Description
Question attached in drop files ..please upload file for remainder of scenario.... only partial scenario info listed
Scenario: You work for a network security firm as a professional security engineer. You are asked to provide a security and testing assessment document for one of the firm’s customers. The customer is a local fulfillment company that deals with confidential customer information. The fulfillment company has 2 locations, a headquarters office downtown and a branch office in another city.
The company has the following equipment:
12 windows xp and 25 windows 7 workstations connected to a windows server 2008 domain controller and file server (The windows xp PC's are mostly used in the warehouse connected to high speed printers for employees to spool and print jobs
1 window server 2008 R2 RRAS server accessed by home workers after hours
1 windows server 2003 print server
1 Linux database server running an open source of MySQL
1 Apache Web server for customers to check status of their jobs/orders online
a 7 year ole firewall connecting the headquarters network perimeter to a T3 internet line and virtual private network
a 10 yr old firewall in the branch office connecting to the internet and headquarters via a T1 link and
15 Windows xp workstations in the branch office connecting to the headquarters office via VPN to the Windows Server 2008 R2 domain controller file and print server
At the headquarters location the servers are located in a locked server room that only authorized users can enter. The server room has a 4-digit combination lock for security. Both locations have numerous cameras including camera in the computer room.
The network manager has informed you that the
fulfillment company has an IT security policy that all employees are required
to read and sign when they are hired by the company. The network manager wants
to ensure that the network is secure and ask you to provide a statement of work
or rules of engagement (ROE) document for a network security assessment
Unformatted Attachment Preview
Purchase answer to see full attachment
Explanation & Answer
attached is my answer
Cyber Infrastructure Scenario Case Study
Course’s Name
Student’s Name
Professor’s Name
Institution
Due Date
Cyber Infrastructure Scenario Case Study
A security and testing assessment document for one of the firm’s customers can
be provided as the security specialists say that a risk of a digital attack, assaulting our
foundation cyber infrastructures are perpetually practical and more proficient than ever
previously. Everything today is to some degree interconnected; movement cyber
infrastructures, building security cyber infrastructures, control foundation, airport
regulation of cyber infrastructures, and so forth. Most cyber infrastructures still keep
running off an indistinguishable cyberinfrastructure that was made back in a few
centuries ago (Eigenmann et. al., 2011). The client is a nearby satisfaction organization
that arrangements with classified client data. The satisfaction organization has 2 areas, a
central station office downtown and a branch office in another city. The organization has
the accompanying hardware: 12 Windows XP and 25 windows 7 workstations associated
with a windows server 2008 area controller and record server, as the Windows XP PC's
are for the most part utilized as a part of the distribution center associated with fast
printers for representatives to spool and print occupations. They were made to screen
modern process, where those procedures can be checked and controlled over long
separations. These cyber infrastructures when ...