Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / Project-Based Assessment – Cybersecurity Applicant instructions Please answer the questions in the project assessment prompt below in a report format

Project-Based Assessment – Cybersecurity Applicant instructions Please answer the questions in the project assessment prompt below in a report format

Computer Science

Project-Based Assessment – Cybersecurity Applicant instructions Please answer the questions in the project assessment prompt below in a report format. Your should be three pages or fewer and in one of the following formats: Word document, PDF, or text file. Assessment prompt You have been hired as a security engineer at a small company, and your first task is to analyze and evaluate their architecture for their website. Your new boss Taylor hands you an architecture diagram and gives you a quick overview of the setup: ? Our service lets customers upload files of 3D models to our web server, which then arranges for the 3D model to be printed in the manufacturing lab. Users must have an account to use our service. ? We have two web servers behind a load balancer. The web server traffic then passes through a traditional firewall to the application servers. ? Two application servers run on virtual machines with Ubuntu as their operating system, and the firewall handles load balancing between the application servers. ? The application servers send files to the Design Server that uses Windows 10 as its operating system. The Design Server sends the printing jobs to the 3D printer. Given the following architecture diagram, write a report that: 1. Gives a summary of the architecture as presented. 2. Identifies potential security risks of the architecture. 3. Proposes modifications or mitigations to the architecture to reduce the security risks you listed in #2, including any downsides to the changes. 4. Explains how you would perform a vulnerability assessment for the company's systems. Please address the entire architecture, specifying which aspects of security you would assess, which tools you would use for the assessment, and how each of those tools would be useful for this assessment.

Option 1

Low Cost Option
Download this past answer in few clicks

18.99 USD

PURCHASE SOLUTION

Already member?


Option 2

Custom new solution created by our subject matter experts

GET A QUOTE

Related Questions