Chat with us, powered by LiveChat You are the cybersecurity professional for Company A and are responsible for protecting the information of the company. Your roles include managing the com - Essayabode

You are the cybersecurity professional for Company A and are responsible for protecting the information of the company. Your roles include managing the com

 

You are the cybersecurity professional for Company A and are responsible for protecting the information of the company. Your roles include managing the company’s cybersecurity capabilities and tools, conducting vulnerability management, and assessing risk to sensitive information. Company A has recently purchased Company B and wants to merge both networks.

Executives of Company A have tasked you with making risk-based decisions on integrating Company B’s network with Company A’s existing network. Company B has provided its latest vulnerability scans, network diagrams, and existing cybersecurity capabilities and tools. As a deliverable to the executives, you will submit your recommendations for a secure network design that merges the two networks and allows remote access for employees of both companies in the form of a merger and implementation plan.

For this project, you will use the given scenario and the following supporting documents to complete your network merger and implementation plan:

•  “Company A Network Diagram”

•  “Company A Risk Analysis”

•  “Company B Network Diagram”

•  “Company B Vulnerability Report and Cybersecurity Tools”

Scenario Company A is a global company based in the United States that operates in the financial industry. Company A serves its customers with financial products, such as checking accounts, bank cards, and investment products. Company A has recently acquired Company B and needs to integrate with or remove similar capabilities and tools from Company B. Company B is smaller in size, has no dedicated cybersecurity professional role, and utilizes third-party support for infrastructure needs. Company B offers specialized software to medical providers and accepts credit cards as a payment option.  The executives of the newly merged company have expressed interest in integrating the use of the cloud to allow for scalability and redundancy. As the security professional of the merged networks, you are tasked with creating a secure network design that includes the use of zero trust principles and that utilizes both on-premises and cloud infrastructure. You also have been tasked with ensuring compliance with all regulatory requirements of the merged company, along with utilizing cloud-based technologies to provide security capabilities. Company executives have provided a budget of $50,000 in the first year to create a secure network design to utilize cloud-based services. Requirements Your submission must be your original work.
.    A.  Describe two current network security problems and two current infrastructure problems for each company, based on business requirements given in the scenario.
 B.  Analyze the given network diagram and vulnerability scan for both companies by doing the following:  1.  Describe two existing vulnerabilities for each company.  2.  Explain the impact, risk, and likelihood associated with each described vulnerability from part B1 as it relates to each company.  
C.  Create a network topology diagram with details of the proposed merged network requirements.  
D.  Identify the layer for all components in the topology diagram referencing the layers of the OSI model and TCP/IP protocol stack.  
E.  Explain the rationale for adding, deleting, or repurposing network components in the newly merged network topology diagram, including details of how each component addresses budgetary constraints.          F.   Explain two secure network design principles that are used in the proposed network topology diagram.  
G.  Explain how the proposed merged network topology diagram addresses two regulatory compliance requirements that are relevant to the newly merged company, including the following in your explanation:  •   the name of the regulatory compliance requirement  •   why the regulatory requirement is relevant to the newly merged company  •   how the proposed merged network topology diagram meets the regulatory requirement   
H.  Describe two emerging threats that are applicable to the merged organization, including the following in the description:  •   potential network security risks of implementing the topology  •   potential performance impacts on the merged network after implementation of the proposed design  •   how to manage the identified potential security risks  
I.  Summarize your recommendations for implementation of this proposed merged network based on the scenario and budgetary requirements, including the following in the summary:  •   a cost-benefit analysis for on-premises and cloud infrastructure solutions  •   a justification for your recommendations to implement the proposed secure merged network design  
J.  Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.   
K.  Demonstrate professional communication in the content and presentation of your submission.

Follow this rubric  :  A:BUSINESS REQUIREMENTS:The submission accurately describes 2 or more current network security problems and at 2 or more current infrastructure problems for each company and is aligned with the business requirements given in the scenario.  
B1:VULNERABILITIES : The submission accurately describes 2 or more existing vulnerabilities for each company. The vulnerabilities described are in alignment with the given network diagram and vulnerability scan.  
B2:IMPACT, RISK, LIKELIHOOD:  The submission explains the impact, risk, and likelihood associated with each described vulnerability from part B1 as it relates to each company. The explanation is complete and in alignment with the given network diagram and vulnerability scan.  
C:TOPOLOGY DIAGRAM: The network topology diagram with the details of the proposed merged network requirements is provided. The diagram is complete and meets the needs provided in the scenario. MAke a table under the topology for costs that include everything that we added and show that it stays under the 50k budget
D:TOPOLOGY COMPONENTS: The submission correctly identifies the layer for all components in the topology diagram referencing the layers of the OSI and TCP/IP protocol stack
E:RATIONALE : The submission explains the rationale for adding, deleting, or repurposing network components in the newly merged network topology diagram and includes the details of how each component addresses budgetary constraints. The explanation is in alignment with the given scenario.  F:SECURE NETWORK DESIGN PRINCIPLES :  The submission explains 2 or more secure network design principles that are used in the proposed network topology diagram. The explanation clearly names the secure network design principles being used and how each principle aligns with the proposed network topology diagram.  
G:REGULATORY COMPLIANCE : The submission accurately explains how the proposed merged network topology diagram addresses 2 or more regulatory compliance requirements and includes all of the listed components. The regulatory compliance requirements are relevant to the newly merged company.  
H:EMERGING THREATS : The submission accurately describes 2 or more emerging threats that are applicable to the newly merged organization and includes all the given points.
I:SUMMARY RECOMMENDATIONS: The submission summarizes the recommendations for implementation of the proposed merged network. The summary is logical and in alignment with the scenario and budgetary requirements and includes all listed specifications.  

D482: Secure Network Design

DHN1: Secure Network Design Company A Risk Analysis

PAGE 1

PAGE 2

Company A Risk Analysis

Company A performed an internal risk analysis in anticipation of system integration with Company B. This risk analysis was performed in accordance with NIST SP 800-30 Rev 1 to identify the following:

• vulnerabilities

• risk likelihood

Table A. Risk Classifications

Risk Level

Description

High

The loss of confidentiality, integrity, or availability may be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals.

Moderate

The loss of confidentiality, integrity, or availability may be expected to have a serious adverse effect on organizational operations, organizational assets, or individuals.

Low

The loss of confidentiality, integrity, or availability may be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals.

Table B. Data Sensitivity

Type of Data

Sensitivity

Confidentiality

Integrity

Availability

Customer PII (e.g., Account Numbers, Social Security Numbers, and Phone Numbers)

High

High

Moderate

Employee PII (e.g., Social Security Numbers and Employee Identification Numbers)

High

High

Moderate

Company intellectual property (e.g., credit scoring calculations)

High

High

Moderate

Marketing and advertising

Moderate

Moderate

Low

Table C. System Inventory

System Components

Servers

Windows server 2019; role: internal SharePoint server

Windows server 2019; role: Exchange server

Windows server 2012; role: Application server

Windows server 2012R2; File server

DMZ Windows server 2012; role: FTP and external Web Server

Workstations

75 – Windows 10 Pro

20 – configured for remote desktop access

Switches

4 – Cisco 3750X

Firewall

Fortinet’s Fortigate 800D NGFW

Border router

Cisco 7600

Laptops

14 – Windows 7

6 – Windows 11

Wireless Access Points

2 – Meraki MR28

Cable plant

Cat5e

Table D. Risk Identification

Risk #

Vulnerability

Risk Likelihood

1

Open ports 21-90, 3389

High

2

All users use eight-character passwords

High

3

User accounts no longer required are not removed

Moderate

4

All users have local administrative privileges

Moderate

5

Regular password changes are not enforced

Moderate

6

End-of-Life Equipment in use

Low

image1.jpeg

,

D482 – Secure Network Design

DHN1: Secure Network Design

PAGE 1

PAGE 2

Company B Vulnerability Report

Company B performed this vulnerability assessment in anticipation of system integration with Company A. This assessment was performed by a qualified third-party assessor, and this report has been generated with the results. This assessment was performed in accordance with a methodology described in NIST 800-30 Rev 1 to identify the following:

· Vulnerabilities using the CVSS model

· Severity

· Likelihood of occurrence

Table A. Risk Classifications

Risk Level

Description

High

The loss of confidentiality, integrity, or availability may be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals.

Moderate

The loss of confidentiality, integrity, or availability may be expected to have a serious adverse effect on organizational operations, organizational assets, or individuals.

Low

The loss of confidentiality, integrity, or availability may be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals.

Table B. Severity

Severity Level (CVSS Model)

Description

Critical

· Exploitation of the vulnerability likely results in root-level compromise of servers or infrastructure devices.

· Exploitation is usually straightforward in the sense that the attacker does not need any special authentication credentials or knowledge about individual victims and does not need to persuade a target user, for example, via social engineering, to perform any special functions.

High

· The vulnerability is difficult to exploit.

· Exploitation could result in elevated privileges.

· Exploitation could result in significant data loss or downtime.

Medium

· Vulnerabilities that require the attacker to manipulate individual victims via social engineering tactics.

· Denial of service vulnerabilities that are difficult to set up.

· Exploits that require an attacker to reside on the same local network as the victim.

· Vulnerabilities where exploitation provides only very limited access.

· Vulnerabilities that require user privileges for successful exploitation. 

Low

Exploitation of such vulnerabilities usually requires local or physical system access and would have little impact on the organization.

Table C. Level of Effort

Level of Effort

Description

High

This requires a high level of dedicated effort from one or more teams on critical systems, including patching, multiple configuration changes, or highly technical changes that risk bringing services down.

Moderate

This is a medium-level effort that requires substantial dedication from a partial or entire team. This could impact services or cause a partial outage.

Low

These are individual or small team efforts generally requiring a minimal time commitment and require running an update or remedial command or series of commands that will not impact production services.

Table D. System Inventory

System Components

Servers

Virtualized farm running on Hyper-V (2 hosts). Windows Server 2019 and Ubuntu Linux. Approximately 20 virtualized servers (across the 2 hosts), including the following roles:

· (Ubuntu Linux) FTP server for EDI Incoming Operations

· 3x Domain Controllers (1 used for M365 identity sync)

· 1x File Storage/Server

· 1x Ruby On Rails server

· 3x ElasticSearch servers (cluster)

· 5x web application servers (Ubuntu Linux cluster, 1x PostGRESQL, 1x MariaDB SQL, 3x running nginX Plus wreverse caching proxy, 1x running Apache Tomcat, PHP 8, hosting SSL/TLS certificates)

· 4x Remote Desktop Servers for internal shared/applications

· 2x legacy Exchange servers (post-migration)

75 Workstations

Windows XP, 7, 10/11 Pro, Ubuntu Linux, MacOS

Switches

HPE JL262A Aruba 2930F 48G PoE+

Firewall

2x Sophos XG firewalls

Border router

Verizon FIOS router (CR1000A)

Laptops

Windows 10, 11, Ubuntu 22.04 LTS, MacOS (Ventura, Monterey, Big Sur)

Wireless Access Points

10x HPE JZ337A Aruba AP-535

Cable plant

Cat6a

Table E. Risk Identification

Risk #

Vulnerability (NVT Name)

NVT OID

Severity

Risk

Level of Effort

1

Distributed Ruby (dRuby/DRb) Multiple Remote Code Execution Vulnerabilities

1.3.6.1.4.1.25623.1.0.108010

Critical

High

High

2

MFA not enforced across all users

High

High

High

3

Rexec service is running

1.3.6.1.4.1.25623.1.0.100111

High

High

Low

4

All users have local administrative privileges

Medium

Moderate

High

5

Java RMI Server Insecure Default Configuration Remote Code Execution Vulnerability on publicly-facing server

1.3.6.1.4.1.25623.1.0.140051

Critical

High

Moderate

6

Operating System (OS) End of Life (EOL) Detection

1.3.6.1.4.1.25623.1.0.103674

Critical

High

Low

7

rlogin Passwordless Login

1.3.6.1.4.1.25623.1.0.113766

High

Moderate

Low

8

Apache Tomcat AJP RCE Vulnerability (Ghostcat)

1.3.6.1.4.1.25623.1.0.143545

Critical

High

Moderate

9

PostgreSQL weak password

1.3.6.1.4.1.25623.1.0.103552

High

High

Low

10

PostgreSQL admin is reachable from internet

Critical

High

Low

11

VNC Brute Force Login

1.3.6.1.4.1.25623.1.0.106056

High

High

Low

12

FTP Brute Force Logins Reporting

1.3.6.1.4.1.25623.1.0.108718

High

High

Low

13

phpinfo() output Reporting

1.3.6.1.4.1.25623.1.0.11229

High

Moderate

Low

14

vsftpd Compromised Source Packages Backdoor Vulnerability

1.3.6.1.4.1.25623.1.0.103185

High

High

Moderate

15

rsh Unencrypted Cleartext Login

1.3.6.1.4.1.25623.1.0.100080

High

Moderate

Moderate

Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.

Do you need an answer to this or any other questions?