1 / 6

CIS 534 Exciting Results / snaptutorial.com

<br>u2022 Interacting and communicating with other people is part of daily life. This includes face-to-face conversations, conversations over the phone or other mobile devices, and conversations through social media. Read the article titled, u201cIs social media ruining our kidsu2019 social skills?u201d Provide your opinion on the effect that texting and social media (i.e., Twitter, Snap Chat, Facebook, etc.) are having on individualsu2019 abilities

Télécharger la présentation

CIS 534 Exciting Results / snaptutorial.com

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CIS 534 Week 3 Case Study The Ethical Hacker For more classes visit www.snaptutorial.com Case Study: The Ethical Hacker Due Week 3 and worth 70 points Imagine for a moment that you are a hacker; an ethical one. You are called upon by law enforcement based on your expertise to hack into a network of a business known to be launching crimes against humanity as its primary mission for operation and capital gain. Assume you are not to be concerned with any politics of the job and your actions are legal and ethically justified. This nefarious business takes its own security seriously and therefore has implemented several forms of network security such as firewalls, Web proxies for its Web gateways, and VPNs for remote users. You also know that this business exists much like any normal corporation, renting several floors of office space to accommodate between 100-200 employees. Also imagine that the business’s entire network topology is located in that same location. Your goal is to infiltrate the security enough to find evidence included in the local MSQL database. You need to remain anonymous and operate within the reasonable parameters of the law. Write a four to five (4-5) page paper in which you: 1.Explain your method of attack and operation within reasonable parameters of the law. 2.Discuss specific malware, social engineer, or any other type of attacks you would deploy to achieve your desired goals. 3.Assess the hurdles you expect and how you plan to overcome

  2. associated ethical issues in addressing exploits. Use technology and information resources to research issues in network security design. Write clearly and concisely about Advanced Network Security Design topics using proper writing mechanics and technical style conventions.  *************************************** CIS 534 Week 4 Assignment 1 Defense in Depth For more classes visit www.snaptutorial.com Assignment 1: Defense in Depth Due Week 4 and worth 70 points Oftentimes, the process of implementing security opens one’s eyes to other forms of security they hadn’t thought of previously. Well, in this assignment you should experience just that. This assignment focuses on a model of implementing security in layers which in many cases requires a network that is designed accordingly. In this assignment, you are to design a network to incorporate the following: Corporate Site (Chicago) All servers exist here (Web server, file server, print server, mail server, ftp server) Connection to the Internet (50mbps) 300 employees who only need access to local corporate resources and the Internet

  3. 1 Remote Site (8 miles away) 20 employees who need access to all resources at corporate plus the Internet Connection to the Internet (3mbps) Write a four to five (4-5) page paper in which you: 1.Using Microsoft Visio or its open source alternative, design a network diagram, particularly with defense in depth in mind which depicts: 1.All network devices used (routers, switches, hubs, firewalls, VPNs, proxies, and / or others) 2.The interconnections between network devices 3.The end user (client) devices (desktops, laptops) 4.The Internet cloud, generically, to represent your network’s *************************************** CIS 534 Week 8 Assignment 2 Mister Network Engineer For more classes visit www.snaptutorial.com Assignment 2: Mister Network Engineer Due Week 8 and worth 70 points Using the network diagram below, your task is to incorporate the devices on the lower right into the diagram to create a secure corporate network. The devices you need to incorporate into the network diagram include: Web server, ftp server, vulnerability scanner, anti-virus server

  4. (client-based / server-based), Web proxy, intrusion detection system (IDS), and authentication server. Note: All client-based / server-based devices work where a client is installed on a workstation, which has bidirectional communication with a corresponding server. Write a four to five (4-5) page paper in which you: 1.Determine which devices you will use for both the current network diagram infrastructure consisting of firewalls, routers, and workstations as well as the device you need to incorporate. Include the following for each: 1.Make or vendor’s name (e.g., Microsoft, Redhat, Cisco, Juniper, Netgear, 3Com, etc.) 2.Model (e.g., Windows 7, ASA 5500, Cisco 3500, Squid, etc.) 3.IP address assigned to all devices paper is submitted. The specific course learning outcomes associated with this assignment are: Design a secure network to address a business problem. Use technology and information resources to research issues in network security design. Write clearly and concisely about Advanced Network Security Design topics using proper writing mechanics and technical style conventions.    *************************************** CIS 534 Week 10 Term Paper Project: Designing a Secure Network

  5. For more classes visit www.snaptutorial.com Term Paper Project: Designing a Secure Network Due Week 10 and worth 190 points This term paper involves putting together the various concepts learned throughout this course. You are tasked with designing the most secure network possible, keeping in mind your goal of supporting three (3) IT services: email, file transfer (centralized), and VPN. Your first step is to design a single network capable of supporting there three (3) different services. Once you have fully designed your network, you will need to provide three (3) workflow diagrams explaining how your designed network handles the three (3) different transactions. The first is an internal user sending an email using his / her corporate email address to a user on the Yahoo domain with an arbitrary address of user534@yahoo.com. The second workflow diagram should show a user initiating an FTP session security tools and discuss techniques for network protection Describe the foundational concepts of VPNs. Design a secure network to address a business problem. Use technology and information resources to research issues in network security design. Write clearly and concisely about Advanced Network Security Design topics using proper writing mechanics and technical style conventions.

  6. ***************************************

More Related