Through analysis of reference materials regarding a notional organization, the student will develop the following products:
Written assessment of the current security posture of the organization. State in general terms where Omega has strengths and where they have weaknesses.
Develop a listing of threats (five), prioritized by their relative likelihood and potential frequency of occurrence. By definition, a threat is the occurrence of any event that causes an undesirable impact on the organization. Threats can be either man-made or natural. Is the disgruntled employee a threat? How likely is it that we Omega will be faced with an insider attempting to do bad things on their networks? Can you estimate how frequently that insider threat might manifest itself? What about the script kiddy? How likely is it that Omega will be probed by script kiddy? How frequently is this likely to occur?
Develop a listing of vulnerabilities (10) in the current security posture of Omega Research. A vulnerability is defined as the absence or weakness of a safeguard to reduce the risk associated with a specific threat.
Prioritize the vulnerabilities based on the potential impact on Omega Research if the vulnerability is exploited (threat is realized). (The FBI yearly report is helpful)
Considering the vulnerabilities associated with the current security posture of Omega, develop a single, optimal network security plan of action that reduces the vulnerabilities to an acceptable level (subjective). This plan will include:
Proposed changes to the perimeter architecture of all four sites. Include written description of recommended changes, why you are recommending these changes, and a logical network diagram of your solution for each site.
As necessary to compliment your perimeter design, proposed changes to the internal network/security architecture for each of the four sites. Include written description of recommended changes, why you are recommending these changes, and include those changes in your site diagrams.
As necessary to compliment your perimeter design, proposed changes to network/security management tools and/or procedures.
The 3 highest priority security policies that must be developed and published now to support your network security plan of action. Include the essence of these policies by using a customized template. Include a paragraph that summarizes the changes to the template.
Your recommendations on securely implementing the Omega Research web site and knowledge portal. Focused on location of networked resources within security zones within the enterprise and guidelines to prevent common web-based and SQL-based attacks.
Any additional recommendations you might have for Omega senior management to improve their bottom line.
We value our customers and so we ensure that what we do is 100% original..
With us you are guaranteed of quality work done by our qualified experts.Your information and everything that you do with us is kept completely confidential.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.Read more
The Product ordered is guaranteed to be original. Orders are checked by the most advanced anti-plagiarism software in the market to assure that the Product is 100% original. The Company has a zero tolerance policy for plagiarism.Read more
The Free Revision policy is a courtesy service that the Company provides to help ensure Customer’s total satisfaction with the completed Order. To receive free revision the Company requires that the Customer provide the request within fourteen (14) days from the first completion date and within a period of thirty (30) days for dissertations.Read more
The Company is committed to protect the privacy of the Customer and it will never resell or share any of Customer’s personal information, including credit card data, with any third party. All the online transactions are processed through the secure and reliable online payment systems.Read more
By placing an order with us, you agree to the service we provide. We will endear to do all that it takes to deliver a comprehensive paper as per your requirements. We also count on your cooperation to ensure that we deliver on this mandate.Read more