Global Finance, Inc. Network Diagram Essay Sample

Above is the Global Finance. Inc. ( GFI ) web diagram. GFI has grown quickly this past twelvemonth and acquired many web devices as displayed in the diagram. The company invested in the web and designed it to be fault tolerant and resilient from any web failures. However. although the company’s fiscal position has matured and its web has expanded at a rapid gait. its web security has non kept up with the company growing.

GFI’s web is reasonably stabilized as it has non experienced many outages due to web failures. GFI has hired three ( 3 ) web applied scientists to maintain up with the web growing and the bandwidth demand by the company employees and the clients. However. the company has non hired any security forces who can take attention of the operational security duty.

The sure computer science base ( TCB ) internal web in the Global Finance. Inc. Network Diagram hosts the company’s mission critical systems without which the company’s operations and fiscal state of affairs would endure. The Oracle database and email systems are among the most intensively used application waiters in the company. GFI can non afford system outages because its hard currency flow and fiscal systems to a great extent depend on the web stableness. GFI has experienced DOS web onslaughts twice this twelvemonth and its Oracle database and electronic mail waiters had been down for a hebdomad. The recovery procedure required GFI to utilize $ 25. 000 to reconstruct its operations back to normal. GFI estimated the loss from these web onslaughts at more than $ 100. 000 including lost client assurance.

Write a 12 to fifteen ( 12-15 ) page formal hazard appraisal proposal and redraw the above diagram of a secure and risk-mitigating theoretical account in which you: 1. Describe the company web. interconnectedness. and communicating environment. 2. Assess hazard based on the Global Finance. Inc. Network Diagram scenario. Note: Your hazard appraisal should cover all the necessary inside informations for your client. GFI Inc. . to understand the hazard factors of the organisation and hazard position of the current environment. The company direction will make up one’s mind what to extenuate based on your hazard appraisal. Your hazard appraisal must be comprehensive for the organisation to do data-driven determinations. a. Describe and support your premises as there is no farther information from this company.

ALSO READ  Physical security in federal reserve Essay Sample

The company does non wish to let go of any security-related information per company policy. b. Assess security exposures. including the possibility of defective web design. and urge extenuation processs for each exposure. c. Justify your cryptanalysis recommendations based on data-driven determination devising and nonsubjective sentiments. 3. Analyze whether your hazard appraisal methodological analysis is quantitative. qualitative. intercrossed. or a combination of these. 4. Use at least three ( 3 ) quality resources in this assignment. Note: Wikipedia and similar Web sites do non measure up as choice resources. 5. Make the redrawn diagram of a secure and risk-mitigating theoretical account utilizing Microsoft Visio or its unfastened beginning equivalent. Note: The diagrammatically pictured solution is non included in the needed page length.

Your assignment must follow these data format demands:
Be typed. dual spaced. utilizing Times New Roman fount ( size 12 ) . with one-inch borders on all sides ; commendations and mentions must follow APA or school-specific format. Check with your professor for any extra instructions. Include a cover page incorporating the rubric of the assignment. the student’s name. the professor’s name. the class rubric. and the day of the month. The screen page and the mention page are non included in the needed assignment page length. Include charts or diagrams created in Excel. Visio. MS Project. or one of their equivalents such as Open Project. Dia. and OpenOffice. The completed diagrams/charts must be imported into the Word papers before the paper is submitted.

The specific class larning results associated with this assignment are: Evaluate an organization’s security policies and hazard direction processs. and its ability to supply security countermeasures. Describe the inside informations and the importance of application security theoretical accounts and their execution from a direction position. Analyze the methods of pull offing. commanding. and extenuating security hazards and exposures. Evaluate and explain from a direction position the industry-standard equipment. tools. and
engineerings organisations can use to extenuate hazards and queer both internal and external onslaughts. Explain entree control methods and onslaughts.

ALSO READ  Move and Position Individuals In Accordance with their Plan Of Care Essay Sample

Use engineering and information resources to research issues in security direction. Write clearly and briefly about the theories of security direction utilizing proper composing mechanics and proficient manner conventions.

Rating for this assignment will be based on answer quality. logic / organisation of the paper. and linguistic communication and composing accomplishments. utilizing the undermentioned rubric. Points: 150
Technical Paper: Hazard Appraisal
Standards
Unacceptable
Below 70 % F
Carnival
70-79 % C
Proficient
80-89 % B
Exemplary
90-100 % Angstrom
1. Describe the company web. interconnectedness. and communicating environment. Weight: 25 %
Did non subject or incompletely described the company web. interconnectedness. and communicating environment. Partially described the company web. interconnectedness. and communicating environment. Satisfactorily described the company web. interconnectedness. and communicating environment. Thoroughly described the company web. interconnectedness. and communicating environment. 2a. Describe and support your premises as there is no farther information from this company. Weight: 5 %

Did non subject or incompletely described and defended your premises as there is no farther information from this company. Partially described and defended your premises as there is no farther information from this company. Satisfactorily described and defended your premises as there is no farther information from this company. Thoroughly described and defended your premises as there is no farther information from this company. 2b. Assess security exposures. including the possibility of defective web design. and urge extenuation processs for each exposure. Weight: 5 %

Did non subject or incompletely assessed security exposures. including the possibility of defective web design ; did non subject or incompletely recommended extenuation processs for each exposure. Partially assessed security exposures. including the possibility of defective web design ; partly recommended extenuation processs for each exposure. Satisfactorily assessed security exposures. including the possibility of defective web design ; satisfactorily recommended extenuation processs for each exposure. Thoroughly assessed security exposures. including the possibility of defective web design ; exhaustively recommended extenuation processs for each exposure. 2c. Justify your cryptanalysis recommendations based on data-driven determination devising and nonsubjective sentiments. Weight: 5 %

ALSO READ  Promote person centred approaches in health and social care Essay Sample

Did non subject or incompletely justified your cryptanalysis recommendations based on data-driven determination devising and nonsubjective sentiments. Partially justified your cryptanalysis recommendations based on data-driven determination devising and nonsubjective sentiments. Satisfactorily justified your cryptanalysis recommendations based on data-driven determination devising and nonsubjective sentiments. Thoroughly justified your cryptanalysis recommendations based on data-driven determination devising and nonsubjective sentiments. 3. Analyze whether your hazard appraisal methodological analysis is quantitative. qualitative. intercrossed. or a combination of these. Weight: 20 %

Did non subject or incompletely examined whether your hazard appraisal methodological analysis is quantitative. qualitative. intercrossed. or a combination of these. Partially examined whether your hazard appraisal methodological analysis is quantitative. qualitative. intercrossed. or a combination of these. Satisfactorily examined whether your hazard appraisal methodological analysis is quantitative. qualitative. intercrossed. or a combination of these. Thoroughly examined whether your hazard appraisal methodological analysis is quantitative. qualitative. intercrossed. or a combination of these. 4. 3 mentions

Weight: 5 %
No mentions provided
Does non run into the needed figure of mentions ; some or all mentions hapless quality picks. Meets figure of needed mentions ; all mentions high quality picks. Exceeds figure of needed mentions ; all mentions high quality picks. 5. Clarity. composing mechanics. and formatting demands

Weight: 10 %
More than 6 mistakes present
5-6 mistakes present
3-4 mistakes present
1. 2 mistakes present
6. Make the redrawn diagram of a secure and risk-mitigating theoretical account utilizing Microsoft Visio or its unfastened beginning equivalent. Weight: 25 %
Did non subject or incompletely created the redrawn diagram of a secure and risk-mitigating theoretical account utilizing Microsoft Visio or its unfastened beginning equivalent. Partially created the redrawn diagram of a secure and risk- mitigating theoretical account utilizing Microsoft Visio or its unfastened beginning equivalent. Satisfactorily created the redrawn diagram of a secure and risk- mitigating theoretical account utilizing Microsoft Visio or its unfastened beginning equivalent. Thoroughly created the redrawn diagram of a secure and risk- mitigating theoretical account utilizing Microsoft Visio or its unfastened beginning equivalent.