Question

In: Computer Science

Assume that you are working as IT Security section in a company called Xybocin Corp. You company 6M has 150 employees in three departments which are ENG, BUSS and MAN.


1 Assume that you are working as IT Security section in a company called Xybocin Corp. You company 6M has 150 employees in three departments which are ENG, BUSS and MAN. The company had no firewall to secure its network and the entire company is in one LAN and connected directly to Internet. However Xybocin Corp has one application proxy for SMTP and another Server that has all the customer financial data of Xybocin Corp. The Server is managed by MAN department. 

You have to create a proposal to submit in front of Xybocin Corp management for purchasing four hew firewalls with 18000 OMR. In the proposal you have to design/draw the new network architecture for the company for improving security with firewalls. Mention the advantages of each design components and its importance in improving security of the company. Also, if possible in your design give higher level of security to MAN department and highest level of security to the server with available firewalls. 

2 Mention why users are considered as weakest link in computer security with a relevant example, How you can solve this problem? 

3 Mention the importance of auditability in evaluating firewall products. Give an example. 

Solutions

Expert Solution

Solution 1: Not sure about this question.

Solution 2: Whenever a system is designed it is designed by keeping in mind that it is going to be used by a naive user who doesn't have much knowledge about the functioning of the system and hence it has a higher level of abstraction. Now, since the user is naive hence it is expected that he will make some mistakes while accessing the system. Some such mistakes include trying to access the parts of the application that he/she is not supposed to access, misusing the privileges that he/she is granted with. All these possibilities have to be considered while designing the system in order to cope up with any possible security breach due to any such activities. In order to prevent the system from falling prey to these breaches, the system has to be designed with a very high level of abstraction so that only those who are granted the privileges can only access the system that too with proper authentication. This can be made sure by implementing security concepts such as defense-in-depth, etc while designing the security system of the application.

Solution 2: Just like any other system, a firewall is a system that also requires timely maintenance to ensure the proper security of the computer system. This task is performed by the firewall analyzer that in the end generates a security report that can be used for the auditing of the firewall. It is a kind of analysis of the firewall system to find out the weaknesses and the security issues in the firewall. It doesn't only catch theses issue but also measures the severity of the issue. It helps in catching the weaknesses in the security posture of an organization by finding out the faults in the system. By finding these faults or weaknesses in the system, doesn't only make sure that the system works fine but it also prevents an organization from losing a big sum of money due to these security lapses. Since it cross-verifies the existing firewall rules with the preset rules, it makes sure that the system is always updated.


Related Solutions

Assume that you are working as IT Security head in RLCare hospital. You hospital has 90 employees in two departments which are IP and OP.
 B3.1 Assume that you are working as IT Security head in RLCare hospital. You hospital has 90 employees in two departments which are IP and OP. The hospital had no firewall to secure its network and the entire hospital is in two LANs for each department and both connected separately to internet. However, RLCare hospital has one application proxy for FTP protocol. RLCare hospital has a Server that has all the patient records from IP and OP departments. As per the...
Assume you are working on an ideal gas-turbine cycle that has three stages of compression with...
Assume you are working on an ideal gas-turbine cycle that has three stages of compression with intercooling and three stages of expansion with reheating at 100 kPa and 290 K. This system uses a regenerator as well. The pressure ratio across each stage of the compressor and turbine is 3; the air temperature when entering the turbine is 1300 K; and the regenerator operates perfectly. Draw the T − s diagram of this system. Determine the mass flow rate of...
You have started a new company that has three separate departments and employs over 50 people....
You have started a new company that has three separate departments and employs over 50 people. You must set up an accounting system that meets your business needs, but is also legally sound. You realize some of the reports you want must be Financial Accounting Standards Board (FASB) compliant, while you have flexibility in how other reports can be structured. Match the appropriate financial document with either a Financial Accounting Standards Board report (FASB) or Flexible Internal Report.
After working for three years, you decide to purchase your first home, which has a sales...
After working for three years, you decide to purchase your first home, which has a sales price of $350,000. With $70,000 down payment, what is your monthly mortgage payments for a 30-year loan at an annual interest rate of 4.75%. Assume the payments are made at the end of each period (i.e., ordinary annuity). a) Calculate the monthly installments b) Build an amortization table for the life of loan. For each payment, show the beginning loan balance, interest payment, principal...
Assuming you are new engineer working in R & D division at manufacturing company which has...
Assuming you are new engineer working in R & D division at manufacturing company which has decided to evaluate CAD/CAM system to adopt in your company in order to meet Industrial 4.0. Make an outline to decided which suitable CAD/CAM system can be selected to adapt with Industrial 4.0.
You have been given responsibility for promoting environmental awareness among employees in your company, which has...
You have been given responsibility for promoting environmental awareness among employees in your company, which has been registered to the ISO 14001 standard. How will you proceed? What specific steps will you take? How will you know when you have been successful?
Your company is working with Computer Security Inc. on a new system to process orders more quickly. Your manager has asked you to answer the following questing regarding the new system.
User Interface DesignYour company is working with Computer Security Inc. on a new system to process orders more quickly. Your manager has asked you to answer the following questing regarding the new system.What are some of the user-centered considerations in systems design and how can you use these to help design the user interface for Computer Security Inc.’s new order processing system?Suggest several types of controls such as command buttons, menu bars, check boxes, which might be used on a...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT