Description
Second | ||
Fourth | ||
Sixth | ||
Eighth |
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Sixth
...................................
Completion Status:
100%
Review
Review
Anonymous
Just what I needed…Fantastic!
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
ITS 481 Colorado State University Capstone Portfolio Project
Option #1: Capstone EssayThis week for your capstone portfolio project, you will develop a two page summary discussing the ...
ITS 481 Colorado State University Capstone Portfolio Project
Option #1: Capstone EssayThis week for your capstone portfolio project, you will develop a two page summary discussing the development processes in your project. Whether this be the utilization of customer off-the-shelf software in conjunction with a few script modules or a full-blown development project, it is necessary for you to discuss what would be needed to secure the application in conjunction with your systems, infrastructure, and processes. Ensure you include a summary of what you would do and how you would do it based upon what you've learned this week.Your paper should be 2 pages in length and must be well-written according to the CSU Global Writing Center (Links to an external site.). Include at least two scholarly references in addition to the course textbook. The CSU Global Library (Links to an external site.) is a good place to find these=======================================================Choose one of the following two assignments to complete this week. Do not do both assignments. Identify your assignment choice in the title of your submission. To learn more about the Capstone Project please visit Module 8.Option #1: Capstone EssayThis week, in order to further enhance your capstone project, you will be planning out the assessment of how your system processes and transitions messages. Whether this be through SMTP and email or SMS, it will be necessary for your system to create some sort of process that can alert individuals for problems and basic info.Write a one-page paper that describes what sort of alerts and general texts would be created and how they would be sent through the network.Your paper should be 1 page in length and must be well-written according to the CSU Global Writing Center (Links to an external site.). Include at least two scholarly references in addition to the course textbook. The CSU Global Library (Links to an external site.) is a good place to find these references.============================================Option #1: Capstone EssayThis week for your capstone portfolio project, now that you have discussed hardware, software, scope, and other processes, it is important to begin a discussion on access to the system and authentication. How will you ensure that individuals have access to only what they need?Using what you learned about authentication and session, write a 2 page paper describing what you would utilize to keep individuals in their appropriate role-based access as well as protecting the confidentiality and integrity and authorization methods inside your project.Be sure to use what you learned this week in conjunction with your previous weeks materials to complete this milestone paper.Your paper should be 2-3 pages in length and must be well-written according to the CSU Global Writing Center. (Links to an external site.) Include at least two scholarly references in addition to the course textbook. The CSU Global Library (Links to an external site.) is a good place to find these
Need help with computer science: Submit a business case proposal, which is a summary of your selected business case for the course project.
Submit a business case proposal, which is a summary of your selected business case for the course project. The business ca ...
Need help with computer science: Submit a business case proposal, which is a summary of your selected business case for the course project.
Submit a business case proposal, which is a summary of your selected business case for the course project. The business case proposal will be submitted as a Word document and in paragraph form. This business case proposal provides your instructor insight into the project you are selecting and allows for instructor feedback and guidance in terms of the scope of the business case for the purpose of this course. The first milestone of the course project is an introduction. The sections to include as part of the introduction are:Background – This section provides information about the system, processes, and other aspects of the system such that the reader can understand the business problem in the context of the system.Problem Statement – This section should clearly state the problem to be solved, why it is a problem, and how it impacts the system.Audience – This section should discuss your communication plan, identify the different audience types in the project, and what type of information is communicated to each audience type.Note that the course project intent is to introduce students to an entire systems analyst process. Each milestone is fairly significant in size if performing an actual project. For the intended learning and exposure to the course project topics, please know that assumptions will have to be made and that any such assumptions should be documented. For additional details, please refer to the Final Project Document and the Milestone One Guidelines and Rubric document in the Assignment Guidelines and Rubrics section of the course.DON'T COPY AND PASTE , any new concept is also welcome.
Harrisburg Area Community College Human Relations Virtual Teams Essay
**Research Paper :Pick an industry/company to focus on for this assignment. Based upon the given information you can find ...
Harrisburg Area Community College Human Relations Virtual Teams Essay
**Research Paper :Pick an industry/company to focus on for this assignment. Based upon the given information you can find on the company and any past issues/breaches the company has gone through, create Crisis Management PlanIntroduction – brief background of company and any issues the company has had in the past such as data breachesStrategies and Management – business activities, risk factor activities, reactive risk mitigation strategy, risk management, financial performance (more or less depending upon company)Risk Analysis – political analysis, environmental analysis (more or less depending upon company)Crisis Management Plan:PurposeCommittee for crisis management planningCrisis typesStructure of the Crisis Management TeamResponsibility and controlImplementation PlanCrisis Management ProtocolsCrisis Management Plan PrioritiesConclusionDivide the work on the plan amongst your group members.References – APA formatPage Count Range should be 20 pages not including:Title page, Table of Contents and References pageAll References are to be in APA format.Reference: You can even look for scholarly articles etcWallace, M., & Webber, L. (2018). The Disaster Recovery Handbook: A Step-by-Step Plan to Ensure Business Continuity and Protect Vital Operations, Facilities, and Assets. New York, NY: AMACOM. ISBN-13: 978-0184438763
Part 2 of final
The final project for this course is the creation of a vulnerability report. This is an important type of report in the in ...
Part 2 of final
The final project for this course is the creation of a vulnerability report. This is an important type of report in the information security industry, and will be the
culmination of your work in IT 320. This is your opportunity to bring all that you have learned together to analyze a network, evaluate vulnerabilities and risks,
and recommend mitigation strategies.
A vulnerability report typically includes the following:
A security assessment of a computer network
Identification of vulnerabilities, supported with evidence
An interpretive analysis of risks, including benchmarking or ranking risk using levels or similar metrics
Recommended mitigation steps or solutions
Vulnerability reports are written for a diverse audience within an organization. Therefore, they include an executive summary for managers and decision-makers
as well as technical data for analysis by other IT professionals. Organizations may require vulnerability reports to meet compliance requirements or may have
internal policies that call for a vulnerability assessment and completion of a report on a fixed schedule.
Vulnerability reports are often researched and produced by information security experts from outside the organization. As you will see in the assignment prompt
below, you will play the role of an information security consultant as you complete this final project.
Your work on this project is supported by two milestones, in Modules Three and Five, that are designed to support you as you go through the final project lab
and gather the information you need to create your vulnerability report draft. These milestones are important practice opportunities from which you will gain
critical feedback that will inform your final draft of this project that you will submit in Module Seven.
Your practice work and your instructor feedback will be especially important as you craft your executive summary for this project. This executive summary
section is not contained within the milestone activities. It would not make sense to create that final summary piece until you have completed your drafts,
received your instructor feedback, and are ready to finalize your final project draft in Module Seven.
In this assignment, you will demonstrate your mastery of the following course outcomes:
IT-320-01: Assess in-house, distributed, or cloud-based networks for their current security posture
IT-320-02: Recommend mitigation strategies for hardening network operating systems, applications, and network devices based on National Institute of
Standards and Technology (NIST) standards
IT-320-03: Implement network hardening solutions for addressing vulnerable network security postures
2
IT-320-04: Interpret data from networking and system logs for building security assurance
Prompt
ABC Manufacturing has hired you as a security consultant to identify security vulnerabilities, provide recommendations, and implement approved changes.
Management at ABC has provided you with access to their server networking environment. When the network was set up, the network technician was
unfamiliar with the firewall appliance and may have opened up more ports than necessary. Only web services (HTTP and HTTPs) and map service (SMTP) should
be allowed from outside of the network.
Specifically, you must address the critical elements listed below. Most of the critical elements align with a particular course outcome (shown in brackets).
I. Executive Summary: Provide background information and the high-level findings of your report to establish a detailed context based on your
assessment of the network, the evidence you collected (your Milestone One work), and the mitigation strategy, recommendations, and solutions
(your Milestone Two work) you addressed.
a) What is the purpose of the vulnerability report? How should it be used and interpreted by the enterprise? [IT-320-02]
b) What was your methodology for identifying security vulnerabilities? This is where you should briefly describe the tools and techniques
that you used to find the vulnerabilities. [IT-320-01]
c) Overall, what was your determination about the enterprise’s current security posture. [IT-320-01]
II. Network Assessment – Gathering Evidence of the Vulnerabilities:
In this part of your project, you will assess the security posture of this network to find what security vulnerabilities currently exist using the appropriate
scanning tools and techniques looking at both the pfSense firewall and the Windows Server firewall for the Windows Server host (192.168.1.10). Please
see the Final Project navigation pane in the InfoSec environment for a diagram of the systems, users IDs, and passwords you will need to use in that
environment. Be sure your responses and supporting evidence address the following questions:
a) Firewall: Determine threats to the firewall. For example, are there any ports that are open unnecessarily or unused? Support your response with
evidence. [IT-320-01]
b) Virtual Machine (host): Determine threats to the virtual machine (host). For example, are there any ports that are open unnecessarily or
unused? Support your response with evidence. [IT-320-01]
c) Determine if there is malicious software protection in place using the tools provided to you. Support your response with evidence. [IT-320-01]:
i. What kinds of antivirus software, malware protection, or other security software is in place?
ii. What are the risks associated with the gaps in malicious software prevention?
iii. What are the risks associated with leaving the malicious software prevention strategies as they are now?
d) Intrusion Detection: What security threats are you finding in the output as you analyze the network traffic? Support your response with
evidence from your Wireshark and NetworkMiner tools. [IT-320-01]
3
III. Vulnerability Assessment – Interpreting Evidence of Vulnerabilities:
In this part of your project, you will interpret evidence gathered from the network assessment you conducted in Section I to discuss what security
vulnerabilities currently exist. In particular, look closely at the scan you performed on the firewall and your Nmap and Zenmap results. Interpret the
output from these tools. Be sure your responses and supporting evidence address the following questions:
a) What are the vulnerabilities specific to the network traffic? Explain what kind of security threats the vulnerabilities pose. [IT-320-04]
b) What are the vulnerabilities specific to the anti-malware systems (especially centrally managed solutions with aggregated reporting)? Explain
what kind of security threats the vulnerabilities pose. For example, what do the Windows security settings tell you? [IT-320-04]
c) What are the vulnerabilities specific to the operating systems and workstations? Explain what kind of security threats the vulnerabilities pose.
For example, what did you find when you used the OpenVAS tool? [IT-320-04]
d) What are the vulnerabilities specific to the network hardware (firewall)? Explain what kind of security threats the vulnerabilities pose. [IT-320-04]
IV. Network Security Posture Recommendations:
In this area, you will identify what aspects of the network should be examined to address the network security posture. Use your knowledge from
research, readings, and activities in the course to help you. For Parts e and f, it may be helpful to organize your information in a table format for
organizational purposes. A sample is provided for you in the Supporting Information section.
a) Identify key aspects of the network that should be examined to address the network security posture ensuring the following key criteria have
been included: [IT-320-03]
i. At least one issue associated with the firewall
ii. At last one issue associated with one or more client machines
iii. At least one issue associated with one or more server machines
iv. At least one issue associated with a Windows host
b) Indicate the impact of the vulnerability. [IT-320-03]
c) Indicate the likelihood of the vulnerability. [IT-320-03]
d) What mitigation strategies do you recommend be implemented for addressing all of the issues uncovered in your network assessment
above? Support your response with evidence from your lab work and coursework. [IT-320-02]
e) Prioritize the recommended strategies for the company. Use the matrix in the Supporting Information section to assess the priority. [IT-
320-02]
f) Explain the rationale of the prioritization you have chosen for each solution. [IT-320-02]
V. Implementation Solutions:
In this area, you will add a brief written summary following your charts that demonstrates you actually implemented the solutions you
recommended in your lab environment. Your written responses should include evidence in the form of a screenshot or screen capture that
demonstrates you have executed your proposed recommendations.
a) Execute your proposed strategy specific to at least one of the issues you have uncovered with firewalls and support your response with
evidence. [IT-320-03]
b) Harden the server(s) using at least one method and support your response with evidence. [IT-320-03]
3D printing
3D Printing Stage 3 Assignment Before you begin this assignment, be sure you: Have completed all previously assigned rea ...
3D printing
3D Printing Stage 3 Assignment Before you begin this assignment, be sure you: Have completed all previously assigned readings.Read the “3D Printing Case Study." Reviewed the feedback on your 3D Printing Stage 1 and Stage 2 Assignments. It is several months later and Mark has implemented your recommendations for his IT infrastructure.Business is booming!Mark's father has seen what a great success Mark's 3D printing business is, and he wants to provide the capital to open two more facilities near Veterans Administration Hospitals in Memphis, Tennessee and Phoenix, Arizona.Mark is very excited about expanding his business and being located near service men and women who will benefit from his 3D printed accessibility and assistive devices.Since he has already purchased several server and storage devices to hold his designs and business information, he would like to retain that investment.One thing he has learned is that, with very high speed internet connections, the 3D design files can be downloaded in just a few seconds, so they would not have to be stored at each of his new locations.Mark's plan is to create two new facilities, each with the same number of 3D printers and staff as he has at his current location.The employees at the new locations will also need access to the ERP system to report their time and order supplies, etc. Mark has asked you to explain how his IT infrastructure should be changed to accommodate these two new facilities and allow him to manage the overall enterprise as one business.Use the following outline for your paper: List the components.In part 1 of your Stage 2 assignment, you listed the computer system, information system, and network components needed at Mark's facility.Here you will list which of those components (hardware, software, security devices, communication network and its devices, wired/wireless devices, internet, and data and information, as appropriate) will be located at each of the two new (remote) locations. (Create one list; it will be the same for both.)Some components may not be needed at the new locations; you should not list those.The new locations may require some components not in use at the original site; these should be included in the list. Explain the changes that will be needed in Mark's current (existing) IT infrastructure to incorporate the two new locations, and handle the increase in the number of designs and orders and the additional employees.Explain what is different in the IT infrastructure at the two new locations versus the IT infrastructure now in place at Mark's current facility, and explain why the differences exist.Create an original graphical representation of the three facilities and show the devices that would be located at each location.Show how the locations would be connected and the devices required. Formatting: Parts 1, 2, and 3 should be about 2 single spaced pages in length, and be in Microsoft Word format, or a format that can be read in Word. Part 4 is an original graphic diagram(s) that should be included in the same document.If you have too much difficulty inserting the diagram, you may provide it as a separate file that can be read by Word, Excel or PowerPoint.Compare your work to the Grading Rubric below to be sure you have met content and quality criteria.Your submission should include your last name firstin the filename: Lastname_firstname_Stage_3
CMIT 495 UMUC Current Trends and Projects in Computer Networks and Security Ques
For this assignment, the Caduceus CTO, Eliza, has asked you to create a working proof of concept.Step 1: Create an AWSeduc ...
CMIT 495 UMUC Current Trends and Projects in Computer Networks and Security Ques
For this assignment, the Caduceus CTO, Eliza, has asked you to create a working proof of concept.Step 1: Create an AWSeducate AccountCMIT 495 requires you to complete hands-on assignments in a virtual environment. We will be using Amazon Web Services (AWS) as our virtual environment. Amazon offers a free account for those that register. The AWSeducate Video below provides step-by-step instructions with visuals on how to register for a free AWSeducate account:Step 2: Download the Week 1 Project TemplateWatch the video and download the template from the Virtualization Assignment Resources page.Step 3: Install and Configure an AWS EC2 Instance (Virtual Machine)Using the newly created AWS free account, install and configure an Ubuntu Server virtual machine (VM) using the most recent version of the 64-bit operating system.You will need to provide a detailed overview of the steps required to install the Ubuntu server operating system on the virtual machine, including screenshots of each step in the process in the Week 1 Assignment Template.For information on installing and configuring a virtual machine:Search for and use AWS documentation and tutorials for instructions and guidance to complete the assignments.Consult the AWS Connection Documentation in order to connect to the Ubuntu server.Step 4: Complete the Week 1 Project and Upload to the Assignment FolderAnswer the questions and embed the appropriate screenshots of your Ubuntu server installation. When providing a detailed overview of the steps required to install the Ubuntu server operating system on the virtual machine, make sure to include screenshots of each step in the process. Further details and instructions are included within the Week 1 Assignment Template.How Will My Work Be Evaluated?The following evaluation criteria aligned to the competencies will be used to grade your assignment:1.1.3: Present ideas in a clear, logical order appropriate to the task.1.4.1: Produce grammatically correct material in standard academic English that supports communication.2.3.1: State conclusions or solutions clearly and precisely.11.1.3: Install the software.11.2.1: Configure technology according to stakeholder specifications and requirements.11.3.1: Add and update systems as required.13.2.1: Evaluate vendor recommendations in the context of organization requirements.When complete, export your file as a PDF and upload it to the LEO Assignments folder (e.g., Project 1 - Virtualization Assignment).Step 5: Stop and Terminate Your Amazon InstanceAfter you complete the Week 1 Assignment, stop and terminate your Amazon deployment/instance so that you are not charged
Similar Content
Data base triggers
Attached is the tasks, I have a Database (bankdb) that I will be attaching too for testing, I need u to write python code ...
Taylor University Traditional File Processing Essay
Give examples of systems in which it may make sense to use traditional file processing instead of a database approach. (2 ...
Harrisburg University of Science & Technology Installing Docker Tutorial Video
Implement one of the tutorial projects from "The Docker Book: Containerization is the New Virtualization" or a similar doc...
United Methodist University Scholarly Activity Paper
Instructions
Your assignment for this unit is to complete the following five activities. Your completed scholarly activity...
Work Breakdown Structure & Key Deliverables Discussion Paper
Provide a status report to your classmates and instructor. Discuss any major modifications you have made to your plan, sys...
Security Plan and Recommendations, computer science assignment help
Case Study is attached. Please pick any 3 technologies (confirm with me if you're unsure)Project
#4 Security Plan and...
Enterprise System
Q1: Discuss the four sub processes of the Deming Cycle Change Management Model? Edwards Deming created the Deming cycle fo...
Question 2
1) Recognize major architectural styles in existing software systems. (PLO-3) * Before any major software of a large ente...
Security And Privacy Of Health Information
The new millennium has brought about the introduction of new technologies that creates an enabling environment on financia...
Related Tags
Book Guides
Gone with the Wind
by Margaret Mitchell
Dune
by Frank Herbert
The Picture of Dorian Gray
by Oscar Wilde
The Catcher in the Rye
by J. D. Salinger
The Chosen
by Chaim Potok
Dandelion Wine
by Ray Bradbury
The Elegant Universe
by Brian Greene
Things That Matter
by Charles Krauthammer
To the Lighthouse
by Virginia Woolf
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
ITS 481 Colorado State University Capstone Portfolio Project
Option #1: Capstone EssayThis week for your capstone portfolio project, you will develop a two page summary discussing the ...
ITS 481 Colorado State University Capstone Portfolio Project
Option #1: Capstone EssayThis week for your capstone portfolio project, you will develop a two page summary discussing the development processes in your project. Whether this be the utilization of customer off-the-shelf software in conjunction with a few script modules or a full-blown development project, it is necessary for you to discuss what would be needed to secure the application in conjunction with your systems, infrastructure, and processes. Ensure you include a summary of what you would do and how you would do it based upon what you've learned this week.Your paper should be 2 pages in length and must be well-written according to the CSU Global Writing Center (Links to an external site.). Include at least two scholarly references in addition to the course textbook. The CSU Global Library (Links to an external site.) is a good place to find these=======================================================Choose one of the following two assignments to complete this week. Do not do both assignments. Identify your assignment choice in the title of your submission. To learn more about the Capstone Project please visit Module 8.Option #1: Capstone EssayThis week, in order to further enhance your capstone project, you will be planning out the assessment of how your system processes and transitions messages. Whether this be through SMTP and email or SMS, it will be necessary for your system to create some sort of process that can alert individuals for problems and basic info.Write a one-page paper that describes what sort of alerts and general texts would be created and how they would be sent through the network.Your paper should be 1 page in length and must be well-written according to the CSU Global Writing Center (Links to an external site.). Include at least two scholarly references in addition to the course textbook. The CSU Global Library (Links to an external site.) is a good place to find these references.============================================Option #1: Capstone EssayThis week for your capstone portfolio project, now that you have discussed hardware, software, scope, and other processes, it is important to begin a discussion on access to the system and authentication. How will you ensure that individuals have access to only what they need?Using what you learned about authentication and session, write a 2 page paper describing what you would utilize to keep individuals in their appropriate role-based access as well as protecting the confidentiality and integrity and authorization methods inside your project.Be sure to use what you learned this week in conjunction with your previous weeks materials to complete this milestone paper.Your paper should be 2-3 pages in length and must be well-written according to the CSU Global Writing Center. (Links to an external site.) Include at least two scholarly references in addition to the course textbook. The CSU Global Library (Links to an external site.) is a good place to find these
Need help with computer science: Submit a business case proposal, which is a summary of your selected business case for the course project.
Submit a business case proposal, which is a summary of your selected business case for the course project. The business ca ...
Need help with computer science: Submit a business case proposal, which is a summary of your selected business case for the course project.
Submit a business case proposal, which is a summary of your selected business case for the course project. The business case proposal will be submitted as a Word document and in paragraph form. This business case proposal provides your instructor insight into the project you are selecting and allows for instructor feedback and guidance in terms of the scope of the business case for the purpose of this course. The first milestone of the course project is an introduction. The sections to include as part of the introduction are:Background – This section provides information about the system, processes, and other aspects of the system such that the reader can understand the business problem in the context of the system.Problem Statement – This section should clearly state the problem to be solved, why it is a problem, and how it impacts the system.Audience – This section should discuss your communication plan, identify the different audience types in the project, and what type of information is communicated to each audience type.Note that the course project intent is to introduce students to an entire systems analyst process. Each milestone is fairly significant in size if performing an actual project. For the intended learning and exposure to the course project topics, please know that assumptions will have to be made and that any such assumptions should be documented. For additional details, please refer to the Final Project Document and the Milestone One Guidelines and Rubric document in the Assignment Guidelines and Rubrics section of the course.DON'T COPY AND PASTE , any new concept is also welcome.
Harrisburg Area Community College Human Relations Virtual Teams Essay
**Research Paper :Pick an industry/company to focus on for this assignment. Based upon the given information you can find ...
Harrisburg Area Community College Human Relations Virtual Teams Essay
**Research Paper :Pick an industry/company to focus on for this assignment. Based upon the given information you can find on the company and any past issues/breaches the company has gone through, create Crisis Management PlanIntroduction – brief background of company and any issues the company has had in the past such as data breachesStrategies and Management – business activities, risk factor activities, reactive risk mitigation strategy, risk management, financial performance (more or less depending upon company)Risk Analysis – political analysis, environmental analysis (more or less depending upon company)Crisis Management Plan:PurposeCommittee for crisis management planningCrisis typesStructure of the Crisis Management TeamResponsibility and controlImplementation PlanCrisis Management ProtocolsCrisis Management Plan PrioritiesConclusionDivide the work on the plan amongst your group members.References – APA formatPage Count Range should be 20 pages not including:Title page, Table of Contents and References pageAll References are to be in APA format.Reference: You can even look for scholarly articles etcWallace, M., & Webber, L. (2018). The Disaster Recovery Handbook: A Step-by-Step Plan to Ensure Business Continuity and Protect Vital Operations, Facilities, and Assets. New York, NY: AMACOM. ISBN-13: 978-0184438763
Part 2 of final
The final project for this course is the creation of a vulnerability report. This is an important type of report in the in ...
Part 2 of final
The final project for this course is the creation of a vulnerability report. This is an important type of report in the information security industry, and will be the
culmination of your work in IT 320. This is your opportunity to bring all that you have learned together to analyze a network, evaluate vulnerabilities and risks,
and recommend mitigation strategies.
A vulnerability report typically includes the following:
A security assessment of a computer network
Identification of vulnerabilities, supported with evidence
An interpretive analysis of risks, including benchmarking or ranking risk using levels or similar metrics
Recommended mitigation steps or solutions
Vulnerability reports are written for a diverse audience within an organization. Therefore, they include an executive summary for managers and decision-makers
as well as technical data for analysis by other IT professionals. Organizations may require vulnerability reports to meet compliance requirements or may have
internal policies that call for a vulnerability assessment and completion of a report on a fixed schedule.
Vulnerability reports are often researched and produced by information security experts from outside the organization. As you will see in the assignment prompt
below, you will play the role of an information security consultant as you complete this final project.
Your work on this project is supported by two milestones, in Modules Three and Five, that are designed to support you as you go through the final project lab
and gather the information you need to create your vulnerability report draft. These milestones are important practice opportunities from which you will gain
critical feedback that will inform your final draft of this project that you will submit in Module Seven.
Your practice work and your instructor feedback will be especially important as you craft your executive summary for this project. This executive summary
section is not contained within the milestone activities. It would not make sense to create that final summary piece until you have completed your drafts,
received your instructor feedback, and are ready to finalize your final project draft in Module Seven.
In this assignment, you will demonstrate your mastery of the following course outcomes:
IT-320-01: Assess in-house, distributed, or cloud-based networks for their current security posture
IT-320-02: Recommend mitigation strategies for hardening network operating systems, applications, and network devices based on National Institute of
Standards and Technology (NIST) standards
IT-320-03: Implement network hardening solutions for addressing vulnerable network security postures
2
IT-320-04: Interpret data from networking and system logs for building security assurance
Prompt
ABC Manufacturing has hired you as a security consultant to identify security vulnerabilities, provide recommendations, and implement approved changes.
Management at ABC has provided you with access to their server networking environment. When the network was set up, the network technician was
unfamiliar with the firewall appliance and may have opened up more ports than necessary. Only web services (HTTP and HTTPs) and map service (SMTP) should
be allowed from outside of the network.
Specifically, you must address the critical elements listed below. Most of the critical elements align with a particular course outcome (shown in brackets).
I. Executive Summary: Provide background information and the high-level findings of your report to establish a detailed context based on your
assessment of the network, the evidence you collected (your Milestone One work), and the mitigation strategy, recommendations, and solutions
(your Milestone Two work) you addressed.
a) What is the purpose of the vulnerability report? How should it be used and interpreted by the enterprise? [IT-320-02]
b) What was your methodology for identifying security vulnerabilities? This is where you should briefly describe the tools and techniques
that you used to find the vulnerabilities. [IT-320-01]
c) Overall, what was your determination about the enterprise’s current security posture. [IT-320-01]
II. Network Assessment – Gathering Evidence of the Vulnerabilities:
In this part of your project, you will assess the security posture of this network to find what security vulnerabilities currently exist using the appropriate
scanning tools and techniques looking at both the pfSense firewall and the Windows Server firewall for the Windows Server host (192.168.1.10). Please
see the Final Project navigation pane in the InfoSec environment for a diagram of the systems, users IDs, and passwords you will need to use in that
environment. Be sure your responses and supporting evidence address the following questions:
a) Firewall: Determine threats to the firewall. For example, are there any ports that are open unnecessarily or unused? Support your response with
evidence. [IT-320-01]
b) Virtual Machine (host): Determine threats to the virtual machine (host). For example, are there any ports that are open unnecessarily or
unused? Support your response with evidence. [IT-320-01]
c) Determine if there is malicious software protection in place using the tools provided to you. Support your response with evidence. [IT-320-01]:
i. What kinds of antivirus software, malware protection, or other security software is in place?
ii. What are the risks associated with the gaps in malicious software prevention?
iii. What are the risks associated with leaving the malicious software prevention strategies as they are now?
d) Intrusion Detection: What security threats are you finding in the output as you analyze the network traffic? Support your response with
evidence from your Wireshark and NetworkMiner tools. [IT-320-01]
3
III. Vulnerability Assessment – Interpreting Evidence of Vulnerabilities:
In this part of your project, you will interpret evidence gathered from the network assessment you conducted in Section I to discuss what security
vulnerabilities currently exist. In particular, look closely at the scan you performed on the firewall and your Nmap and Zenmap results. Interpret the
output from these tools. Be sure your responses and supporting evidence address the following questions:
a) What are the vulnerabilities specific to the network traffic? Explain what kind of security threats the vulnerabilities pose. [IT-320-04]
b) What are the vulnerabilities specific to the anti-malware systems (especially centrally managed solutions with aggregated reporting)? Explain
what kind of security threats the vulnerabilities pose. For example, what do the Windows security settings tell you? [IT-320-04]
c) What are the vulnerabilities specific to the operating systems and workstations? Explain what kind of security threats the vulnerabilities pose.
For example, what did you find when you used the OpenVAS tool? [IT-320-04]
d) What are the vulnerabilities specific to the network hardware (firewall)? Explain what kind of security threats the vulnerabilities pose. [IT-320-04]
IV. Network Security Posture Recommendations:
In this area, you will identify what aspects of the network should be examined to address the network security posture. Use your knowledge from
research, readings, and activities in the course to help you. For Parts e and f, it may be helpful to organize your information in a table format for
organizational purposes. A sample is provided for you in the Supporting Information section.
a) Identify key aspects of the network that should be examined to address the network security posture ensuring the following key criteria have
been included: [IT-320-03]
i. At least one issue associated with the firewall
ii. At last one issue associated with one or more client machines
iii. At least one issue associated with one or more server machines
iv. At least one issue associated with a Windows host
b) Indicate the impact of the vulnerability. [IT-320-03]
c) Indicate the likelihood of the vulnerability. [IT-320-03]
d) What mitigation strategies do you recommend be implemented for addressing all of the issues uncovered in your network assessment
above? Support your response with evidence from your lab work and coursework. [IT-320-02]
e) Prioritize the recommended strategies for the company. Use the matrix in the Supporting Information section to assess the priority. [IT-
320-02]
f) Explain the rationale of the prioritization you have chosen for each solution. [IT-320-02]
V. Implementation Solutions:
In this area, you will add a brief written summary following your charts that demonstrates you actually implemented the solutions you
recommended in your lab environment. Your written responses should include evidence in the form of a screenshot or screen capture that
demonstrates you have executed your proposed recommendations.
a) Execute your proposed strategy specific to at least one of the issues you have uncovered with firewalls and support your response with
evidence. [IT-320-03]
b) Harden the server(s) using at least one method and support your response with evidence. [IT-320-03]
3D printing
3D Printing Stage 3 Assignment Before you begin this assignment, be sure you: Have completed all previously assigned rea ...
3D printing
3D Printing Stage 3 Assignment Before you begin this assignment, be sure you: Have completed all previously assigned readings.Read the “3D Printing Case Study." Reviewed the feedback on your 3D Printing Stage 1 and Stage 2 Assignments. It is several months later and Mark has implemented your recommendations for his IT infrastructure.Business is booming!Mark's father has seen what a great success Mark's 3D printing business is, and he wants to provide the capital to open two more facilities near Veterans Administration Hospitals in Memphis, Tennessee and Phoenix, Arizona.Mark is very excited about expanding his business and being located near service men and women who will benefit from his 3D printed accessibility and assistive devices.Since he has already purchased several server and storage devices to hold his designs and business information, he would like to retain that investment.One thing he has learned is that, with very high speed internet connections, the 3D design files can be downloaded in just a few seconds, so they would not have to be stored at each of his new locations.Mark's plan is to create two new facilities, each with the same number of 3D printers and staff as he has at his current location.The employees at the new locations will also need access to the ERP system to report their time and order supplies, etc. Mark has asked you to explain how his IT infrastructure should be changed to accommodate these two new facilities and allow him to manage the overall enterprise as one business.Use the following outline for your paper: List the components.In part 1 of your Stage 2 assignment, you listed the computer system, information system, and network components needed at Mark's facility.Here you will list which of those components (hardware, software, security devices, communication network and its devices, wired/wireless devices, internet, and data and information, as appropriate) will be located at each of the two new (remote) locations. (Create one list; it will be the same for both.)Some components may not be needed at the new locations; you should not list those.The new locations may require some components not in use at the original site; these should be included in the list. Explain the changes that will be needed in Mark's current (existing) IT infrastructure to incorporate the two new locations, and handle the increase in the number of designs and orders and the additional employees.Explain what is different in the IT infrastructure at the two new locations versus the IT infrastructure now in place at Mark's current facility, and explain why the differences exist.Create an original graphical representation of the three facilities and show the devices that would be located at each location.Show how the locations would be connected and the devices required. Formatting: Parts 1, 2, and 3 should be about 2 single spaced pages in length, and be in Microsoft Word format, or a format that can be read in Word. Part 4 is an original graphic diagram(s) that should be included in the same document.If you have too much difficulty inserting the diagram, you may provide it as a separate file that can be read by Word, Excel or PowerPoint.Compare your work to the Grading Rubric below to be sure you have met content and quality criteria.Your submission should include your last name firstin the filename: Lastname_firstname_Stage_3
CMIT 495 UMUC Current Trends and Projects in Computer Networks and Security Ques
For this assignment, the Caduceus CTO, Eliza, has asked you to create a working proof of concept.Step 1: Create an AWSeduc ...
CMIT 495 UMUC Current Trends and Projects in Computer Networks and Security Ques
For this assignment, the Caduceus CTO, Eliza, has asked you to create a working proof of concept.Step 1: Create an AWSeducate AccountCMIT 495 requires you to complete hands-on assignments in a virtual environment. We will be using Amazon Web Services (AWS) as our virtual environment. Amazon offers a free account for those that register. The AWSeducate Video below provides step-by-step instructions with visuals on how to register for a free AWSeducate account:Step 2: Download the Week 1 Project TemplateWatch the video and download the template from the Virtualization Assignment Resources page.Step 3: Install and Configure an AWS EC2 Instance (Virtual Machine)Using the newly created AWS free account, install and configure an Ubuntu Server virtual machine (VM) using the most recent version of the 64-bit operating system.You will need to provide a detailed overview of the steps required to install the Ubuntu server operating system on the virtual machine, including screenshots of each step in the process in the Week 1 Assignment Template.For information on installing and configuring a virtual machine:Search for and use AWS documentation and tutorials for instructions and guidance to complete the assignments.Consult the AWS Connection Documentation in order to connect to the Ubuntu server.Step 4: Complete the Week 1 Project and Upload to the Assignment FolderAnswer the questions and embed the appropriate screenshots of your Ubuntu server installation. When providing a detailed overview of the steps required to install the Ubuntu server operating system on the virtual machine, make sure to include screenshots of each step in the process. Further details and instructions are included within the Week 1 Assignment Template.How Will My Work Be Evaluated?The following evaluation criteria aligned to the competencies will be used to grade your assignment:1.1.3: Present ideas in a clear, logical order appropriate to the task.1.4.1: Produce grammatically correct material in standard academic English that supports communication.2.3.1: State conclusions or solutions clearly and precisely.11.1.3: Install the software.11.2.1: Configure technology according to stakeholder specifications and requirements.11.3.1: Add and update systems as required.13.2.1: Evaluate vendor recommendations in the context of organization requirements.When complete, export your file as a PDF and upload it to the LEO Assignments folder (e.g., Project 1 - Virtualization Assignment).Step 5: Stop and Terminate Your Amazon InstanceAfter you complete the Week 1 Assignment, stop and terminate your Amazon deployment/instance so that you are not charged
Earn money selling
your Study Documents