Your company, Aegis, Inc. is a security training firm specializing in state and
ID: 3822237 • Letter: Y
Question
Your company, Aegis, Inc. is a security training firm specializing in state and federal government clients including the militaries from different countries. While in the past it has primarily focused on physical security, it has recently branched out to cybersecurity and outgr s current classroom environments. t has decided to move the cybersecurity training center to a new facility in Bethesda, Maryland. This new facility will provide live classroom experiences but these will be recorded for later viewing for their online clientele. The recordings and web-streaming server will be located in the new Bethesda site but all only data will be backed-up to the "war Disaster Recovery site in Cumberland, Maryland which is maintained by an outside disaster recovery company. The new building is 3 floors in height and has approximately 150,000 square feet. As the senior CISSP, you have been tasked with designing the network solution with both functionality and usability in mind for the new location
Further specifications company requirements 1. The new site (Bethesda, MD s the only one you need to concern yourself with designing as the warm site (Cumberland MD) is managed by an outside disaster recovery company There needs to be a constant connection between the two sites with no less than 50 Mbps throughput be additional 100 Mbps capacity for external connections for web streaming There should There will be a datacenter on the third floor 5. There will be 100 network connections on each floor r instructors and the 6. Each floor will have classrooms although the first floor will have offices fo third floor will have offices for the IT department, Equipment storage and administrative staff The online students must connect securely 8. Physical security as well as logical must be considered both for the building and for the servers 9. There are file servers, database servers, and web servers and all must have high-availability 10. All servers must have redundancy (both physical and how they are configured) 11. The solution should have a plan to verify security measures.
Case requirements
1. You should submit network drawings showing a. the topology of the network b. the topology of the VPN setup hey should include the hardware (and be labeled as such) but only generally no brand names or models, just "switch", firewall", router", "server" and so on; any cabling differences should be noted as we
2. You should include a paper that contains the following
a). List recommended cable and where it will be used any he required connection between sites
b). List the type of connection you wi utilize to ensure do not just give a medium, like fiber or copper, or just a protocol
c). Recommend wiring closets wherever needed.
d). Recommed any WAN or wireless technologies; mentioned and explain what apologies you used and why; explain how they are secured.
e). How you will set up the servers (both physical and logical should be explained) to have: (i). redundancy (ii). high-availability.
f). What logical protections you recommend (i). What measures you will take to protect against attack. (ii). What measures you will take to prevent attacks. (iii). What measures you will take to be notified that you attackers.
g). Recoomond and describe logical (i.e network) traps to stop attackers
h). Any physical security measures you deem appropriate (i). What they are (ii). Where they are (iii). How they protect
I). How the remote users will connect securely
J). How will security measures be verified?
K). Justify your reccomendations.
Explanation / Answer
Computer security, additionally called cybersecurity or IT security, is that the protection of knowledge systems from thieving or harm to the hardware, the package, and to the knowledge on them, moreover as from disruption or misdirection of the services they supply.[1]
It includes dominant physical access to the hardware, moreover as protective against damage that will come back via network access, information and code injection,[2] and thanks to malpractice by operators, whether or not intentional, accidental, or thanks to them being tricked into deviating from secure procedures.[3]
The field is of growing importance thanks to the increasing reliance on laptop systems and therefore the web in most societies,[4] wireless networks like Bluetooth and Wi-Fi - and therefore the growth of "smart" devices, as well as smartphones, televisions and small devices as a part of the net of Things.
A vulnerability may be a system susceptibleness or flaw. several vulnerabilities ar documented within the Common Vulnerabilities and Exposures (CVE) information. AN exploitable vulnerability is one that a minimum of one operating attack or "exploit" exists.[5]
To secure a automatic data processing system, it's vital to know the attacks that may be created against it, and these threats will generally be classified into one among the classes below:
Backdoors[edit]
A backdoor in an exceedingly automatic data processing system, a cryptosystem or AN algorithmic rule, is any secret methodology of bypassing traditional authentication or security controls. they will exist for variety of reasons, as well as by original style or from poor configuration. they will are accessorial by a licensed party to permit some legitimate access, or by AN assailant for malicious reasons; however notwithstanding the motives for his or her existence, they produce a vulnerability.
Denial-of-service attack[edit]
Denial of service attacks ar designed to create a machine or network resource unavailable to its supposed users.[6] Attackers will deny service to individual victims, like by deliberately coming into a wrong countersign enough consecutive times to cause the victim account to be fast, or they will overload the capabilities of a machine or network and block all users directly. whereas a network attack from one IP address may be blocked by adding a brand new firewall rule, several sorts of Distributed denial of service (DDoS) attacks ar doable, wherever the attack comes from an outsized variety of points – and defensive is far harder. Such attacks will originate from the zombie computers of a botnet, however a spread of alternative techniques ar doable as well as reflection and amplification attacks, wherever innocent systems ar fooled into causing traffic to the victim.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.