Expert answer:Network Security – Updated

Expert answer:2 part1. You have been hired by the Click-Rite Manufacturing Company as the newest associate in the cyber security division of the Information Technology Department. The Click-Rite Manf. Co. is the worlds sole producer of click-pen tops. All competing manufactures of click-pen tops had long ago folded due to the reduced use of paper and pen in the business market. Click-Rite products are still essential to the proper functioning of the business world and any interruptions in their manufacturing will have drastic impacts on financial markets around the world. Forbes Magazine recently declared that, “Click-Rite is the most important business that you have never heard of.” Management understands the importance of keeping Click-Rite operating at top efficiency and so have begun investing heavily in protecting their assets. The company does not advertise directly to the public, instead they sell to pen manufacturers who produce the consumer goods. Approximately 70% of all orders placed with the company take place through their customer web portal. There customers can check orders placed, track shipping information and communicate with their sales representatives. The remaining customers speak directly with their sales associate over the phone to place orders, and then with the Wharehouse to manage shipping and delivery dates. Building one house the main corporate offices and data center. Building two houses the manufacturing plant and wharehouse storage. Click-Rite’s entire manufacturing plant is fully automated and only requires a few machine operators to control the facility. There are two main machines that make all the parts: springs and buttons. One machine manufactures the spring that makes the “click” sounds and the other machine molds the button top from plastic. A master control computer organizes the interaction between the two fabrication machines and merges the two parts then packs them. Click-Rite produces 1.3 million click buttons in an average week. It has been estimated that these click buttons are used for 95% of all hand-written notes in the world. Click-Rite has hired you to assist in evaluating and improving their cyber security posture. Your first assignment with the company is working on the Network Security Monitoring program. The company has only put in place some basic elements to monitor their network like recording firewall activity. Your first task is to perform an assessment of the situation and gather the information that you need. You have been provided with a network diagram of the existing infrastructure. The management is concerned about the cost to improve it’s cyber posture so you need to be conscious of this as you are working. In this step you are only gathering information, you will be providing recommendations later. Using no more than two pages describe the questions you need to ask and identify what information you need to gather. Clearly specify who you are going to gather each piece of information from. Attach your answer to this question.Part 22. Your supervisor has distributed the questionnaires that you provided and has gathered the following information from the relevant parties. As you requested they have provided a rating from 1 to 5 on the impact or service disruption to the business if their data or system was compromised. The IT procurements division has also put together a spreadsheet of the available assets and the cost for new assets if materials need to be purchased. You now need to provide a comprehensive collection strategy recommendation to your supervisor. Each of the items that needs to be collected should be narrow in focus. It should be clear how each item addresses the threat it helps to mitigate. For example if you are going to have a particular server transmit its log files to a separate syslog server, it should be clear to your new boss why we need to store this same data in two places. Remember that your boss has hired you to be the expert, but he still understands technology. He has given you a target budget of $14,500 and a hard limit of $21,231. This is only the initial years budget and will be increased in future years, but it is all you have to work with for now. Using no more than four pages provide a description of your proposed recommendation. Identify any weaknesses in your recommendation and explain how your solution is the best balance between cost and coverage. You should include an updated network diagram that shows where you may need to place additional equipment or label existing equipment with what information needs to be extracted from it. You will inevitably have more questions for each of the data owners on this project so that you can narrow your focus on what is truly important. Unfortunately, after responding to your questionnaire the entire company went on a 3-month corporate team building trip to the Australian outback and they cannot be reached at all. The management while departing have entrusted you to make the best decision available and to provide your justification or assumptions. If you absolutely can not make a particular critical decision without input from the management they have authorized you to send your question to the instructor who also happens to be an expert at Aboriginal Australian smoke signaling. Attach your answer file to this question and attach your updated network diagram to the next question. There are no more parts so make sure you include anything you think is relevant in your answer to this question.
partonenetworkdiagram.pdf

final_it_costs.pdf

final_threat_listing.pdf

diagram_part_2.zip

Unformatted Attachment Preview

WWW
DNS
Administrators
Other Users
DMZ Switch
Mail
Transaction
Database
Building 1
Internal
Switch
Internal
Switch
Core
Switch
Internet
Internal
Switch
Internal
Switch
Firewall
Border
Router
Sales, Marketing and
Financial Office Suite
Executive
Offices
Wireless
Network
Internal
Switch
Core
Switch
SCADA
Master Control
Plastic Control
Button Spring
Control
Building 2
Machine
Operators
Internal
Switch
Inventory
Control
Internal
Switch
Wharehouse
Staff
Manufacturing
Staff
IT Equipment Pricing Index
Storage Server per 100GB of data
SPAN capable (Layer 3) switch
Simple (Layer 2) switch
General server, any application
Network Taps
Firewalls
Routers
Price
$380
$4,500
$1,100
$5,500
$350
$8,000
$5,275
Threat Assesment Survey Results
Threat
Disruption of e-commerce ordering service through denial of service attack
Loss of e-mail availability to communicate with customers
Theft of customer information and billing details – website compromise
Theft of customer contact information – email server compromise
Loss of inventory information and shipping orders – inventory application compromise
Disruption to manufacturing controls – internal asset compromise
Destruction of manufacturing equipment – SCADA control compromise
Loss of general Internet access (except e-commerce) – denial of service
Theft of corporate accounting information – phishing
Impact
Probability
3
2
4
2
5
5
5
2
5
2
3
4
3
4
3
4
4
4

Purchase answer to see full
attachment

How it works

  1. Paste your instructions in the instructions box. You can also attach an instructions file
  2. Select the writer category, deadline, education level and review the instructions 
  3. Make a payment for the order to be assignment to a writer
  4.  Download the paper after the writer uploads it 

Will the writer plagiarize my essay?

You will get a plagiarism-free paper and you can get an originality report upon request.

Is this service safe?

All the personal information is confidential and we have 100% safe payment methods. We also guarantee good grades

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more

Order your essay today and save 20% with the discount code ESSAYHELP