Network Security – Updated

Network Security – Updated

2 part

1. You have been hired by the Click-Rite Manufacturing Company as the newest associate in the cyber security division of the Information Technology Department. The Click-Rite Manf. Co. is the worlds sole producer of click-pen tops. All competing manufactures of click-pen tops had long ago folded due to the reduced use of paper and pen in the business market. Click-Rite products are still essential to the proper functioning of the business world and any interruptions in their manufacturing will have drastic impacts on financial markets around the world. Forbes Magazine recently declared that, “Click-Rite is the most important business that you have never heard of.” Management understands the importance of keeping Click-Rite operating at top efficiency and so have begun investing heavily in protecting their assets. The company does not advertise directly to the public, instead they sell to pen manufacturers who produce the consumer goods. Approximately 70% of all orders placed with the company take place through their customer web portal. There customers can check orders placed, track shipping information and communicate with their sales representatives. The remaining customers speak directly with their sales associate over the phone to place orders, and then with the Wharehouse to manage shipping and delivery dates. Building one house the main corporate offices and data center. Building two houses the manufacturing plant and wharehouse storage. Click-Rite’s entire manufacturing plant is fully automated and only requires a few machine operators to control the facility. There are two main machines that make all the parts: springs and buttons. One machine manufactures the spring that makes the “click” sounds and the other machine molds the button top from plastic. A master control computer organizes the interaction between the two fabrication machines and merges the two parts then packs them. Click-Rite produces 1.3 million click buttons in an average week. It has been estimated that these click buttons are used for 95% of all hand-written notes in the world. Click-Rite has hired you to assist in evaluating and improving their cyber security posture.

Your first assignment with the company is working on the Network Security Monitoring program. The company has only put in place some basic elements to monitor their network like recording firewall activity. Your first task is to perform an assessment of the situation and gather the information that you need. You have been provided with a network diagram of the existing infrastructure. The management is concerned about the cost to improve it’s cyber posture so you need to be conscious of this as you are working. In this step you are only gathering information, you will be providing recommendations later. Using no more than two pages describe the questions you need to ask and identify what information you need to gather. Clearly specify who you are going to gather each piece of information from. Attach your answer to this question.

Part 2

2. Your supervisor has distributed the questionnaires that you provided and has gathered the following information from the relevant parties. As you requested they have provided a rating from 1 to 5 on the impact or service disruption to the business if their data or system was compromised. The IT procurements division has also put together a spreadsheet of the available assets and the cost for new assets if materials need to be purchased. You now need to provide a comprehensive collection strategy recommendation to your supervisor. Each of the items that needs to be collected should be narrow in focus. It should be clear how each item addresses the threat it helps to mitigate. For example if you are going to have a particular server transmit its log files to a separate syslog server, it should be clear to your new boss why we need to store this same data in two places. Remember that your boss has hired you to be the expert, but he still understands technology. He has given you a target budget of $14,500 and a hard limit of $21,231. This is only the initial years budget and will be increased in future years, but it is all you have to work with for now.

Using no more than four pages provide a description of your proposed recommendation.

Identify any weaknesses in your recommendation and explain how your solution is the best balance between cost and coverage.

You should include an updated network diagram that shows where you may need to place additional equipment or label existing equipment with what information needs to be extracted from it. You will inevitably have more questions for each of the data owners on this project so that you can narrow your focus on what is truly important. Unfortunately, after responding to your questionnaire the entire company went on a 3-month corporate team building trip to the Australian outback and they cannot be reached at all. The management while departing have entrusted you to make the best decision available and to provide your justification or assumptions. If you absolutely can not make a particular critical decision without input from the management they have authorized you to send your question to the instructor who also happens to be an expert at Aboriginal Australian smoke signaling. Attach your answer file to this question and attach your updated network diagram to the next question. There are no more parts so make sure you include anything you think is relevant in your answer to this question.

"You need a similar assignment done from scratch? Our qualified writers will help you with a guaranteed AI-free & plagiarism-free A+ quality paper, Confidentiality, Timely delivery & Livechat/phone Support.


Discount Code: CIPD30



Click ORDER NOW..

order custom paper