All our Essay orders are Original, and are written from scratch. Try us today at 30% off

Assignment & discussion Week 2 Cyber Defence and Countermeasures/cf_anchor_hosp_scenario.docx IT4070 Anchor Hospital Scenario You are a netw

Want answers to the assignment Below?

Text or Whatsapp Olivia at +1 (307) 209-4351


 

Assignment & discussion

Week 2 Cyber Defence and Countermeasures/cf_anchor_hosp_scenario.docx

IT4070

Anchor Hospital Scenario
You are a network specialist hired by Anchor Hospital to address network infrastructure vulnerabilities. Your initial work is broad and expected to encompass the following:

Understanding the network.
Firewalls.
Physical security.
Cloud solutions.
Intrusion detection.
VPN solutions.
Incident response and countermeasures.
Policy and regulatory issues.
Network exposure assessment and control.
Company Information
Anchor Hospital is a small independent care facility in a stand-alone building that houses its IT staff and assets in the basement. The IT infrastructure and staff of six serve 1,200 employees and other users.
Physical Security
The hospital is on a 10-acre campus in an urban neighborhood. Its IT-related physical security consists of:
A contracted security firm, which supplies two 24/7 guards: one of whom conducts hourly foot patrols, and the second who monitors cameras and performs additional security-related functions.
High-definition cameras that record continuously, located at all points of building entry and sensitive access points including the server room.
Three locked data-center doors requiring key card access that records all traffic. All staff have access cards for their respective departments; only IT staff, janitors, and upper management have access to the IT facility.
IT Overview
Network
Hospital connected to the Internet.
Network segmented into virtual LANs for medical data, IT, and finance user groups.
Hardware
Windows 2008 domain servers: email, file/print, data servers.
Routers connect switches to VLANs.
Switches connect desktops and servers to network.
Web server located in the DMZ.
100 antimalware-protected Windows XP workstations with Internet access.
Wireless access point.
Software
Windows firewall on a workstation at the edge of the network.
SNORT intrusion detection system (IDS), located in front of the Windows firewall.
MS Office installed on workstations.
Enterprise-level proprietary medical software.
Oracle Enterprise Resource Planning (ERP) software.
2017 version of free AVG Antivirus.
1
2

Week 2 Cyber Defence and Countermeasures/cf_asst_template.docx

Remove or Replace: Header Is Not Doc Title

Assignment Template

Learner Name:

Lab Screenshots and Narrative
Insert and title all lab screenshots in the order they were taken. Briefly describe what you learned or observed in the lab below each screenshot. Be specific.

[Screenshot section, Step #]

[Screenshot section, Step #]

[Screenshot section, Step #]

[Screenshot section, Step #]

[Add as necessary]

Assignment
[Add your assignment responses here.]
1
2

Week 2 Cyber Defence and Countermeasures/Cyber Defence- Week 2.docx
Discussion 1 page
Firewall Change Control Process
Imagine you finally have your new firewall up and running. After much consultationwith users, its governing rules are in place and functioning properly. However, you receive two requests for changes in the firewall during the first week:
1. The head of marketing would like the local newspaper to havedaily network access to downloademployment ads from the marketing file server.
2. The firewall has broken the head of research and development’s connection to a favorite website. He wants his access back and has asked for your help.
Discuss how you would respond to these requests. What kinds of procedures are needed to ensure that proper requests are implemented and inappropriate requests are denied?

Assignment
Selecting, Positioning, and Configuring a Firewall

Overview

As we have discussed, firewalls can be software or hardware based, and each has its pros and cons. In this assignment you identify an appropriate position for a hardware-based firewall on the Anchor Hospital network and explain why it was chosen to replace Windows Firewall.

Preparation

Make sure you have completed the unit lab and saved your screenshots before beginning work on the assignment.
Review theAnchor HospitalScenario (linked in Resources)as needed.
Refer to theCreate a Network Diagram tutorial (linked in Resources) as needed.

Instructions

Populate the Lab Template (linked in Resources)with your screenshots and describe briefly but specificallywhat you learned from or observed in the lab.
Currently the Anchor Hospital network usesWindows Firewall. A decision has been made to switch to a hardware firewall solution. Complete the following:
Position the new hardware for maximum effectiveness in the Anchor network to reflect the positioning.Explain your reasoning for its placement and update your network diagram from the Unit 1 assignment.
. Note:Make sure you have responded to any instructor feedback on your diagram so you are working with an accurate and appropriate diagram.
Suggest threeplausible reasons whyAnchor Hospital might switch to a hardware-based solution from Windows Firewall.
. Explain how the change may enhance network security.

Additional Requirements

Includeyour updated diagram and lab screenshots in the template as specified.
Label your document clearly.
Use an appropriate typeface and size, such as Times New Roman, 12 points, for body copy. Use double-spacing.
Apply current APA style and formatting as appropriate. Operating Sys & App Security – Week 2/Operating Sys & App Security – Week 2.docx
Discussion 1 – 1 page
Characteristics of Access Control and Authentication
Most IT and IAS professionals are familiar with the basic concepts surrounding authentication and access control systems. There are fewer professionals who have taken the time to consider the more granular characteristics of these controls and the options that are available for differentiation, selection, and implementation.
Use the study materials and engage in any additional research needed to fill in knowledge gaps. Discuss the following:
Describe the combination of authentication and access controls that you believe best balance cost, complexity, and security. Support your position.
Explain how domain trusts, isolation technologies, and the separation and organization of those technologies can support a network security strategy.
Describe an example of how encapsulation or encryption contribute to a specific access control or authentication solution.

Assignment 1 – 2 pages
Access Control and Authentication Methods and Models
Instructions
Access controls and authentication systems are some of the most ubiquitous of all information security controls. Too often these controls still hinge on poorly implemented and managed password strategies. However, there is a wide array of technologies and tools available to organizations seeking to secure their information assets. As governments create more regulations and organizations experience larger and more widely publicized breaches of personal data, these organizations may more frequently turn to additional layers of controls to supplement traditional access and authentication strategies.
Use the study materials and engage in any additional research needed to fill in knowledge gaps. Write a 23 page paper that covers the following topics:
Describe your lab experiences related to access controlsand authentication systems available for use in organizations to protect information assets.
Analyze the security characteristics of commonly used file systems.
Explain how access control lists play a role in a layered network security strategy.
Explain the security benefits available through domain separation, process isolation, resource encapsulation, and least privilege.
At the end of your paper, also include lab screenshots from u01v1 and u02v1.
Additional Requirements
Your assignment should also meet the following requirements:
Written communication:Written communication is free of errors that detract from the overall message.
APA formatting:Your paper should demonstrate current APA style and formatting.
Number of resources:Include a minimum of threeresources, appropriately cited throughout your paper and in your reference list.
Suggested length:23 pages, typed and double-spaced, not including the title page and reference list.
Font and font size:Times New Roman, 12 point.

Testimonials

Mh! not bad…

The worst part ever was to find my deadline postponed for 1 hour ! They couldn`t finish the essay within...

Best

They look cool and trustworthy enough to me. I gather they made discounts as their prices are quite affordable if...

Great Job

Great job! Those were you, guys, who made my coursework perfect in time according to all my requirements. I will...

Comes through every time

I have used this website for many times, and each time they found perfect writers for me and they produce...

No Complaints So far Guys

Yeah …I really like all the discounts that they offer, the prices are very flexible. Plus they have different promotions...

Best Service

The book review I asked for is so amazing! Endless thanks to your team for completing my review and for...

CLICK HERE  To order your paper

About Scholarfront Essay writing service

We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.

How It Works

To make an Order you only need to click on “Order Now” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Are there Discounts?

All new clients are eligible for upto 20% off in their first Order. Our payment method is safe and secure.

 CLICK HERE to Order Your Assignment

 

ORDER WITH 15% DISCOUNT

Let your paper be done by an expert

Custom Essay Writing Service

Our custom essay writing service has already gained a positive reputation in this business field. Understandably so, all custom papers produced by our academic writers are individually crafted from scratch and written according to all your instructions and requirements. We offer Havard, APA, MLA, or Chicago style papers in more than 70 disciplines. With our writing service, you can get quality custom essays, as well as a dissertation, a research paper, or term papers for an affordable price. Any paper will be written on time for a cheap price.

Professional Essay writing service

When professional help in completing any kind of homework is all you need, scholarfront.com is the right place to get it. We guarantee you help in all kinds of academia, including essay, coursework, research, or term paper help etc., it is no problem for us. With our cheap essay writing service, you can be sure to get credible academic aid for a reasonable price, as the name of our website suggests. For years, we have been providing online custom writing assistance to students from countries all over the world, including the United States, Canada, the United Kingdom, Australia, Italy, New Zealand, China, and Japan.