment’s ban of unusual and cruel punishment in death penalty cases (Furman v. Georgia (1972) With covid coming into place In my opinion with Not necessarily all home buyers are the same! When you choose to work with we buy ugly houses Baltimore & nationwide USA The ability to view ourselves from an unbiased perspective allows us to critically assess our personal strengths and weaknesses. This is an important step in the process of finding the right resources for our personal learning style. Ego and pride can be · By Day 1 of this week While you must form your answers to the questions below from our assigned reading material CliftonLarsonAllen LLP (2013) 5 The family dynamic is awkward at first since the most outgoing and straight forward person in the family in Linda Urien The most important benefit of my statistical analysis would be the accuracy with which I interpret the data. The greatest obstacle From a similar but larger point of view 4 In order to get the entire family to come back for another session I would suggest coming in on a day the restaurant is not open When seeking to identify a patient’s health condition After viewing the you tube videos on prayer Your paper must be at least two pages in length (not counting the title and reference pages) The word assimilate is negative to me. I believe everyone should learn about a country that they are going to live in. It doesnt mean that they have to believe that everything in America is better than where they came from. It means that they care enough Data collection Single Subject Chris is a social worker in a geriatric case management program located in a midsize Northeastern town. She has an MSW and is part of a team of case managers that likes to continuously improve on its practice. The team is currently using an I would start off with Linda on repeating her options for the child and going over what she is feeling with each option.  I would want to find out what she is afraid of.  I would avoid asking her any “why” questions because I want her to be in the here an Summarize the advantages and disadvantages of using an Internet site as means of collecting data for psychological research (Comp 2.1) 25.0\% Summarization of the advantages and disadvantages of using an Internet site as means of collecting data for psych Identify the type of research used in a chosen study Compose a 1 Optics effect relationship becomes more difficult—as the researcher cannot enact total control of another person even in an experimental environment. Social workers serve clients in highly complex real-world environments. Clients often implement recommended inte I think knowing more about you will allow you to be able to choose the right resources Be 4 pages in length soft MB-920 dumps review and documentation and high-quality listing pdf MB-920 braindumps also recommended and approved by Microsoft experts. The practical test g One thing you will need to do in college is learn how to find and use references. References support your ideas. College-level work must be supported by research. You are expected to do that for this paper. You will research Elaborate on any potential confounds or ethical concerns while participating in the psychological study 20.0\% Elaboration on any potential confounds or ethical concerns while participating in the psychological study is missing. Elaboration on any potenti 3 The first thing I would do in the family’s first session is develop a genogram of the family to get an idea of all the individuals who play a major role in Linda’s life. After establishing where each member is in relation to the family A Health in All Policies approach Note: The requirements outlined below correspond to the grading criteria in the scoring guide. At a minimum Chen Read Connecting Communities and Complexity: A Case Study in Creating the Conditions for Transformational Change Read Reflections on Cultural Humility Read A Basic Guide to ABCD Community Organizing Use the bolded black section and sub-section titles below to organize your paper. For each section Losinski forwarded the article on a priority basis to Mary Scott Losinksi wanted details on use of the ED at CGH. He asked the administrative resident