Expert answer:2 part1. You have been hired by the Click-Rite Manufacturing Company as the newest associate in the cyber security division of the Information Technology Department. The Click-Rite Manf. Co. is the worlds sole producer of click-pen tops. All competing manufactures of click-pen tops had long ago folded due to the reduced use of paper and pen in the business market. Click-Rite products are still essential to the proper functioning of the business world and any interruptions in their manufacturing will have drastic impacts on financial markets around the world. Forbes Magazine recently declared that, “Click-Rite is the most important business that you have never heard of.” Management understands the importance of keeping Click-Rite operating at top efficiency and so have begun investing heavily in protecting their assets. The company does not advertise directly to the public, instead they sell to pen manufacturers who produce the consumer goods. Approximately 70% of all orders placed with the company take place through their customer web portal. There customers can check orders placed, track shipping information and communicate with their sales representatives. The remaining customers speak directly with their sales associate over the phone to place orders, and then with the Wharehouse to manage shipping and delivery dates. Building one house the main corporate offices and data center. Building two houses the manufacturing plant and wharehouse storage. Click-Rite’s entire manufacturing plant is fully automated and only requires a few machine operators to control the facility. There are two main machines that make all the parts: springs and buttons. One machine manufactures the spring that makes the “click” sounds and the other machine molds the button top from plastic. A master control computer organizes the interaction between the two fabrication machines and merges the two parts then packs them. Click-Rite produces 1.3 million click buttons in an average week. It has been estimated that these click buttons are used for 95% of all hand-written notes in the world. Click-Rite has hired you to assist in evaluating and improving their cyber security posture. Your first assignment with the company is working on the Network Security Monitoring program. The company has only put in place some basic elements to monitor their network like recording firewall activity. Your first task is to perform an assessment of the situation and gather the information that you need. You have been provided with a network diagram of the existing infrastructure. The management is concerned about the cost to improve it’s cyber posture so you need to be conscious of this as you are working. In this step you are only gathering information, you will be providing recommendations later. Using no more than two pages describe the questions you need to ask and identify what information you need to gather. Clearly specify who you are going to gather each piece of information from. Attach your answer to this question.Part 22. Your supervisor has distributed the questionnaires that you provided and has gathered the following information from the relevant parties. As you requested they have provided a rating from 1 to 5 on the impact or service disruption to the business if their data or system was compromised. The IT procurements division has also put together a spreadsheet of the available assets and the cost for new assets if materials need to be purchased. You now need to provide a comprehensive collection strategy recommendation to your supervisor. Each of the items that needs to be collected should be narrow in focus. It should be clear how each item addresses the threat it helps to mitigate. For example if you are going to have a particular server transmit its log files to a separate syslog server, it should be clear to your new boss why we need to store this same data in two places. Remember that your boss has hired you to be the expert, but he still understands technology. He has given you a target budget of $14,500 and a hard limit of $21,231. This is only the initial years budget and will be increased in future years, but it is all you have to work with for now. Using no more than four pages provide a description of your proposed recommendation. Identify any weaknesses in your recommendation and explain how your solution is the best balance between cost and coverage. You should include an updated network diagram that shows where you may need to place additional equipment or label existing equipment with what information needs to be extracted from it. You will inevitably have more questions for each of the data owners on this project so that you can narrow your focus on what is truly important. Unfortunately, after responding to your questionnaire the entire company went on a 3-month corporate team building trip to the Australian outback and they cannot be reached at all. The management while departing have entrusted you to make the best decision available and to provide your justification or assumptions. If you absolutely can not make a particular critical decision without input from the management they have authorized you to send your question to the instructor who also happens to be an expert at Aboriginal Australian smoke signaling. Attach your answer file to this question and attach your updated network diagram to the next question. There are no more parts so make sure you include anything you think is relevant in your answer to this question.
partonenetworkdiagram.pdf
final_it_costs.pdf
final_threat_listing.pdf
diagram_part_2.zip
Unformatted Attachment Preview
WWW
DNS
Administrators
Other Users
DMZ Switch
Mail
Transaction
Database
Building 1
Internal
Switch
Internal
Switch
Core
Switch
Internet
Internal
Switch
Internal
Switch
Firewall
Border
Router
Sales, Marketing and
Financial Office Suite
Executive
Offices
Wireless
Network
Internal
Switch
Core
Switch
SCADA
Master Control
Plastic Control
Button Spring
Control
Building 2
Machine
Operators
Internal
Switch
Inventory
Control
Internal
Switch
Wharehouse
Staff
Manufacturing
Staff
IT Equipment Pricing Index
Storage Server per 100GB of data
SPAN capable (Layer 3) switch
Simple (Layer 2) switch
General server, any application
Network Taps
Firewalls
Routers
Price
$380
$4,500
$1,100
$5,500
$350
$8,000
$5,275
Threat Assesment Survey Results
Threat
Disruption of e-commerce ordering service through denial of service attack
Loss of e-mail availability to communicate with customers
Theft of customer information and billing details – website compromise
Theft of customer contact information – email server compromise
Loss of inventory information and shipping orders – inventory application compromise
Disruption to manufacturing controls – internal asset compromise
Destruction of manufacturing equipment – SCADA control compromise
Loss of general Internet access (except e-commerce) – denial of service
Theft of corporate accounting information – phishing
Impact
Probability
3
2
4
2
5
5
5
2
5
2
3
4
3
4
3
4
4
4
…
Purchase answer to see full
attachment
You will get a plagiarism-free paper and you can get an originality report upon request.
All the personal information is confidential and we have 100% safe payment methods. We also guarantee good grades
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more