ISOL532 – Telecommunications and Network Security
Prepare a report to address all aspects of the case study/assignment. This report should be no less than 10 pages of content (not including title and reference pages). You need to include outside sources and properly cite and reference your sources. You must have at least 5 scholarly resources. This report needs to be in proper APA format.
The growth and explosion of the internet has led to a global market place. Companies can sell products all over the world and never have to leave the bounds of their physically secure location. With this move to a global economy we see an increase in security threats to organizations, individuals and agencies. All these models must have an information system to process, store, and retrieve information for their internal stakeholders, customers, and external users. Information systems have inherent risks and vulnerabilities to attacks from internal users, external customers, hackers and criminals. Organizations must have a robust security program in place to meet these attacks and be proactive in their security stance.
Your group has the responsibility of creating a robust security policy that covers all the needs of the organization. The security policy identifies administrative, physical, and technical controls that must be in place to identify security risks and develop mitigation strategies to minimize the effects of these risks. You will evaluate the IT infrastructure of Solomon Enterprises and its global business model.
Solomon Enterprises employees 500 people in five different locations throughout the domestic United States. Solomon Enterprises generates $200 million in annual revenue through its business model so they would be a huge target for hackers or criminals. Their business products can be purchased through an online web site. They have one central database/data center located in West Virginia and regional offices in Florida, Texas, Arizona, Montana, and Missouri. Customers, clients, and users have access via the Internet throughout the world. The company has a disaster recovery site located in Billings, Montana. Solomon Enterprises users can work remotely or within one of the regional offices. They have a VPN connection that ensures that their connection is encrypted. The central data center has a firewall and each regional office has a firewall to monitor traffic and keep unauthorized access from the facility. They have company issues devices located within the office and laptops that can be taken for remote access. All these devices are running Windows 7 and their server is running Windows Server 2016.
The goal of your group is to develop a plan that evaluates the current security posture of the organization of the company and what controls need to be put into place to safeguard their information. You only have the brief synopsis for guidance so if something is not identified either it is not being done or they do not have enough information to provide you. Use your text as the key source when determining what security controls need to be in place for your company. Ensure that you cover each component that we have discussed within our classroom videos in order to increase the security posture of your organization.
Minimum components that must be covered
Introduce your organization, security posture and business model
2. Administrative controls
i.e., Backgrounding employees/training employees/any agreements
3. Physical Controls
Physical protection of the facility
4. Technical Controls
i.e., firewall, IDPS, encryption, etc.
5. Security PoliciesWhat security policies will need to be built into your company’s overall existing security program to ensure that data is safeguarded?
6. Legislation/RegulationsHow do legislation and regulations affect and govern your company? Identify at least one federal legislative component and one regulation that could impact your company.
7. Network Security ToolsWhat tools are instrumental in monitoring, detecting, and alerting your company when an someone is trying to gain unauthorized access to your organizations network?
Paper formatting requirements
Your paper must be submitted as a Microsoft Word document with double spacing, 12-point Times New Roman font, and one-inch margins. You should have at least 10 pages, not including Title and Reference pages. Please include appropriate diagrams and images for your network security plan. All academic sources must be cited using the latest APA guidelines. Section and Sub-section headings should be used throughout the paper. Please review APA guidelines here: https://owl.english.purdue.edu/owl/resource/560/01/ for reference.
· For in-text citations, the citation needs to go inside the end of the sentence. For example: This is my sentence on APA formatting (APA, 2016).
· For references, this list should start on a new page at the end of your document with a hanging indent (the title of the page should be References). You do not need to include the retrieved date. Here are some examples:
Smyth, A. M., Parker, A. L., & Pease, D. L. (2002). A study of enjoyment of peas. Journal of Abnormal Eating, 8(3), 120-125. Retrieved from http://www.articlehomepage.com/full/url/
Bernstein, M. (2002). 10 tips on writing the living Web. A List Apart: For People Who Make Websites, 149. Retrieved from http://www.alistapart.com/articles/writeliving
De Huff, E. W. (n.d.). Taytay’s tales: Traditional Pueblo Indian tales. University of Pennsylvania. Retrieved from http://digital.library.upenn.edu/women/dehuff/taytay/taytay.html
· Start your paragraph with an indent (tab).
· Use section and sub-section headings
We value our customers and so we ensure that what we do is 100% original..
With us you are guaranteed of quality work done by our qualified experts.Your information and everything that you do with us is kept completely confidential.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.Read more
The Product ordered is guaranteed to be original. Orders are checked by the most advanced anti-plagiarism software in the market to assure that the Product is 100% original. The Company has a zero tolerance policy for plagiarism.Read more
The Free Revision policy is a courtesy service that the Company provides to help ensure Customer’s total satisfaction with the completed Order. To receive free revision the Company requires that the Customer provide the request within fourteen (14) days from the first completion date and within a period of thirty (30) days for dissertations.Read more
The Company is committed to protect the privacy of the Customer and it will never resell or share any of Customer’s personal information, including credit card data, with any third party. All the online transactions are processed through the secure and reliable online payment systems.Read more
By placing an order with us, you agree to the service we provide. We will endear to do all that it takes to deliver a comprehensive paper as per your requirements. We also count on your cooperation to ensure that we deliver on this mandate.Read more