Answered step by step
Verified Expert Solution
Question
1 Approved Answer
COMPETENCIES 4 0 2 7 . 3 . 1 : Assesses Business Needs and Network Security The learner assesses business and technology needs, network security
COMPETENCIES
: Assesses Business Needs and Network Security
The learner assesses business and technology needs, network security vulnerabilities, and security strategies.
: Aligns Secure Network Architecture
The learner aligns secure network architectures with industry best practices and the principles of secure network design.
: Recommends Network Security Solutions
The learner recommends network security and vulnerability solutions.
INTRODUCTION
You are the cybersecurity professional for Company A and are responsible for protecting the information of the company. Your roles include managing the company's cybersecurity capabilities and tools, conducting vulnerability management, and assessing risk to sensitive information. Company A has recently purchased Company B and wants to merge both networks.
Executives of Company A have tasked you with making riskbased decisions on integrating Company Bs network with Company As existing network. Company B has provided its latest vulnerability scans, network diagrams, and existing cybersecurity capabilities and tools. As a deliverable to the executives, you will submit your recommendations for a secure network design that merges the two networks and allows remote access for employees of both companies in the form of a merger and implementation plan.
For this project, you will use the given scenario and the following supporting documents to complete your network merger and implementation plan:
"Company A Network Diagram"
"Company A Risk Analysis"
"Company B Network Diagram"
"Company B Vulnerability Report and Cybersecurity Tools"
SCENARIO
Company A is a global company based in the United States that operates in the financial industry. Company A serves its customers with financial products, such as checking accounts, bank cards, and investment products. Company A has recently acquired Company B and needs to integrate with or remove similar capabilities and tools from Company B Company B is smaller in size, has no dedicated cybersecurity professional role, and utilizes thirdparty support for infrastructure needs. Company B offers specialized software to medical providers and accepts credit cards as a
Help
Step by Step Solution
There are 3 Steps involved in it
Step: 1
To create a network merger and implementation plan for integrating the networks of Company A and Company B you should follow these steps Step 1 Assess ...Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started