Skip to main content

Secure Infrastructure Design

Subject:  IT-FP4070 – Cyber Defense and Countermeasures. 
Assignment 1 :  
Secure Infrastructure Design
Length: 4 pages, excluding the references page, and 6 slides.
Assessment Instructions
Part A: General Security Infrastructure Questions
Write 4–5 pages that examine secure infrastructure concepts. Address the following:
Differentiate between normal and suspicious network traffic signatures.
Evaluate the role of IDS/IPS signature analysis in developing a secure network infrastructure.
Identify the components of an intrusion detection system (IDS), including NIDS, HIDS, and IPS implementations.
Describe commonly used controls for separating internal and external networks.
Explain how port security contributes to an overall network security implementation.
Part B: Case Study: Presentation to the Board on Security Infrastructure
Use the organization and characteristics described in the Case Study: Global Widgets Inc. document found in the Required Resources as the context in which to address the following:
In your role as information security professional serving the CIO, you have been asked to make a presentation to the Global Widgets board that analyzes the current security infrastructure design and evaluates the security implications of moving IT functions to a cloud-based environment.
Create a 6–8 slide PowerPoint presentation that addresses the following:
Diagram the existing network security design.
Diagram the proposed network security design.
Evaluate the potential risks to organizational assets that might result from a move to a cloud-based environment.
Select information security controls that can be used to mitigate potential threats and vulnerabilities relative to the organizational move to a cloud-based infrastructure.
Evaluate whether adopting the CEO's proposal to move to the cloud will result in required changes to the network security design and architecture that will or will not enhance the overall security profile of the organization. Explain.

Comments

Popular posts from this blog

Starting with this provided code, add the following functionality

1.Starting with this provided code, add the following functionality: Replace hardcoded strings “Zero”, “One”, “Two”, “Three” in the ArrayList based on user typed input (use Scanner or JOptionPane classes). The user will be prompted for the String to be stored in the ArrayList and then hit enter. The user will be able to continue to add items to the ArrayList until they just hit enter without typing anything. Once the user does this (hits enter without typing anything), the program will display all of the elements of the ArrayList, both the index and String values, in a table. It will do this via a single loop making use of an iterator method. 2. Starting with this provided code, add the following functionality: Use a Try/Catch block so that the exception is caught and the program exits a bit more gracefully. Save this file as TryCatch.java. (Be sure to rename the Public Class accordingly.) Starting with the provided code again (without the Try/Catch block), fix the code so that

Josie Eskander

  Question 1: Task 1: Report Assume you are Josie Eskander. You are writing in response to techno trading P/L’s advertisement of a new laptop at 20% below normal price. You want information on brand name, availability of service and repairs, delivery times and methods of payment. Write the letter using the seven basic parts of the letter. In the opening paragraph present a clear and courteous request. Secondly write a response from techno trading giving details and proposing the sale. Provide draft of both emails in the space below. Question 2: Task 2: Report In pairs, nominate a good and a bad letter writer. Discuss the key differences. Write a good/bad letter from techno training to Alex Antonov accepting/declining his proposal to invest in the business Question 3: Task 3: Report Write a letter from techno trading p/l to a new client ‘new realities p/l’ urging them to buy techno new virtual reality software. Make a strong argument for the product. Question 4: Task 4: Report Write a l

Sandra Coke is vice president for research and development at Great Lakes Foods (GLF), a large snack food company that has approximately 1,000 employees

Chapter 2 I Trait Approach 33 CASE 2.1 Choosing a New Director of Research Sandra Coke is vice president for research and development at Great Lakes Foods (GLF), a large snack food company that has approximately 1,000 employees. As a result of a recent reorganization, Sandra must choose the new director of research. The director will report directly to Sandra and will be responsible for developing and testing new products. The research division of GLF employs about 200 people. The choice of directors is important because Sandra is receiving pressure from the president and board of GLF to improve the company's overall growth and productivity. Sandra has identified three candidates for the position. Each candidate is at the same managerial level. She is having difficulty choosing one of them because each has very strong credentials. Alexa Smith is a longtime employee of GLF who started part-time in the mailroom while in high school. After finishing school, Alexa worked in as many as