Answered step by step
Verified Expert Solution
Link Copied!
Question
1 Approved Answer

Create a security infrastructure design document for a fictional organization. The security services and tools you describe in the document must be able to meet

Create a security infrastructure design document for a fictional organization. The security services and tools you describe in the document must be able to meet the needs of the organization. Your work will be evaluated according to how well you met the organization’s requirements.

About the organization : This fictional organization has a small, but growing, employee base, with 50 employees in one small office. The company is an online retailer of the world's finest artisanal, hand-crafted widgets. They've hired you on as a security consultant to help bring their operations into better shape.

Organization requirements: As the security consultant, the company needs you to add security measures to the following systems:

An external website permitting users to browse and purchase widgets

An internal intranet website for employees to use

Secure remote access for engineering employees

Reasonable, basic firewall rules

Wireless coverage in the office

Reasonably secure configurations for laptops

Since this is a retail company that will be handling customer payment data, the organization would like to be extra cautious about privacy. They don't want customer information falling into the hands of an attacker due to malware infections or lost devices.

Engineers will require access to internal websites, along with remote, command line access to their workstations.

Submission : You should write your document using a text editor or word processor (e.g., Google Docs, Microsoft Word, OpenOffice, etc.). You should upload your document in PDF format (i.e., my_submission.pdf). Please do not upload your submission using proprietary software extensions, like .docx or .pptx.

Step-By-Step Assignment Instructions

You’ll create a security infrastructure design document for a fictional organization. Your plan will be evaluated according to how well you met the organization's requirements. Points will be awarded based on how well you met these requirements, considering the security implications of your choices.

The following elements should be incorporated into your plan:

Authentication system

External website security

Internal website security

Remote access solution

Firewall and basic rules recommendations

Wireless security

VLAN configuration recommendations

Laptop security configuration

Application policy recommendations

Security and privacy policy recommendations

Intrusion detection or prevention for systems containing customer data

Step by Step Solution

3.47 Rating (160 Votes )

There are 3 Steps involved in it

Step: 1

Using the clientid and password use social sign in Facebook mail or using biometrics fingerprints face website authentication can be achieved Authentication requires checking who the user wants to be ... blur-text-image
Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

A First Course in the Finite Element Method

Authors: Daryl L. Logan

6th edition

1305635116, 978-1305887176, 1305887174, 978-1305635111

More Books

Students explore these related Programming questions