subject

You have been hired as consultants to design and implement a widespread security initiative for a rapidly expanding global eCommerce corporation with two websites and locations in New York, Chicago, San Francisco, London, Paris and Johannesburg. Business is good! In the next three months, the corporation will be acquiring another company in a different line of business with plans to offer products for sale online. Part of your role is to recommend the best way for integrating both environments. However, not much information is available about the IT setup for the company being acquired. The other company might even have a mix of different operating environment – it is unclear since the IT staff in that company is not very communicative. Some critical staff members in the other company are not happy with the upcoming merger and have sworn to be as uncooperative as possible. In particular, the Network Manager for the other company is a difficult personality – plans have been afoot to fire him but unfortunately he is the only one who knows the network architecture completely and he is not willing to share. You must find out everything about the new environment and propose specifics on how to seamlessly integrate both environmentsIn the initial conversation with executives of the global company, you realize that the company does not have a security policy. After much discussion, they have agreed that you should come up with a detailed security policy customized for the company. In a follow-up meeting with the executives and IT staff of the global corporation, you are also assigned the task of identifying two (2) security audit tools (vulnerability/web scanners), two (2) intrusion detection systems and two (2) network firewall products that would be suitable for the global company. You are to test and describe the features of selected security solutions, indicating (a) which you prefer and (b) providing convincing rationale for why you prefer a specific solution in each category. In other words, you are to evaluate two products for each category and recommend one, giving the reasons for your choice. Salient points: The new corporate acquisition will increase the total number of computers under you IT department’s care to about 60,000 computers and network devices. The exact number is not clear: even the management at the other company is not sure of the number of systems in that network because of the difficulty in finding out the specifics about the company being acquired. From the little information that has been gleaned from the other company, it appears to run a mixture of a peer-to-peer network and the domain model. Part of the decision you would have to make would be how the integrated environments would be networked: you have been given the discretion to come up with the design and budget (subject to approval, of course) for the overall security initiative, covering (1) the security policy, (2) network audit to determine what devices and data are being protected, (3) seamless integration between the merging companies, (4) recommendation for IDS system(s), (5) recommendations for security audit tools (web/vulnerability scanners) and (6) recommendation for network firewall device(s). Deliverables:The Security Policy Document (You can adapt an Acceptable Use Policy document from www. sans. org)An eight-page paper in Microsoft Word double-spaced describing how you would go about implementing the overall security initiative for the company, including a budget. Breakdown:1 page summary of your overall strategy1 pages of information security-related recommendations for integrating both corporate environments1 page for the IDS1 page for the web/vulnerability scanners1 page for the network firewall device(s)1 page of your overall conclusions showing demonstrating you grasp of information security best practices and current trends1 page for budget 1 page of references

ansver
Answers: 1

Other questions on the subject: Computers and Technology

image
Computers and Technology, 21.06.2019 19:30, davisparker5269
Write a function processpeople() that takes the name of a file as a parameter. each line of the file corresponds to information about a person. in particular a line contains either a name (in the form lastname, firstname with no spaces in it) or a name (lastname, firstname) and a year. the function will process the file, creating a person object for each line in the file. the function will print information about each line as it processes it, as well as appending the new person object into a list. make sure to use person methods to display information rather than recreating the work you did for the first problem. once the entire file has been processed, the function returns the list of person objects created from the file. if the file is empty, the function should return an empty list. if the input file cannot be opened, the function should print a message to that effect and then return an empty list. the following shows what would be displayed for two example files which have been provided in the link. the file none. txt does not exist. note that your function must work on an arbitrary file that consists of valid lines. you cannot assume anything about the file except that it contains lines that have the format described above.
Answers: 2
image
Computers and Technology, 24.06.2019 00:50, anthonycraig0205
3. what is the output of the following statements? temporary object1; temporary object2("rectangle", 8.5, 5); temporary object3("circle", 6, 0); temporary object4("cylinder", 6, 3.5); cout < < fixed < < showpoint < < setprecision(2); object1.print(); object2.print(); object3.print(); object4.print(); object1.set("sphere", 4.5, 0); object1.print();
Answers: 1
image
Computers and Technology, 24.06.2019 13:00, sparkyjones02
Which best describes the condition under which the unicode output is the same as plain text ?
Answers: 1
image
Computers and Technology, 25.06.2019 01:20, 11232003
Jason typically uses the internet to buy various items. it the total cost of all of the items ordered, at one time, is $250 or more, then the shipping and handling is free, otherwise the shipping and handling is $15 per item. design an algorithm that prompts jason to enter the number of items ordered and the price of each item. (remember cost = number of items order times price) the algorithm then outputs the total billing amount including shipping and handling. your algorithm must use a loop (repetition structure) to get the number and price of each item. write this in algorithm format not program code format.
Answers: 2
You know the right answer?
You have been hired as consultants to design and implement a widespread security initiative for a ra...

Questions in other subjects:

Konu
Social Studies, 03.10.2019 03:00
Konu
Mathematics, 03.10.2019 03:00
Konu
Mathematics, 03.10.2019 03:00