Designing Compliance within the LAN-to-WAN Domain

Description:
Note: Review the page requirements and formatting instructions for this assignment
closely. Graphically depicted solutions, as well as the standardized formatting
requirements, do NOT count toward the overall page length.

Imagine you are an Information Systems Security Officer for a medium-sized financial
servim firm that has operations in four (4) states (Virginia, Florida, Arizona, and
California). Due to the highly sensitive data created, stored, and transported by your
organization, the CIO is ooncemed with implementing proper security controls for the
LAN-to-WAN domain. Specifically, the CIO is concerned with the following areas:
Protecting data privacy across the WAN

Filtering undesirable network traffic from the lntemet

Filtering the traffic to the Internet that does not adhere to the organizational acceptable
use policy (AUP) for the Web

Having a zone that allows acms for anonymous users but aggressively controls
information exchange with internal resources

Having an area designed to trap attackers in order to monitor attacker activities
Allowing a means to monitor network traffic in real time as a means to identify and
block unusual activity

Hiding internal IP addresses

Allowing operating system and application patch management

The CIO has tasked you with proposing a series of hardware and software controls

Order from us and get better grades. We are the service you have been looking for.