Cyber Security Question

Learning Goal: I’m working on a cyber security multi-part question and need an explanation and answer to help me learn.

Getting Started


The components that make up cyberspace are not automatically secure. This includes cabling, physical networks, operating systems, and software applications that computers use to connect to the Internet. There is a raging information security war. The goal is to protect systems, applications, and business information. Therefore, IT is in great need of proper security controls.

In the 5.5 project, you created an outline of a multilayered security strategy for a fictitious financial organization, and then identified security challenges and suggested proper security controls for the company’s information systems environment. In this next phase of the project, you will demonstrate your understanding of the course concepts so far by preparing a follow-up report for the fictional company’s leadership regarding their outdated security policies. You will need to effectively document the vulnerabilities, methods, and controls.

This project provides you an opportunity to apply the competencies gained in various lessons of this course to identify security challenges and apply strategies of countermeasures for information systems.

Upon successful completion of this assignment, you will be able to:

  • Understand information systems security (ISS) fundamentals including the definition of terms, concepts, elements, and goals.
  • Understand the purpose of a multilayered security strategy.
  • Incorporate industry standards and practices with a focus on the confidentiality, integrity, availability, and vulnerabilities of information systems.
  • Fulfill the role of a security professional implementing proper security controls in a specific business situation.


  • Textbook: Principles of Information Security

Background Information

(See 5.5 Assignment: Project 2, Part 1)

Continuing the Richman Investments scenario explained in Project 2, Part 1 of this project, the offices have a total of 5,000 employees, and the office technology inventory includes desktops, mobile computers, and wireless devices. There is a mix of computers running Windows 8, 9 and 10, and Mac OS X 10.10. Most of the managers have iPhone devices for instant communication, and all employees are provided cell phones. A Windows Active Directory forest with domains is set up for each office, and seven file and print servers are located in the Phoenix office. The Phoenix office also contains two proxy servers, configured as an array, that provide Web cache services and Internet access control for the organization. The majority of applications are Web-based and hosted from the Phoenix office.

The Phoenix office has an Internet connection to all the remote offices, and the redundancy is extremely important to the company. There are several sensitive applications that all offices use. The management from each office shares application information that is hosted at the corporate office for accounting and reporting purposes.

All employees have Internet access. There is no policy on the use of removable media. Recently several of the branch offices have encountered issues with malware.

Richman hosts an intranet for employees to access information about the company and to enroll in company benefits programs. Richman also hosts an extranet for its business partners.

Due to many recent technology and process improvements within Richman, the corporate security policy is out of date, and each branch office policy differs.


  1. Review the rubric to make sure you understand the criteria for earning your grade.
  2. You must submit a proposal to Richman’s senior management addressing two of the points of concern, considering the following:
    1. Richman has 5,000 employees throughout the main office and several branch offices; therefore, you must research solutions and detail the appropriate access controls, including policies, standards, and procedures that define who the users are, what they can do, which resources they can access, and which operations they can perform on a system.
    2. Most of the managers have iPhone devices for instant communications, and all employees are provided cell phones; therefore, you must research and detail the cryptography methods to protect organizational information using techniques that ensure the information’s integrity, confidentiality, authenticity, and nonrepudiation, and the recovery of encrypted information in its original form.
    3. There is a mix of computers running Windows 8, 9 and 10, and Mac OS X 10.10; therefore, you must research and devise a plan to thwart malicious code and activity by implementing countermeasures and prevention techniques for dealing with viruses, worms, logic bombs, Trojan horses, and other related forms of intentionally created deviant code.
    4. All employees have Internet access to browse the Web, there is no policy on the use of removable media, and several of the branch offices have encountered issues with malware recently; therefore, you must research and formulate a plan to implement monitoring and analysis. You must determine system implementation and access in accordance with defined IT criteria as well as how to collect information for identification of and response to security breaches or events.
    5. Richman hosts an intranet for employees to access information about the company and enroll in company benefits programs, and that Richman also hosts an extranet for its business partners; therefore, you must research and devise a method to secure networks and communications. This should include the network structure, transmission methods and techniques, transport formats, and security measures used to operate both private and public communication networks.
    6. The Phoenix office contains two proxy servers configured as an array, which provide Web cache services and Internet access control for Richman, and the majority of applications are Web-based and hosted from the Phoenix office; therefore, you must assess risk, response, and recovery. Conduct a review of the implementation processes essential to the identification, measurement, and control of loss associated with uncertain events.
    7. The corporate security policy is out of date and each branch office policy differs; therefore, you must research and define security operations and administration, including the identification of information assets and documentation of policies, standards, procedures, and guidelines that ensure confidentiality, integrity, and availability.
  3. Write the proposal as detailed in the instructions above. Create a professional, well-developed proposal with proper documentation, grammar, spelling, and punctuation. In addition, document the vulnerabilities, methods, and controls effectively.
  4. After reading the scenario and explanation above, submit your response in a Microsoft Word document following APA Style. Your paper should be two pages in length, excluding the APA title and Reference pages. Cite any sources utilized in-text and in the References following APA style.
  5. When you’ve completed your assignment, save a copy for yourself and submit a
Get 20% Discount on This Paper
Pages (550 words)
Approximate price: -

Try it now!

Get 20% Discount on This Paper

We'll send you the first draft for approval by at
Total price:

How it works?

Follow these simple steps to get your paper done

Place your order

Fill in the order form and provide all details of your assignment.

Proceed with the payment

Choose the payment system that suits you most.

Receive the final file

Once your paper is ready, we will email it to you.

Our Services

Paper Helper has assembled a team of highly skilled writers with diverse experience in the online writing circles. Our aim is to become a one stop shop for all your Academic/ online writing. Check out below our amazing service!


Essay Writing Services

At Paper Helper, we prioritize on all aspects that creates a good grade such as impeccable grammar, proper structure, zero-plagiarism, and conformance to guidelines. The principal purpose of essay writing is to present the author's evaluation concerning a singular subject about which they have made. Since Professionalism is the mother of every success, try our team of experienced writers in helping you complete your essays and other assignments.


Admission Papers

You have been trying to join that prestigious institution you long yearned for, but the hurdle of an admission essay has become a stumbling block. We have your back, with our proven team that has gained invaluable experience over time, your chance of joining that institution is now! Just let us work on that essay.How do you write an admission essay? How do you begin the essay? For answers, try Quality Custom Writers Now!


Editing and Proofreading

Regardless of whether you're pleased with your composing abilities, it's never an impractical notion to have a second eye go through your work. The best editing services leaves no mistake untouched. We recognize the stuff needed to polish up a writing; as a component of our editing and proofreading, we'll change and refine your write up to guarantee it's amazing, and blunder free. Our group of expert editors will examine your work, giving an impeccable touch of English while ensuring your punctuation and sentence structures are top-notch.


Technical papers

We pride ourselves in having a team of clinical writers. The stringent and rigorous vetting process ensures that only the best persons for job. We hire qualified PhD and MA writers only. We equally offer our team of writers bonuses and incentives to motivate their working spirit in terms of delivering original, unique, and informative content. They are our resources drawn from diverse fields. Therefore your technical paper is in the right hands. Every paper is assessed and only the writers with the technical know-how in that field get to work on it.


College Essay Writing

If all along you have been looking for a trustworthy college essay service provider that provides superb academic papers at reasonable prices, then be glad that you search has ended with us. We are your best choice! Get high-quality college essay writing from our magnificent team of knowledgeable and dedicated writers right now!


Quality Assignment/Homework Help

We give the students premium quality assignments, without alarming them with plagiarism and referencing issues. We ensure that the assignments stick to the rules given by the tutors. We are specific about the deadlines you give us. We assure you that you will get your papers well in advance, knowing that you will review and return it if there are any changes, which should be incorporated.

togel macau togel terbesar bocoran admin jarwo data macau