SlideShare a Scribd company logo
Assignment 4: Designing Compliance within the LAN-to-WAN
Domain
Due Week 8 and worth 130 points
Note:
Review the page requirements and formatting instructions for
this assignment closely. Graphically depicted solutions, as well
as the standardized formatting requirements, do NOT count
toward the overall page length.
Imagine you are an Information Systems Security Officer for a
medium-sized financial services firm that has operations in four
(4) states (Virginia, Florida, Arizona, and California). Due to
the highly sensitive data created, stored, and transported by
your organization, the CIO is concerned with implementing
proper security controls for the LAN-to-WAN domain.
Specifically, the CIO is concerned with the following areas:
Protecting data privacy across the WAN
Filtering undesirable network traffic from the Internet
Filtering the traffic to the Internet that does not adhere to the
organizational acceptable use policy (AUP) for the Web
Having a zone that allows access for anonymous users but
aggressively controls information exchange with internal
resources
Having an area designed to trap attackers in order to monitor
attacker activities
Allowing a means to monitor network traffic in real time as a
means to identify and block unusual activity
Hiding internal IP addresses
Allowing operating system and application patch management
The CIO has tasked you with proposing a series of hardware and
software controls designed to provide security for the LAN-to-
WAN domain. The CIO anticipates receiving both a written
report and diagram(s) to support your recommendations.
Write a three page paper in which you:
Use MS Visio or an open source equivalent to graphically depict
a solution for the provided scenario that will:
filter undesirable network traffic from the Internet
filter Web traffic to the Internet that does not adhere to the
organizational AUP for the Web
allow for a zone for anonymous users but aggressively controls
information exchange with internal resources
allow for an area designed to trap attackers in order to monitor
attacker activities
offer a means to monitor network traffic in real time as a means
to identify and block unusual activity
hide internal IP addresses
Identify the fundamentals of public key infrastructure (PKI).
Describe the manner in which your solution will protect the
privacy of data transmitted across the WAN.
Analyze the requirements necessary to allow for proper
operating system and application patch management and
describe a solution that would be effective.
Use at least three (3) quality resources in this assignment.
Note:
Wikipedia and similar Websites do not qualify as quality
resources.
Note:
The graphically depicted solution is not included in the
required page length.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size
12), with one-inch margins on all sides; citations and references
must follow APA or school-specific format. Check with your
professor for any additional instructions.
Include a cover page containing the title of the assignment, the
student’s name, the professor’s name, the course title, and the
date. The cover page and the reference page are not included in
the required assignment page length.
Include charts or diagrams created in Visio or an equivalent
such as Dia or OpenOffice. The completed diagrams / charts
must be imported into the Word document before the paper is
submitted.
The specific course learning outcomes associated with this
assignment are:
Analyze information security systems compliance requirements
within the Workstation and LAN Domains.
Use technology and information resources to research issues in
security strategy and policy formation.
Write clearly and concisely about topics related to information
technology audit and control using proper writing mechanics
and technical style conventions.

More Related Content

DOCX
Assignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
DOCX
Note Review the page requirements and formatting instructions for.docx
DOCX
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
DOCX
Note Review the page requirements and formatting instructions for.docx
DOCX
Designing Compliance within the LAN-to-WAN DomainNote Rev
DOCX
Note Review the page requirements and formatting  instruction.docx
DOCX
Imagine you are an Information Systems Security Officer for a medium.docx
DOCX
Imagine you are an Information Systems Security Officer for a medium.docx
Assignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
Note Review the page requirements and formatting instructions for.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
Note Review the page requirements and formatting instructions for.docx
Designing Compliance within the LAN-to-WAN DomainNote Rev
Note Review the page requirements and formatting  instruction.docx
Imagine you are an Information Systems Security Officer for a medium.docx
Imagine you are an Information Systems Security Officer for a medium.docx

Similar to Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx (20)

DOCX
Assignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docx
DOC
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
DOC
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
DOCX
Assignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docx
DOCX
Imagine you are an Information Systems Security Officer for a me.docx
DOCX
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
DOCX
GAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
DOCX
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
DOCX
The infrastructure which encompasses the network solution and securi.docx
DOCX
The infrastructure which encompasses the network solution and se.docx
PDF
Imagine you are an Information Systems Security Officer for a medium.pdf
DOCX
Cis 341 Enthusiastic Study - snaptutorial.com
DOCX
CIS 341 Success Begins / snaptutorial.com
DOCX
Cis 341 Technology levels--snaptutorial.com
DOCX
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
DOC
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...
DOCX
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
DOCX
The infrastructure which encompasses the network solution and securi.docx
PPT
Strayer cis-417-week-8-assignment-4-data
DOCX
Assignment InstructionsInstructionsNote A 15 or less origi.docx
Assignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docx
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
Assignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docx
Imagine you are an Information Systems Security Officer for a me.docx
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
GAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
The infrastructure which encompasses the network solution and securi.docx
The infrastructure which encompasses the network solution and se.docx
Imagine you are an Information Systems Security Officer for a medium.pdf
Cis 341 Enthusiastic Study - snaptutorial.com
CIS 341 Success Begins / snaptutorial.com
Cis 341 Technology levels--snaptutorial.com
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
The infrastructure which encompasses the network solution and securi.docx
Strayer cis-417-week-8-assignment-4-data
Assignment InstructionsInstructionsNote A 15 or less origi.docx

More from eleanorabarrington (20)

DOCX
Employment in U.S.To be employed in the U.S., you must complet.docx
DOCX
Employee Training and Career Development PaperWrite a 1,05.docx
DOCX
Employment-At-Will DoctrineImagine you are a recently-hired .docx
DOCX
Employee Selection Please respond to the followingCompare and c.docx
DOCX
Emerging nations are generally defined as those countries working to.docx
DOCX
Emerging Adulthood and CultureDueJul 12, 1000 PM  CST.docx
DOCX
Eli Lily Case Questions(1page total will be fine)case see attach.docx
DOCX
Encryption in Investigations  Please respond to the following.docx
DOCX
Emerging Trends in Logistics and Supply Chain Management10 pag.docx
DOCX
EN102 Sum15Paper Two ImagesPictures of Significance and What We .docx
DOCX
Ellas father, Frederic has Parkinson disease known as Shaky Grandp.docx
DOCX
ELL Placement Assessments Interview the ELL instructor that you ob.docx
DOCX
eliverable Length1,000–1,250 wordsDetailsWeekly tasks or ass.docx
DOCX
Elements of Projects  Please respond to the followingRese.docx
DOCX
Emotional IntelligencePerform an internet search on emotional inte.docx
DOCX
Employee satisfaction is the product of many factors, some directly .docx
DOCX
Emily is an 18-month-old toddler developing typically. She attends.docx
DOCX
Assignment 4 Contemporary Issues in Modern Police Operations and .docx
DOCX
Assignment 4 Communication MethodsChoose five (5) different commu.docx
DOCX
Assignment 4 PresentationChoose any federal statute that is cur.docx
Employment in U.S.To be employed in the U.S., you must complet.docx
Employee Training and Career Development PaperWrite a 1,05.docx
Employment-At-Will DoctrineImagine you are a recently-hired .docx
Employee Selection Please respond to the followingCompare and c.docx
Emerging nations are generally defined as those countries working to.docx
Emerging Adulthood and CultureDueJul 12, 1000 PM  CST.docx
Eli Lily Case Questions(1page total will be fine)case see attach.docx
Encryption in Investigations  Please respond to the following.docx
Emerging Trends in Logistics and Supply Chain Management10 pag.docx
EN102 Sum15Paper Two ImagesPictures of Significance and What We .docx
Ellas father, Frederic has Parkinson disease known as Shaky Grandp.docx
ELL Placement Assessments Interview the ELL instructor that you ob.docx
eliverable Length1,000–1,250 wordsDetailsWeekly tasks or ass.docx
Elements of Projects  Please respond to the followingRese.docx
Emotional IntelligencePerform an internet search on emotional inte.docx
Employee satisfaction is the product of many factors, some directly .docx
Emily is an 18-month-old toddler developing typically. She attends.docx
Assignment 4 Contemporary Issues in Modern Police Operations and .docx
Assignment 4 Communication MethodsChoose five (5) different commu.docx
Assignment 4 PresentationChoose any federal statute that is cur.docx

Recently uploaded (20)

PPTX
Orientation - ARALprogram of Deped to the Parents.pptx
PPTX
Cell Structure & Organelles in detailed.
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PPTX
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
Weekly quiz Compilation Jan -July 25.pdf
PPTX
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PDF
Classroom Observation Tools for Teachers
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Complications of Minimal Access Surgery at WLH
PDF
RMMM.pdf make it easy to upload and study
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
Microbial diseases, their pathogenesis and prophylaxis
Orientation - ARALprogram of Deped to the Parents.pptx
Cell Structure & Organelles in detailed.
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
Module 4: Burden of Disease Tutorial Slides S2 2025
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Weekly quiz Compilation Jan -July 25.pdf
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Paper A Mock Exam 9_ Attempt review.pdf.
Classroom Observation Tools for Teachers
Supply Chain Operations Speaking Notes -ICLT Program
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Complications of Minimal Access Surgery at WLH
RMMM.pdf make it easy to upload and study
Final Presentation General Medicine 03-08-2024.pptx
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Microbial diseases, their pathogenesis and prophylaxis

Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx

  • 1. Assignment 4: Designing Compliance within the LAN-to-WAN Domain Due Week 8 and worth 130 points Note: Review the page requirements and formatting instructions for this assignment closely. Graphically depicted solutions, as well as the standardized formatting requirements, do NOT count toward the overall page length. Imagine you are an Information Systems Security Officer for a medium-sized financial services firm that has operations in four (4) states (Virginia, Florida, Arizona, and California). Due to the highly sensitive data created, stored, and transported by your organization, the CIO is concerned with implementing proper security controls for the LAN-to-WAN domain. Specifically, the CIO is concerned with the following areas: Protecting data privacy across the WAN Filtering undesirable network traffic from the Internet Filtering the traffic to the Internet that does not adhere to the organizational acceptable use policy (AUP) for the Web Having a zone that allows access for anonymous users but aggressively controls information exchange with internal resources Having an area designed to trap attackers in order to monitor attacker activities Allowing a means to monitor network traffic in real time as a means to identify and block unusual activity Hiding internal IP addresses Allowing operating system and application patch management The CIO has tasked you with proposing a series of hardware and software controls designed to provide security for the LAN-to- WAN domain. The CIO anticipates receiving both a written report and diagram(s) to support your recommendations. Write a three page paper in which you: Use MS Visio or an open source equivalent to graphically depict a solution for the provided scenario that will:
  • 2. filter undesirable network traffic from the Internet filter Web traffic to the Internet that does not adhere to the organizational AUP for the Web allow for a zone for anonymous users but aggressively controls information exchange with internal resources allow for an area designed to trap attackers in order to monitor attacker activities offer a means to monitor network traffic in real time as a means to identify and block unusual activity hide internal IP addresses Identify the fundamentals of public key infrastructure (PKI). Describe the manner in which your solution will protect the privacy of data transmitted across the WAN. Analyze the requirements necessary to allow for proper operating system and application patch management and describe a solution that would be effective. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Note: The graphically depicted solution is not included in the required page length. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. Include charts or diagrams created in Visio or an equivalent such as Dia or OpenOffice. The completed diagrams / charts must be imported into the Word document before the paper is submitted.
  • 3. The specific course learning outcomes associated with this assignment are: Analyze information security systems compliance requirements within the Workstation and LAN Domains. Use technology and information resources to research issues in security strategy and policy formation. Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions.