Answered step by step
Verified Expert Solution
Question
00
1 Approved Answer
COMPETENCIES 4 0 2 7 . 3 . 1 : Assesses Business Needs and Network Security The learner assesses business and technology needs, network security
COMPETENCIES : Assesses Business Needs and Network Security The learner assesses business and technology needs, network security vulnerabilities, and security strategies. : Aligns Secure Network Architecture The learner aligns secure network architectures with industry best practices and the principles of secure network design. : Recommends Network Security Solutions The learner recommends network security and vulnerability solutions. INTRODUCTION You are the cybersecurity professional for Company A and are responsible for protecting the information of the company. Your roles include managing the company's cybersecurity capabilities and tools, conducting vulnerability management, and assessing risk to sensitive information. Company A has recently purchased Company B and wants to merge both networks. Executives of Company A have tasked you with making riskbased decisions on integrating Company Bs network with Company As existing network. Company B has provided its latest vulnerability scans, network diagrams, and existing cybersecurity capabilities and tools. As a deliverable to the executives, you will submit your recommendations for a secure network design that merges the two networks and allows remote access for employees of both companies in the form of a merger and implementation plan. For this project, you will use the given scenario and the following supporting documents to complete your network merger and implementation plan: "Company A Network Diagram" "Company A Risk Analysis" "Company B Network Diagram" "Company B Vulnerability Report and Cybersecurity Tools" SCENARIO Company A is a global company based in the United States that operates in the financial industry. Company A serves its customers with financial products, such as checking accounts, bank cards, and investment products. Company A has recently acquired Company B and needs to integrate with or remove similar capabilities and tools from Company B Company B is smaller in size, has no dedicated cybersecurity professional role, and utilizes thirdparty support for infrastructure needs. Company B offers specialized software to medical providers and accepts credit cards as a Help
COMPETENCIES
: Assesses Business Needs and Network Security
The learner assesses business and technology needs, network security vulnerabilities, and security strategies.
: Aligns Secure Network Architecture
The learner aligns secure network architectures with industry best practices and the principles of secure network design.
: Recommends Network Security Solutions
The learner recommends network security and vulnerability solutions.
INTRODUCTION
You are the cybersecurity professional for Company A and are responsible for protecting the information of the company. Your roles include managing the company's cybersecurity capabilities and tools, conducting vulnerability management, and assessing risk to sensitive information. Company A has recently purchased Company B and wants to merge both networks.
Executives of Company A have tasked you with making riskbased decisions on integrating Company Bs network with Company As existing network. Company B has provided its latest vulnerability scans, network diagrams, and existing cybersecurity capabilities and tools. As a deliverable to the executives, you will submit your recommendations for a secure network design that merges the two networks and allows remote access for employees of both companies in the form of a merger and implementation plan.
For this project, you will use the given scenario and the following supporting documents to complete your network merger and implementation plan:
"Company A Network Diagram"
"Company A Risk Analysis"
"Company B Network Diagram"
"Company B Vulnerability Report and Cybersecurity Tools"
SCENARIO
Company A is a global company based in the United States that operates in the financial industry. Company A serves its customers with financial products, such as checking accounts, bank cards, and investment products. Company A has recently acquired Company B and needs to integrate with or remove similar capabilities and tools from Company B Company B is smaller in size, has no dedicated cybersecurity professional role, and utilizes thirdparty support for infrastructure needs. Company B offers specialized software to medical providers and accepts credit cards as a
Help
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access with AI-Powered Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started