Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

COMPETENCIES 4 0 2 7 . 3 . 1 : Assesses Business Needs and Network Security The learner assesses business and technology needs, network security

COMPETENCIES
4027.3.1: Assesses Business Needs and Network Security
The learner assesses business and technology needs, network security vulnerabilities, and security strategies.
4027.3.2: Aligns Secure Network Architecture
The learner aligns secure network architectures with industry best practices and the principles of secure network design.
4027.3.3: Recommends Network Security Solutions
The learner recommends network security and vulnerability solutions.
INTRODUCTION
You are the cybersecurity professional for Company A and are responsible for protecting the information of the company. Your roles include managing the company's cybersecurity capabilities and tools, conducting vulnerability management, and assessing risk to sensitive information. Company A has recently purchased Company B and wants to merge both networks.
Executives of Company A have tasked you with making risk-based decisions on integrating Company B's network with Company A's existing network. Company B has provided its latest vulnerability scans, network diagrams, and existing cybersecurity capabilities and tools. As a deliverable to the executives, you will submit your recommendations for a secure network design that merges the two networks and allows remote access for employees of both companies in the form of a merger and implementation plan.
For this project, you will use the given scenario and the following supporting documents to complete your network merger and implementation plan:
"Company A Network Diagram"
"Company A Risk Analysis"
"Company B Network Diagram"
"Company B Vulnerability Report and Cybersecurity Tools"
SCENARIO
Company A is a global company based in the United States that operates in the financial industry. Company A serves its customers with financial products, such as checking accounts, bank cards, and investment products. Company A has recently acquired Company B and needs to integrate with or remove similar capabilities and tools from Company B. Company B is smaller in size, has no dedicated cybersecurity professional role, and utilizes third-party support for infrastructure needs. Company B offers specialized software to medical providers and accepts credit cards as a
Help
image text in transcribed

Step by Step Solution

There are 3 Steps involved in it

Step: 1

To create a network merger and implementation plan for integrating the networks of Company A and Company B you should follow these steps Step 1 Assess ... blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

MySQL Crash Course A Hands On Introduction To Database Development

Authors: Rick Silva

1st Edition

1718503008, 978-1718503007

More Books

Students also viewed these Databases questions

Question

Knowledge Check 01...

Answered: 1 week ago