Final Project – 10% of grade In lieu of a final exam this course requires all students to complete a final project. The project is as follows: You are submitting a bid in response to conduct a...

1 answer below »

Final Project – 10% of grade


In lieu of a final exam this course requires all students to complete a final project. The project is as follows: You are submitting a bid in response to conduct a top-to-bottom security audit of a fictional medical equipment manufacturing company. The first step in this process is for you to submit a written proposal. What will you audit? What will you report on? What tools will you use to conduct the audit?


The goal of the final project is for students to clearly demonstrate that they have absorbed the course material from this semester. Papers that demonstrate clear absorbance and reference of the course material will score highest.




Final Project – 10% of grade In lieu of a final exam this course requires all students to complete a final project. The project is as follows: You are submitting a bid in response to conduct a top-to-bottom security audit of a fictional medical equipment manufacturing company. The first step in this process is for you to submit a written proposal. What will you audit? What will you report on? What tools will you use to conduct the audit? The goal of the final project is for students to clearly demonstrate that they have absorbed the course material from this semester. Papers that demonstrate clear absorbance and reference of the course material will score highest.
Answered Same DayNov 05, 2021

Answer To: Final Project – 10% of grade In lieu of a final exam this course requires all students to complete a...

Deepti answered on Nov 10 2021
135 Votes
Proposal for Network Audit Services
For
Medical Equipment Manufacturing Company
Submitted By:
Contents
Background    3
Purpose    3
Scope of Network Audit    3
Network Audit Plan    3
Network Security Audit Checklist    3
Network Audit Phases    3
Phase1: Hardware/ S
oftware audit    3
Phase 2: Network Compliance    4
Phase 3: Network Intrusion Detection    4
Phase 4: Threat Assessment    4
Phase 5: Risk Assessment    4
Network Audit Tools    4
Post- Audit Recommendations    5
Conclusion    5
Background
The target company manufactures medical equipment solutions and is concerned with security of its equipment and company network. It manufactures monitoring equipment and medical delivery systems. Business substantially relies on its network and the hardware and software added to the company network can seriously impact the network security of the company. The company is concerned about determining vulnerabilities of its network devices.
Purpose
Owing to the company’s concern, this report proposes a network audit plan to provide clear understanding of the actual state of the company’s network and its devices in order to assess its performance and identify the network areas where improvement can be recommended. The main purpose of the audit report is to identify any problem detrimental to the company’s business, detect vulnerabilities which may lead to attacks or propose solution to resolve any existing issue in the network. The report shall provide support to the company in understanding which areas require network upgrades. The audit would be further useful in determining the compliance standards required by the company to comply with.
Scope of Network Audit
The audit report shall include hardware, software and network devices of the target manufacturing company. The hardware and network shall include Switches, Routers, Firewalls, Servers, Workstations and peripheral devices, mobile devices and Wireless Access Points. The audit shall determine the location of company’s sensitive information within the network and how it is accessed.
Network Audit Plan
A comprehensive network audit plan shall play a crucial role in identifying the possible vulnerabilities of the network, assessing the threats and thus protecting the network of the target company against data breaches and risks.
Network Security Audit Checklist
A mobile ready checklist shall be created to assess security and integrity of the company networks. The checklist shall be useful to IT managers and network security team in order to uncover threats by checking firewalls, network devices, user accounts, malware,...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here