Fill This Form To Receive Instant Help
Homework answers / question archive / Scenario: Overview: Now that you’re super knowledgeable about security, let's put your newfound know-how to the test
Scenario:
Overview: Now that you’re super knowledgeable about security, let's put your newfound know-how to the test. You may find yourself in a tech role someday, where you need to design and influence a culture of security within an organization. This project is your opportunity to practice these important skillsets.
· An external website permitting users to browse and purchase widgets
· An internal intranet website for employees to use
· Secure remote access for engineering employees
· Reasonable, basic firewall rules
· Wireless coverage in the office
· Reasonably secure configurations for laptops
Grading: This is a required assignment for the module.
· Firewall and basic rules recommendations
· VLAN configuration recommendations
· Laptop security configuration
· Application policy recommendations
· Security and privacy policy recommendations
· Intrusion detection or prevention for systems containing customer data
**** This is an example*** I found same assignment on Chegg.com****
Purpose of the Security Infrastructure Design Document
2. General Overview and Design Approach
2.2 Assumptions/Constraints/Risks
The following are the key considerations associated with the security of the infrastructure:
· Firewall and basic rules recommendations
· VLAN configuration recommendations
· Laptop security configuration
· Application policy recommendations
· Security and privacy policy recommendations
· Intrusion detection or prevention for systems containing customer data
2.3 Alignment with Federal Enterprise Architecture
· An external website permitting users to browse and purchase widgets securely.
· An internal intranet website like that of a VPN for employees to use
· Secure remote access for engineering employees
· Reasonable, basic firewall rules
· Wireless coverage in the office
· Reasonably secure configurations for laptops
For external website to perform purchase activity by customers:
· Protecting confidentiality of the data
· Making sure that unauthorized persons or systems cannot access the information of users;
· Making sure that the information accessed is genuine;
· Making the data accessible and usable;
· Logging the transactions for further reference and support activity
· Verifying the authenticity of a person to perform a transaction.
1. For intranet website accessed by employees:
· Making sure that the access is within their intranet by implementing a firewall mechanism
· Specifying the authentication mechanism to access the website by the employees
· Supervising the activities and user management on the website by an administrator
1. Secure remote access for engineering employees
Device type: What device types require remote access?
Role: What remote access is appropriate for that role given the device used?
Location. Is access from a public location, another company site, internal wireless, etc.?
1. Basic firewall rules to be implemented:
Block by default – to block all incoming and outgoing connections
Allow specific traffic – only allow specified IP addresses
Allow Inbound-only allowing intranet users
1. Wireless coverage in the office
Security considerations: Should be Password protected and metered
1. Laptop Security configuration:
· Encrypting the disks on the laptops
· Ensuring Antimalware/Antivirus are up to date in regular intervals
· White listing the devices on the network
1. Application policy recommendations
· Integrate secure coding principles in all software components of infrastructure.
· Perform automated application security testing as part of the overall application testing process.
· Development and testing environments should redact all sensitive data or use de-identified data.
· Compliance with industry standard data policies and protocols
1. Security and privacy policy recommendations
Explain How the organization Collects and Use Personal Information
· Contact Information – Make it easy for your customers to contact you or file a complaint.
Display Privacy Policy Make sure new customers or users have easy access to your policy mandatorily
Publish Email Opt-Out Policies – Include opt-out options in your email marketing
Intrusion detection or prevention for systems containing customer data
Customer information, Company related information
Key threats to protect against:
Intrusion to website, Data Loss
Key activities to protect against:
Customer purchase of artifacts, payment transactions, employee data