Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

This question is regarding Computer Security Evaluate security services needed for modern information system. Write a security plan to strategically protect the CMI case study

This question is regarding Computer Security

Evaluate security services needed for modern information system.

Write a security plan to strategically protect the CMI case study organization. This plan should encompass the enterprise security plan to include all aspects of the security operations, assessment, monitoring, detection, and mitigation procedures.

PLEASE UTILIZE THE READING MATERIAL BELOW TO HELP ANSWER THE QUESTION.

PLEASE MAKE COPY PASTE AVAILABLE

Real-World Case Study: Cyber Marketing Inc. (CMI)

Cyber Marketing Inc. (CMI) is a marketing company that manages thousands of accounts across Canada, the United States, and Mexico. A public company traded on the NYSE, CMI specializes in marketing products and services online for their customers.

CMI employs over 600 employees and has been experiencing consistent growth keeping pace with S&P averages (approximately 8%) for nearly six years. A well-honed management strategy built on scaling operational performance through automation and technological innovation has propelled the company into the big leagues; CMI was only recently profiled in Fortune Magazine.

CMI has experienced several cyber-attacks from outsiders over the past a few years. In 2012, the Oracle database server was attacked and its customer database lost its confidentiality, integrity, and availability for several days. Although the company restored the Oracle database server back online, its lost confidentiality damaged the company reputations. CMI ended up paying its customers a large sum of settlement for their loss of data confidentiality. Another security attack was carried out by a malicious virus that infected the entire network for several days. While infected the Oracle and e-mail servers had to be shut down to quarantine these servers. In the meantime, the company lost $1.700, 000 in revenue and intangible customer confidence.

Theres no question that the companys CEO sees the strategic importance of technology in executing his business plan, and in this way you share a common basis of principle with him: that IT is a competitive differentiator. However, you believe that diminishing internal IT services risks security and strategic capability, whereas the CEO feels he can acquire that capability immediately at a low cost through the open market. CORPORATE OFFICE NETWORK TOPOLOGY

image text in transcribed

PLEASE MAKE COPY PASTE AVAILABLE

Cyber Marketing, Inc. Rerngte Dial UpUsers PSTN Internet Off-Site Office VPN Gateway OC193 OC193 10Gbps 10Gbps Border (Core) Routers 09 VPN Gateway Distribution Routes PBX 100Mbps 12 Mgmt Accounting Worstations Printers 100Mbps Norstations (x5) Printers (x3) (X63) (x7) 10 Gbps 10Gbps Credit Dept Norstations Loan Dept Worstations Printers (x25) (x5) (x10 Printers (x3) 10 Gbps Access Layer VLAN Switch Finance Customer 3 Services Worstations Printers (X12) (x3) 10 Gbps Worstatiopainters (x49) (5) 10 Gbps 10 Gbps BONDO Oracle DB Exchange Intranet Web Server E-mail Server www SUS Server Internal Workstations File and Print Server DNS (x7) Trusted Computing Base Internal Network Cyber Marketing, Inc. Rerngte Dial UpUsers PSTN Internet Off-Site Office VPN Gateway OC193 OC193 10Gbps 10Gbps Border (Core) Routers 09 VPN Gateway Distribution Routes PBX 100Mbps 12 Mgmt Accounting Worstations Printers 100Mbps Norstations (x5) Printers (x3) (X63) (x7) 10 Gbps 10Gbps Credit Dept Norstations Loan Dept Worstations Printers (x25) (x5) (x10 Printers (x3) 10 Gbps Access Layer VLAN Switch Finance Customer 3 Services Worstations Printers (X12) (x3) 10 Gbps Worstatiopainters (x49) (5) 10 Gbps 10 Gbps BONDO Oracle DB Exchange Intranet Web Server E-mail Server www SUS Server Internal Workstations File and Print Server DNS (x7) Trusted Computing Base Internal Network

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Processing Fundamentals Design And Implementation

Authors: David M. Kroenke

5th Edition

B000CSIH5A, 978-0023668814

More Books

Students also viewed these Databases questions