Olkach

MGT 496 Week 2 DQ 2 Live Racking at B.M.W.

Dec 1st, 2014
310
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.83 KB | None | 0 0
  1.  
  2.  
  3. This archive file contains COM 135 Final Project User Manual
  4.  
  5. Deadline: ( ), Computer Science - General Computer Science
  6. Objective
  7.  
  8.  
  9.  
  10.  
  11.  
  12.  
  13. ABC Invitation Design and XYZ Invitation Printing have decided to merge into one company, A2Z Invitations. ABC is a virtual company with a proprietary website that allows customers to do some preliminary work on invitations and then consult with a designer for the final product. XYZ is a traditional company with a system that allows customers to submit designs and track their orders. It also has a contact management and invoicing system. ABC will be moving its application into the XYZ data center and will be using all of XYZ's back end systems.
  14.  
  15. Both companies have experienced data breaches in the past and do not want to have them in the future. A2Z has hired you to do a security analysis of its new network and to recommend how it can be set up in a secure manner. It has budgeted for a capital expenditure (outside of man hours) of $250,000 for hardware and software and $25,000 every year for additional security measures.
  16.  
  17.  
  18.  
  19.  
  20.  
  21.  
  22.  
  23.  
  24.  
  25.  
  26.  
  27. Guidelines
  28.  
  29.  
  30.  
  31.  
  32.  
  33.  
  34. The Statement of Work objectives are:
  35.  
  36.  
  37. Perform online reconnaissance on XYZ to see what information is available to an attacker. No social engineering of employees is allowed. Use the Week 1 You Decide as the data for this section.
  38. Perform an analysis of the current XYZ network, using the current network diagram and nmap report Diagram; NMAP and files are below.
  39. Check the user's password strength. Use the Week 3 You Decide as the data for this section.
  40. Redesign of network. Current network below.
  41. System hardening procedures for both IIS and Apache (even if they only use IIS).
  42. Three complete security policies. Use the Week 5 writing assignment as your starter policy for this section.
  43. Template for future security policies.
  44. Your paper must conform to all requirements listed below.
  45.  
  46. Requirements
  47.  
  48.  
  49. Papers must be at least 5–10 pages in length, double-spaced.
  50. Papers must include at least three references outside of the text.
  51. Paper and references must conform to APA style, including:
  52.  
  53. cover page;
  54. header with student’s name and page number; and 
  55. sections including Introduction, Body, and Conclusion/Summary.
  56.  
  57.  
  58. Milestones
  59.  
  60. Each You Decide and other write-ups should be used as the raw material for this report. This report is the analysis of that data.
  61.  
  62.  
  63. Week 1 You Decide
  64. Week 3 You Decide
  65. Week 5 writing assignment
  66.  
  67.  
  68.  
  69.  
  70.  
  71.  
  72.  
  73.  
  74.  
  75.  
  76.  
  77. Grading Rubrics
  78.  
  79.  
  80.  
  81.  
  82.  
  83.  
  84.  
  85.  
  86.  
  87.  
  88. Category
  89.  
  90. Points
  91.  
  92.  
  93.  
  94.  
  95. Recon Report
  96. IP Addresses
  97. Mail Servers
  98. WHOIS
  99. CNAME
  100.  
  101.  
  102.  20
  103.  
  104.  
  105.  
  106. Current Network Diagram Analysis
  107.  
  108.  20
  109.  
  110.  
  111.  
  112. Quantitative Analysis Ranking of Assets
  113.  
  114.  20
  115.  
  116.  
  117.  
  118. NMAP Analysis
  119.  
  120.  20
  121.  
  122.  
  123.  
  124. Password Cracking Report
  125.  
  126.  20
  127.  
  128.  
  129.  
  130. Redesigned Network Diagram
  131.  
  132.  20
  133.  
  134.  
  135.  
  136. Web Server Hardening Procedure IIS
  137.  
  138.  20
  139.  
  140.  
  141.  
  142. Web Server Hardening Procedure Apache
  143.  
  144.  20
  145.  
  146.  
  147.  
  148. Security Policy Template
  149.  
  150.  20
  151.  
  152.  
  153.  
  154. Three Complete Policies
  155.  
  156.  20
  157.  
  158.  
  159.  
  160. Three Outside References
  161.  
  162.  10
  163.  
  164.  
  165.  
  166. Spelling, Grammar, and APA Formatting
  167.  
  168.  10
  169.  
  170.  
  171.  
  172. Total
  173.  
  174.  220
  175.  
  176.  
  177.  
  178.  
  179.  
  180.  
  181.  
  182.  
  183.  
  184.  
  185.  
  186.  
  187.  
  188.  
  189.  
  190.  
  191. Best Practices
  192.  
  193.  
  194.  
  195.  
  196.  
  197.  
  198.  
  199.  
  200. You should begin working on this course project on Day 1.
  201.  
  202.  
  203.  
  204.  
  205.  
  206.  
  207.  
  208.  
  209.  
  210.  
  211.  
  212.  
  213. Official XYZ Network Diagram
  214.  
  215.  
  216.  
  217.  
  218.  
  219.  
  220.  
  221.  
  222.  
  223.  
  224. Search for more tutorials here - https://bitly.com/12BTdlJ
  225.  
  226. Visit the dorm before deciding to live there. You may discover that you don't want to live in that environment. Not only that, but you may find that you prefer one dorm over the other. Make sure you will get the choice you signed up for, and make sure you have a contingency plan in place if you chose a single room but end up in a quad.
Add Comment
Please, Sign In to add comment