SlideShare a Scribd company logo
Designing Compliance within the LAN-to-WAN Domain
Note:
Review the page requirements and formatting instructions for
this assignment closely. Graphically depicted solutions, as well
as the standardized formatting requirements, do NOT count
toward the overall page length.
Imagine you are an Information Systems Security Officer for a
medium-sized financial services firm that has operations in four
(4) states (Virginia, Florida, Arizona, and California). Due to
the highly sensitive data created, stored, and transported by
your organization, the CIO is concerned with implementing
proper security controls for the LAN-to-WAN domain.
Specifically, the CIO is concerned with the following areas:
Protecting data privacy across the WAN
Filtering undesirable network traffic from the Internet
Filtering the traffic to the Internet that does not adhere to the
organizational acceptable use policy (AUP) for the Web
Having a zone that allows access for anonymous users but
aggressively controls information exchange with internal
resources
Having an area designed to trap attackers in order to monitor
attacker activities
Allowing a means to monitor network traffic in real time as a
means to identify and block unusual activity
Hiding internal IP addresses
Allowing operating system and application patch management
The CIO has tasked you with proposing a series of hardware and
software controls designed to provide security for the LAN-to-
WAN domain. The CIO anticipates receiving both a written
report and diagram(s) to support your recommendations.
Write a three to five page paper in which you:
Use MS Visio or an open source equivalent to graphically depict
a solution for the provided scenario that will:
filter undesirable network traffic from the Internet
filter Web traffic to the Internet that does not adhere to the
organizational AUP for the Web
allow for a zone for anonymous users but aggressively controls
information exchange with internal resources
allow for an area designed to trap attackers in order to monitor
attacker activities
offer a means to monitor network traffic in real time as a means
to identify and block unusual activity
hide internal IP addresses
Identify the fundamentals of public key infrastructure (PKI).
Describe the manner in which your solution will protect the
privacy of data transmitted across the WAN.
Analyze the requirements necessary to allow for proper
operating system and application patch management and
describe a solution that would be effective.
Use at least three quality resources in this assignment.
Note:
Wikipedia and similar Websites do not qualify as quality
resources.
Note:
The graphically depicted solution is not included in the
required page length.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size
12), with one-inch margins on all sides; citations and references
must follow APA or school-specific format. Check with your
professor for any additional instructions.
Include a cover page containing the title of the assignment, the
student's name, the professor's name, the course title, and the
date. The cover page and the reference page are not included in
the required assignment page length.
Include charts or diagrams created in Visio or an equivalent
such as Dia or OpenOffice. The completed diagrams / charts
must be imported into the Word document before the paper is
submitted.
The specific course learning outcomes associated with this
assignment are:
Analyze information security systems compliance requirements
within the Workstation and LAN Domains.
Use technology and information resources to research issues in
security strategy and policy formation.
Write clearly and concisely about topics related to information
technology audit and control using proper writing mechanics
and technical style conventions.

More Related Content

DOCX
Assignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
DOCX
Note Review the page requirements and formatting  instruction.docx
DOCX
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
DOCX
Note Review the page requirements and formatting instructions for.docx
DOCX
Assignment 4 Designing Compliance within the LAN-to-WAN DomainD.docx
DOCX
Note Review the page requirements and formatting instructions for.docx
DOCX
Imagine you are an Information Systems Security Officer for a medium.docx
DOCX
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
Assignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
Note Review the page requirements and formatting  instruction.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
Note Review the page requirements and formatting instructions for.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainD.docx
Note Review the page requirements and formatting instructions for.docx
Imagine you are an Information Systems Security Officer for a medium.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx

Similar to Designing Compliance within the LAN-to-WAN DomainNote Rev (20)

DOCX
Imagine you are an Information Systems Security Officer for a medium.docx
DOCX
Assignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docx
DOC
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
DOC
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
DOCX
Assignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docx
DOCX
Imagine you are an Information Systems Security Officer for a me.docx
DOCX
GAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
PDF
Imagine you are an Information Systems Security Officer for a medium.pdf
DOCX
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
DOCX
Week 7Worksheet 4 LANWAN Compliance and AuditingCourse L.docx
DOCX
Worksheet 4 LANWAN Compliance and Auditinglook on the docume.docx
PPTX
Manage Network Security of HNS level-4 .pptx
DOCX
Assignment 2 Implementing Network and Personnel Security Meas.docx
DOCX
Tonight, March 5th – Class 7 (last class) your test” on ICS.docx
PPT
Strayer cis-534-week-8-assignment-2-mister-network-engineer-new
DOCX
XYZ CorporationXYZ Corporation is a small organization of ro.docx
DOCX
The infrastructure which encompasses the network solution and securi.docx
DOCX
The infrastructure which encompasses the network solution and se.docx
PDF
Cyb 610 Believe Possibilities / snaptutorial.com
DOCX
Option #1 XYZ CorporationXYZ Corporation is a small organiz.docx
Imagine you are an Information Systems Security Officer for a medium.docx
Assignment 4 Designing Compliance Within the LAN-to-WAN DomainD.docx
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
Uop cis 349 week 8 assignment 4 designing compliance within the lan towan domain
Assignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docx
Imagine you are an Information Systems Security Officer for a me.docx
GAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
Imagine you are an Information Systems Security Officer for a medium.pdf
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
Week 7Worksheet 4 LANWAN Compliance and AuditingCourse L.docx
Worksheet 4 LANWAN Compliance and Auditinglook on the docume.docx
Manage Network Security of HNS level-4 .pptx
Assignment 2 Implementing Network and Personnel Security Meas.docx
Tonight, March 5th – Class 7 (last class) your test” on ICS.docx
Strayer cis-534-week-8-assignment-2-mister-network-engineer-new
XYZ CorporationXYZ Corporation is a small organization of ro.docx
The infrastructure which encompasses the network solution and securi.docx
The infrastructure which encompasses the network solution and se.docx
Cyb 610 Believe Possibilities / snaptutorial.com
Option #1 XYZ CorporationXYZ Corporation is a small organiz.docx

More from emersonpearline (20)

DOCX
DUE DATE - 11616 @ 12 NOONSuccessful entrepreneurs follow a mu.docx
DOCX
Due by 630 pm 12142015Response must be in own words cites fro.docx
DOCX
due by Monday 300pm Las Vegas time. The project includes Part A.docx
DOCX
Due by 08062015 830 pm EST.  References cited.  Each post must be.docx
DOCX
Due by 01212016 830 pm EST.  Each post must be 250 words with ref.docx
DOCX
Due 9am California (+8)Make a ppt (15Mins long, around 15pages).docx
DOCX
DUE ASAP 5 HOURS MAX1-2 pages NO SOURCES what so ever please .docx
DOCX
DUE ASAP THANKS(NO special format or pages jsut replis or feedbacks .docx
DOCX
Due as as possible but no later than tomorrow Monday 121415  by 17.docx
DOCX
due after 4 hours1. Write about 500 words about the the souther.docx
DOCX
DUE 1262015 @ 11am est. for $10……please charge the entire $10 …TH.docx
DOCX
Due 72015 9pm estResourcesThe Color of Justice Race, Ethnici.docx
DOCX
Due 72915 at 1040.  Must be orginial no plagiarism allowed.   Cr.docx
DOCX
due 7 20 15 9 am estCompare the style and content of these two poe.docx
DOCX
Due 2416Project part 1 IntroductionThe introduction should.docx
DOCX
Due 12142015 830am Response must be in own words cites from r.docx
DOCX
Due 10pm tonight 22816Assignment 2 Project Paper – Comp.docx
DOCX
Due 1130 pm tonight 22816Assignment 2 Project Paper – Co.docx
DOCX
Due 072015 12 noon cst Attached is a copy of the Smart Fo.docx
DOCX
DUE 02072016 by 12 NOONMost entrepreneurial ventures must find.docx
DUE DATE - 11616 @ 12 NOONSuccessful entrepreneurs follow a mu.docx
Due by 630 pm 12142015Response must be in own words cites fro.docx
due by Monday 300pm Las Vegas time. The project includes Part A.docx
Due by 08062015 830 pm EST.  References cited.  Each post must be.docx
Due by 01212016 830 pm EST.  Each post must be 250 words with ref.docx
Due 9am California (+8)Make a ppt (15Mins long, around 15pages).docx
DUE ASAP 5 HOURS MAX1-2 pages NO SOURCES what so ever please .docx
DUE ASAP THANKS(NO special format or pages jsut replis or feedbacks .docx
Due as as possible but no later than tomorrow Monday 121415  by 17.docx
due after 4 hours1. Write about 500 words about the the souther.docx
DUE 1262015 @ 11am est. for $10……please charge the entire $10 …TH.docx
Due 72015 9pm estResourcesThe Color of Justice Race, Ethnici.docx
Due 72915 at 1040.  Must be orginial no plagiarism allowed.   Cr.docx
due 7 20 15 9 am estCompare the style and content of these two poe.docx
Due 2416Project part 1 IntroductionThe introduction should.docx
Due 12142015 830am Response must be in own words cites from r.docx
Due 10pm tonight 22816Assignment 2 Project Paper – Comp.docx
Due 1130 pm tonight 22816Assignment 2 Project Paper – Co.docx
Due 072015 12 noon cst Attached is a copy of the Smart Fo.docx
DUE 02072016 by 12 NOONMost entrepreneurial ventures must find.docx

Recently uploaded (20)

PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
Lesson notes of climatology university.
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
A systematic review of self-coping strategies used by university students to ...
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
GDM (1) (1).pptx small presentation for students
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
Orientation - ARALprogram of Deped to the Parents.pptx
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Cell Structure & Organelles in detailed.
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Complications of Minimal Access Surgery at WLH
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
Anesthesia in Laparoscopic Surgery in India
Lesson notes of climatology university.
VCE English Exam - Section C Student Revision Booklet
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Final Presentation General Medicine 03-08-2024.pptx
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
2.FourierTransform-ShortQuestionswithAnswers.pdf
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
A systematic review of self-coping strategies used by university students to ...
Abdominal Access Techniques with Prof. Dr. R K Mishra
GDM (1) (1).pptx small presentation for students
Supply Chain Operations Speaking Notes -ICLT Program
Orientation - ARALprogram of Deped to the Parents.pptx
Final Presentation General Medicine 03-08-2024.pptx
Cell Structure & Organelles in detailed.
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
human mycosis Human fungal infections are called human mycosis..pptx
Complications of Minimal Access Surgery at WLH
Chinmaya Tiranga quiz Grand Finale.pdf

Designing Compliance within the LAN-to-WAN DomainNote Rev

  • 1. Designing Compliance within the LAN-to-WAN Domain Note: Review the page requirements and formatting instructions for this assignment closely. Graphically depicted solutions, as well as the standardized formatting requirements, do NOT count toward the overall page length. Imagine you are an Information Systems Security Officer for a medium-sized financial services firm that has operations in four (4) states (Virginia, Florida, Arizona, and California). Due to the highly sensitive data created, stored, and transported by your organization, the CIO is concerned with implementing proper security controls for the LAN-to-WAN domain. Specifically, the CIO is concerned with the following areas: Protecting data privacy across the WAN Filtering undesirable network traffic from the Internet Filtering the traffic to the Internet that does not adhere to the organizational acceptable use policy (AUP) for the Web Having a zone that allows access for anonymous users but aggressively controls information exchange with internal resources Having an area designed to trap attackers in order to monitor attacker activities Allowing a means to monitor network traffic in real time as a means to identify and block unusual activity
  • 2. Hiding internal IP addresses Allowing operating system and application patch management The CIO has tasked you with proposing a series of hardware and software controls designed to provide security for the LAN-to- WAN domain. The CIO anticipates receiving both a written report and diagram(s) to support your recommendations. Write a three to five page paper in which you: Use MS Visio or an open source equivalent to graphically depict a solution for the provided scenario that will: filter undesirable network traffic from the Internet filter Web traffic to the Internet that does not adhere to the organizational AUP for the Web allow for a zone for anonymous users but aggressively controls information exchange with internal resources allow for an area designed to trap attackers in order to monitor attacker activities offer a means to monitor network traffic in real time as a means to identify and block unusual activity hide internal IP addresses
  • 3. Identify the fundamentals of public key infrastructure (PKI). Describe the manner in which your solution will protect the privacy of data transmitted across the WAN. Analyze the requirements necessary to allow for proper operating system and application patch management and describe a solution that would be effective. Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Note: The graphically depicted solution is not included in the required page length. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. Include charts or diagrams created in Visio or an equivalent such as Dia or OpenOffice. The completed diagrams / charts must be imported into the Word document before the paper is submitted.
  • 4. The specific course learning outcomes associated with this assignment are: Analyze information security systems compliance requirements within the Workstation and LAN Domains. Use technology and information resources to research issues in security strategy and policy formation. Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions.