Above is the Global Finance, Inc. (GFI) network diagram. GFI has grown rapidly this past year and acquired many network devices as displayed in the diagram. The company invested in the network and...

1 answer below »
Above is the Global Finance, Inc. (GFI) network diagram. GFI has grown rapidly this past year and acquired many network devices as displayed in the diagram. The company invested in the network and designed it to be fault tolerant and resilient from any network failures. However, although the company’s financial status has matured and its network has expanded at a rapid pace, its network security has not kept up with the company growth.
GFI’s network is fairly stabilized as it has not experienced many outages due to network failures. GFI has hired three (3) network engineers to keep up with the network growth and the bandwidth demand by the company employees and the clients. However, the company has not hired any security personnel who can take care of the operational security responsibility.
The trusted computing base (TCB) internal network in the Global Finance, Inc. Network Diagram hosts the company’s mission critical systems without which the company’s operations and financial situation would suffer. The Oracle database and email systems are among the most intensively used application servers in the company. GFI cannot afford system outages because its cash flow and financial systems heavily depend on the network stability. GFI has experienced DOS network attacks twice this year and its Oracle database and email servers had been down for a week. The recovery process required GFI to use $25,000 to restore its operations back to normal. GFI estimated the loss from these network attacks at more than $100,000 including lost customer confidence.
Write a twelve to fifteen (12-15) page formal risk assessment proposal and redraw the above diagram of a secure and risk-mitigating model in which you:
1. Describe the company network, interconnection, and communication environment.
2. Assess risk based on the Global Finance, Inc. Network Diagram scenario. Note: Your risk assessment should cover all the necessary details for your client, GFI Inc., to understand the risk factors of the organization and risk posture of the current environment. The company management will decide what to mitigate based on your risk assessment. Your risk assessment must be comprehensive for the organization to make data-driven decisions.
a. Describe and defend your assumptions as there is no further information from this company. The company does not wish to release any security-related information per company policy.
b. Assess security vulnerabilities, including the possibility of faulty network design, and recommend mitigation procedures for each vulnerability.
c. Justify your cryptography recommendations based on data-driven decision making and objective opinions.
3. Examine whether your risk assessment methodology is quantitative, qualitative, hybrid, or a combination of these.
4. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
5. Create the redrawn diagram of a secure and risk-mitigating model using Microsoft Visio or its open source equivalent. Note: The graphically depicted solution is not included in the required page length.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
Include charts or diagrams created in Excel, Visio, MS Project, or one of their equivalents such as Open Project, Dia, and OpenOffice. The completed diagrams/charts must be imported into the Word document before the paper is submitted.
Answered Same DayDec 22, 2021

Answer To: Above is the Global Finance, Inc. (GFI) network diagram. GFI has grown rapidly this past year and...

Robert answered on Dec 22 2021
125 Votes
Risk Assessment Proposal 1
Running head: RISK ASSESSMENT PROPOSAL FOR GLOBAL FINANCE INC.
Risk Assessment proposal for Global Finance Inc.
Name of the Author
Name of the Professor
14-03-2013
Abstract
In this report, the risk assessment proposal is created for Global Finance Inc. The proposal is based on the data given by the organization in the form of the network infrastructure diagram they have provided. As the technology is more advanced than before which is bringing more comforts and ease
for the end users to fulfill their requirements. But this is just the one side. The other side consists of threats and risks which is threatening the security of the organization. The major risks which can affect the organization’s security are determined and presented in this report. An updated network infrastructure diagram will also be shown in the paper which is based on the security measures taken to control the threats and risks.
Risk Assessment proposal for Global Finance Inc.
Case Background
Global Finance Inc. is a growing company. GFI has grown rapidly this past year and acquired many network devices. The company invested in the network and designed it to be fault tolerant and resilient from any network failures. However, although the company’s financial status has matured and its network has expanded at a rapid pace, its network security has not kept up with the company growth.
GFI’s network is fairly stabilized as it has not experienced many outages due to network failures.
The trusted computing base (TCB) internal network in the Global Finance, Inc. Network Diagram hosts the company’s mission critical systems without which the company’s operations and financial situation would suffer. The Oracle database and email systems are among the most intensively used application servers in the company. GFI cannot afford system outages because its cash flow and financial systems heavily depend on the network stability. GFI has experienced DOS network attacks twice this year and its Oracle database and email servers had been down for a week. The recovery process required GFI to use $25,000 to restore its operations back to normal. GFI estimated the loss from these network attacks at more than $100,000 including lost customer confidence.
Analysis
The network of the organization is not secure as the organization has not taken any control measures to provide and improve the security of the organization. The system is vulnerable to many threats and these will be discussed in detail in this research paper. There are many security gaps too which will be presented here in the report. A more robust network infrastructure will be proposed and a figure of the same will be shown in the paper. The current network infrastructure is vulnerable and the attackers can make use of this advantage and either can disrupt the whole system of the organization or they can make the system to malfunction. Below is the analysis report based on the company network, interconnection and communication environment:
Company network, interconnection and communication environment
The main foundation of the network of the company consists of the following servers:
· SUS Server
· Oracle 9i DB Server
· Internal DNS
· Exchange 2000 Email
· File and Print Server
· Intranet Web Server
· Workstations(x7)
The above servers are connected in line with each other. The organization has divided into the various departments and these departments are mentioned below:
· Accounting
· Loan Dept
· Customer Services
· Mgmt
· Credit Dept
· Finance
All these departments have the access to the above listed servers. The departments are accessing the required services using the routers and the switches used in the network configuration. A demilitarized zone which is known as DMZ is created. In the DMZ layer, the virtual private network (VPN) gateway is created. Along with this, the Border (Core) Routers and the Distribution Routers are also configured in this layer. RAS and PBX servers are also configured in the DMZ layer. The system is then linked and connected with Internet and the off-site offices can access the required services using VPN gateway. Remote Dial UP Users can also access the services using PSTN which will hit on the PBX server.
Now if the attackers are able to access, one of the servers listed in Trusted Computing Base Internal Network, then the attacker can access the other servers too as the servers are connected with each other without any authentication mechanisms. As it has been mentioned that the company has been the victim of DOS attacks twice in past some time, this is due to the existence of security gaps in their network architecture.
Assumptions
· As the company has not provided any other information so I am assuming that the given figure and mentioned instruction are the only trusted source.
· There are no authentication mechanisms shown in the network infrastructure figure, so I am assuming that there are no such authentication mechanisms being followed in the organization. If anyone gains...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here