Cyber Infrastructure Scenario question attached

User Generated

aniltveyain

Computer Science

critical infrastructure protection in cybersecurity

Description

Question attached in drop files ..please upload file for remainder of scenario.... only partial scenario info listed

Scenario: You work for a network security firm as a professional security engineer. You are asked to provide a security and testing assessment document for one of the firm’s customers. The customer is a local fulfillment company that deals with confidential customer information. The fulfillment company has 2 locations, a headquarters office downtown and a branch office in another city.

The company has the following equipment:

12 windows xp and 25 windows 7 workstations connected to a windows server 2008 domain controller and file server (The windows xp PC's are mostly used in the warehouse connected to high speed printers for employees to spool and print jobs

1 window server 2008 R2 RRAS server accessed by home workers after hours

1 windows server 2003 print server

1 Linux database server running an open source of MySQL

1 Apache Web server for customers to check status of their jobs/orders online

a 7 year ole firewall connecting the headquarters network perimeter to a T3 internet line and virtual private network

a 10 yr old firewall in the branch office connecting to the internet and headquarters via a T1 link and

15 Windows xp workstations in the branch office connecting to the headquarters office via VPN to the Windows Server 2008 R2 domain controller file and print server

At the headquarters location the servers are located in a locked server room that only authorized users can enter. The server room has a 4-digit combination lock for security. Both locations have numerous cameras including camera in the computer room.

The network manager has informed you that the

fulfillment company has an IT security policy that all employees are required

to read and sign when they are hired by the company. The network manager wants

to ensure that the network is secure and ask you to provide a statement of work

or rules of engagement (ROE) document for a network security assessment

Unformatted Attachment Preview

Scenario: You work for a network security firm as a professional security engineer. You are asked to provide a security and testing assessment document for one of the firm’s customers. The customer is a local fulfillment company that deals with confidential customer information. The fulfillment company has 2 locations, a headquarters office downtown and a branch office in another city. The company has the following equipment: 12 windows xp and 25 windows 7 workstations connected to a windows server 2008 domain controller and file server (The windows xp PC's are mostly used in the warehouse connected to high speed printers for employees to spool and print jobs 1 window server 2008 R2 RRAS server accessed by home workers after hours 1 windows server 2003 print server 1 Linux database server running an open source of MySQL 1 Apache Web server for customers to check status of their jobs/orders online a 7 year ole firewall connecting the headquarters network perimeter to a T3 internet line and virtual private network a 10 yr old firewall in the branch office connecting to the internet and headquarters via a T1 link and 15 Windows xp workstations in the branch office connecting to the headquarters office via VPN to the Windows Server 2008 R2 domain controller file and print server At the headquarters location the servers are located in a locked server room that only authorized users can enter. The server room has a 4-digit combination lock for security. Both locations have numerous cameras including camera in the computer room. The network manager has informed you that the fulfillment company has an IT security policy that all employees are required to read and sign when they are hired by the company. The network manager wants to ensure that the network is secure and ask you to provide a statement of work or rules of engagement (ROE) document for a network security assessment. Create a document following the Appendix B format based on the scenario provided. You document must be at least 3 pages in length. Additionally, sketch a network diagram for the fulfillment company (remember to include connectivity devices necessary for the LAN and WAN connections) Describe any entry points (physical or data transmission related) or situations that constitute potential security risks. In addition, in your ROE document suggest how the network manager could better train his or her employees to understand network security. Paraphrased and quoted material must have accompanying citations
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

attached is my answer

Cyber Infrastructure Scenario Case Study
Course’s Name
Student’s Name
Professor’s Name
Institution
Due Date

Cyber Infrastructure Scenario Case Study
A security and testing assessment document for one of the firm’s customers can
be provided as the security specialists say that a risk of a digital attack, assaulting our
foundation cyber infrastructures are perpetually practical and more proficient than ever
previously. Everything today is to some degree interconnected; movement cyber
infrastructures, building security cyber infrastructures, control foundation, airport
regulation of cyber infrastructures, and so forth. Most cyber infrastructures still keep
running off an indistinguishable cyberinfrastructure that was made back in a few
centuries ago (Eigenmann et. al., 2011). The client is a nearby satisfaction organization
that arrangements with classified client data. The satisfaction organization has 2 areas, a
central station office downtown and a branch office in another city. The organization has
the accompanying hardware: 12 Windows XP and 25 windows 7 workstations associated
with a windows server 2008 area controller and record server, as the Windows XP PC's
are for the most part utilized as a part of the distribution center associated with fast
printers for representatives to spool and print occupations. They were made to screen
modern process, where those procedures can be checked and controlled over long
separations. These cyber infrastructures when ...


Anonymous
Very useful material for studying!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags