Authentic Assessment Project (WWTC) See attached documents my part is below: Need 5 pages My part : Security Policies/Network Security Design This section will specify organizational security...

1 answer below »

Authentic Assessment Project (WWTC)


See attached documents my part is below:


Need 5 pages


My part :



Security Policies/Network Security Design

This section will specify organizational security policies, standards, procedures, and guidelines in compliance with the appropriate laws and regulations. This section will lay out network security design implementing organizational security policies in compliance with the appropriate laws and regulations


Deliverable:



  • Determine the most important assets of the company, which must be protected

  • Determine general security architecture for the company

  • Develop a list of 12specific policies that could be applied.

  • Write specific details along with the rationale for each policy

  • Review the written policies and select the 12 most important policies for inclusion in the Security Policy Document

  • Integrate and write up the final version of the Security Policy Document for submittal

  • Develop a High availability secure design for this locations addressing above considerations and mitigating 4 primary networks attacks categories mentioned below.

  • Write up specific role of devices will play in securing

  • Develop high level security diagram.




Document Preview:

Background Information for World-Wide Trading Company World-Wide Trading (WWTC) is a large online broker firm in the Hong Kong. The trading company has a staff of 9,000 who are scattered around the globe. Due to aggressive growth in business, they want to establish a regional office in New York City. They leased the entire floor of a building on Wall Street. You were hired as the director of the IT Department. The President of the company asked you to set up the state of the art network by December 15, 2013. He shared with you the organizational structure and a list of the staff. You hired a consultant to test the network infrastructure and power requirement at WWTC office space. The consultant reported that the network infrastructure is solid and gigabit network can be set up on existing network wiring. Also, the existing power supply will meet their current and future demand. The President has reiterated these business goals. Business and Technical Goals Increase revenue from 10 billion to 40 billion by the year 2015 Reduce the operating cost from 30 to 15 percent by the year 2015 by using an automated system for buying and selling. Provide secure means of customer purchase and payment over Internet. Allow employee to attach their notebook computers to the WWTC network and Internet services. Provide state of the art VoIP and Data Network Provide faster Network services Provide fast and secure wireless services in the lobby and two large conference rooms (100x60) On the basis of these business goals, you prepared a RFP to solicit a proposal for designing and implementing a fast, reliable and secure network. The purpose of this Request for Proposal is to solicit from qualified vendors proposals for a secure and fast network to ensure proper operation of the network. To prepare a design for a state of the art network at the Wall Street location of World-Wide Trading. Propose a Network design that solves the current security audit problems (see security...



Answered Same DayDec 24, 2021

Answer To: Authentic Assessment Project (WWTC) See attached documents my part is below: Need 5 pages My part :...

Robert answered on Dec 24 2021
124 Votes
Running Head: NETWORK SECURITY 1
Network Security: A technology evaluation
(A review of Literature)
Student’s name
Department of Information Technology
University name
Instructor’s name
Date
NETWORK SECURITY: A TECHNOLOGY EVALUATION 2
Table of Contents
Purpose to define
framework for the security policies of IT ..................................................... 3
Purpose of RAP (Remote access policy) ................................................................................... 3
Policy definition for email ......................................................................................................... 3
Annual training for security awareness ...................................................................................... 4
Security of data for coast guard boat ......................................................................................... 4
Governance framework .............................................................................................................. 5
NIST SP 800-53 Revision 4 ....................................................................................................... 6
COBIT framework ..................................................................................................................... 6
References .................................................................................................................................. 7
NETWORK SECURITY: A TECHNOLOGY EVALUATION 3
Network Security: A review of Literature
Purpose to define framework for the security policies of IT
The framework of security policy is defined to construct a structure by the help of
which policy gaps can be identified in an easy manner. A system specific policy would assist
to ensure that all employees and management comply with the policies. This is also used to
maintain the confidentiality for user authentication would assist in the confidentiality aspect
of security, maintain integrity (There are several limiting rules or constraints which are
distinct in the relational data model and whose work is to maintain the data’s accuracy and
maintain its integrity.), availability and authenticity of the system. Access controls are a
collection of mechanisms that work together to create security architecture to protect the
assets of an information system. One of the goals of access control is personal accountability,
which is the mechanism that proves someone performed a computer activity at a specific
point in time. So, the framework acts as the guideline for avoiding vulnerabilities and
associated risks with in the system.
Purpose of RAP (Remote access policy)
The AUP (acceptable Use policy) is a common policy for all the employees with in
the same organization. All the employees come under this policy. It doesn’t have any specific...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here