marge retail store(please find the attachment and description and as of instructions need 3-5 pages)

User Generated

gneha92

Computer Science

Security Architecture and Design Course

University of cumberlands

Description

Take a look at the attachment. This gives you a visual of Marge's retail store's current IT infrastructure. Marge is looking to enhance her online sales but before she does she has called you to conduct a thorough threat assessment and recommend threat mitigations and controls prior to moving forward with the new project she is calling Using the Internet to Increase Sales.

Write a 3 to 5 page paper with proper APA formatting using the threat modeling techniques we have gone over thus far to uncover any threats that jump out from the attachment. Use critical thinking, look for information flows, exposures, vulnerabilities, and so on. Once you have identified threats suggest mitigations that would reduce the risk of those threats. Also, note that Marge is using a public IP space of 200.200.200.0/24 for the entire network infrastructure i.e. one Local Area Network.

You should at a minimum uncover 5 potential threats within this architecture.

Unformatted Attachment Preview

Bb Upload Assignment: Case Stuc x 3662117 (1100x767) х + C https://s3.us-east-1.amazonaws.com/blackboard.learn.xythos.prod/5a31b16bb2c48/3662117?response-content-disposition=inline%3B%20filename%2A%3DUTF-8%27... Marge's Current Legacy Network Infrastructure Layout PUBLIC INTERNET PSTN (Public Switch Telephone Network) mm) Computers Connecting at 100 mbps NIC capable of maximum 100 mbps Router Layer 3 Device OSI Model Category 5 Copper Cabling Layer 1 OSI model Analog PBX (Private Branch Exchange) C G Workgroup Switch Layer 2 Device OSI Model FAX Dot Matrix Network Printer Jet Direct Card Current Data Server Farm Non- Virtualized Layer 7 OSI model
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Hi, kindly find attached

Running head: MERGE RETAIL STORE

1

Marge Retail Store
Student's Name
Institution
Date

MERGE RETAIL STORE

2
Abstract

The internet comprises information, both personal and sensitive business information.
Regularly there are reported cases of content being stolen and released to public websites by
hackers. The posts place the organization and the users at risk. The credential may contain links
to sensitive company's credentials. In security management, vulnerabilities assessment is the
most crucial step in accessing your network. The process involves using the utilities and legacy
infrastructure model to scan for your network vulnerabilities. The essay discusses the model and
the possible threats that the design subjects the model too. If one wants to determine how
vulnerable the organization's network falls subject to security breaches, he /she has to use the
methods used by possible invaders. Threat model often involves identifying, communicate and
understanding the threats and mitigations within the model. Threat modeling can be applied to a
wide range. Which includes; software, networks, application systems, business processes, things
in the internet of things and distributed systems, etc. threat modeling can be introduced in an
organization at any stage of the company's development stage. Preferably, it is best to imply at
early stages, so that the findings can inform necessary changes in the designs.

MERGE RETAIL STORE

3

The database model subjects the merge retail stores to several kinds of a...


Anonymous
Really great stuff, couldn't ask for more.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags