Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

THE IS REGARDING COMPUTER SECURITY: Create security strategies to protect the organizations assets. Propose a list of security policies, standards, procedures, and guidelines that will

THE IS REGARDING COMPUTER SECURITY:

Create security strategies to protect the organizations assets.

Propose a list of security policies, standards, procedures, and guidelines that will secure the organizations assets enterprise wide. Be sure to cover all aspects of the network security including servers, applications, operations, users, etc. In regards to the CMI case study below.

Real-World Case Study: Cyber Marketing Inc. (CMI)

Cyber Marketing Inc. (CMI) is a marketing company that manages thousands of accounts across Canada, the United States, and Mexico. A public company traded on the NYSE, CMI specializes in marketing products and services online for their customers.

CMI employs over 600 employees and has been experiencing consistent growth keeping pace with S&P averages (approximately 8%) for nearly six years. A well-honed management strategy built on scaling operational performance through automation and technological innovation has propelled the company into the big leagues; CMI was only recently profiled in Fortune Magazine.

CMI has experienced several cyber-attacks from outsiders over the past a few years. In 2012, the Oracle database server was attacked and its customer database lost its confidentiality, integrity, and availability for several days. Although the company restored the Oracle database server back online, its lost confidentiality damaged the company reputations. CMI ended up paying its customers a large sum of settlement for their loss of data confidentiality. Another security attack was carried out by a malicious virus that infected the entire network for several days. While infected the Oracle and e-mail servers had to be shut down to quarantine these servers. In the meantime, the company lost $1.700, 000 in revenue and intangible customer confidence.

Theres no question that the companys CEO sees the strategic importance of technology in executing his business plan, and in this way you share a common basis of principle with him: that IT is a competitive differentiator. However, you believe that diminishing internal IT services risks security and strategic capability, whereas the CEO feels he can acquire that capability immediately at a low cost through the open market. CORPORATE OFFICE NETWORK TOPOLOGY

image text in transcribed

PLEASE MAKE COPY PASTE AVAILABLE

MUST BE 500 WORDS

Cyber Marketing, Inc. Rerngte Dial UpUsers PSTN Internet Off-Site Office VPN Gateway OC193 OC193 10Gbps 10Gbps Border (Core) Routers 09 VPN Gateway Distribution Routes PBX 100Mbps 12 Mgmt Accounting Worstations Printers 100Mbps Norstations (x5) Printers (x3) (X63) (x7) 10 Gbps 10Gbps Credit Dept Norstations Loan Dept Worstations Printers (x25) (x5) (x10 Printers (x3) 10 Gbps Access Layer VLAN Switch Finance Customer 3 Services Worstations Printers (X12) (x3) 10 Gbps Worstatiopainters (x49) (5) 10 Gbps 10 Gbps BONDO Oracle DB Exchange Intranet Web Server E-mail Server www SUS Server Internal Workstations File and Print Server DNS (x7) Trusted Computing Base Internal Network Cyber Marketing, Inc. Rerngte Dial UpUsers PSTN Internet Off-Site Office VPN Gateway OC193 OC193 10Gbps 10Gbps Border (Core) Routers 09 VPN Gateway Distribution Routes PBX 100Mbps 12 Mgmt Accounting Worstations Printers 100Mbps Norstations (x5) Printers (x3) (X63) (x7) 10 Gbps 10Gbps Credit Dept Norstations Loan Dept Worstations Printers (x25) (x5) (x10 Printers (x3) 10 Gbps Access Layer VLAN Switch Finance Customer 3 Services Worstations Printers (X12) (x3) 10 Gbps Worstatiopainters (x49) (5) 10 Gbps 10 Gbps BONDO Oracle DB Exchange Intranet Web Server E-mail Server www SUS Server Internal Workstations File and Print Server DNS (x7) Trusted Computing Base Internal Network

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

More Books

Students also viewed these Databases questions

Question

5. Describe how contexts affect listening

Answered: 1 week ago