Question

You have recently been hired by a new Japanese accounting firm, headquarter in Tokyo, as the...

You have recently been hired by a new Japanese accounting firm, headquarter in Tokyo, as the director of Information Systems and Telecommunications. Your assignment is to assist security posture of the firm and develop a security structure for this new company. Write your recommendations and reasons to the firm’s CEO.

The firm has 600 employees in Tokyo, 50 in Houston, and is planning to open two branch offices in India and California. Ten accountants will be hired at each site. USA customers’ data from the Houston and California offices will be transmitted to the India and Japan offices for processing of payroll. The results are then sent back to the Firm’s USA office in Houston. Currently, only TCP/IP (public Internet) is being used. The firm’s network is a Windows environment, using CISCO products, with IPv4 address space, 211.156.13.0/22

. You may create any subnet as needed.

Assume no security applications are in place since this is a new company. Design a detailed logical and physical security system to be used in the new firm’s plan. Provide information about specific hardware and software.

Also include needed policies and procedures. Provide security details and address policies, government

regulations and industry regulations as needed.

Your high level areas of requirements are as follows (this is a big list – focus on priorities!):

Install critical infrastructure that provides business continuity

Implement IDS/IPS solution

Investigate next generation technology

Implement VPN for Remote Users

Email Filtering (scanning for viruses, spam, etc)

Web Filtering

SIEM Solution (malware analysis, vulnerability scanning, internal penetration testing)

Penetration Testing and Security Auditing (outside service option)

HTTP to HTTPS Conversion

Centralized Management Services for all Networking/Security Devices

Recommend Standards for configuration of all devices and servers

ACL standards (allow/deny), Turn off services, ports, block protocols, etc.

Disaster Recovery (just backup at the config level & data)

Standard for offsite device config backup and recovery

Standard for data backup and recovery

Physical Security (recent incidents indicate espionage risk is high)

Standards for device and physical access (ex: BitLocker, disable USB, biometrics, cameras, security guards)

User awareness & training

Your project must clearly articulate methodologies that address the business needs, determining the infrastructure and operations, developing timelines, and an implementation plan.

The network design must be robust, secure, functional, and support the speed of business. Your organization has a mix of email, web-services, patch/change management, virus protection, basic perimeter based security. Your team is free to make assumptions and recommendations so long as they are clearly documented and relayed to the stakeholders; include anything that your team believes will be needed.

To meet the stakeholder’s needs your solution and presentation will be assessed on:

I. Scope

II. Plan of Implementation (what will be implemented in months 1-3, 4-6, 6-9 and 9-12)

III. Design Document

IV. High Level Project Plan (Time to Implement)

V. Overall cost (guess since you will not have access to discounted prices)

There is a LOT of room for creativity and exploration in this project. You will be graded on the practical nature of your proposal, the realistic nature of implementation and cost. When developing this project, think about what you would want as a business owner. What is your most valuable asset and how do you protect it in the environment given?

Homework Answers

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
Case Study You have just been hired as the new treasurer of an Australian firm called...
Case Study You have just been hired as the new treasurer of an Australian firm called Sun Solar Panels (SSP). SSP produces commercial solar panels. It is a well established brand in both the UK and New Zealand. In fact, it distributes (sells) its entire output to UK and New Zealand retailers. These sales are made through SSP's UK and New Zealand subsidiaries which act as distributors of the product. Each wholesale transaction in the UK is settled in GBP...
(Use the case of “Global Treps”) You have been selected as the project manager for the...
(Use the case of “Global Treps”) You have been selected as the project manager for the Global Treps project. You helped to run a local shark tank like event at your college last year as part of a class project, so you have a general idea of what is involved. The schedule goal is six months, and the budget is $120,000. Your favorite professor, Dr. K., and a few of her associates have agreed to fund the project. Your strengths...
You are a manager in the audit division at Miller Yates Howarth (MYH), an accounting firm...
You are a manager in the audit division at Miller Yates Howarth (MYH), an accounting firm with offices throughout the major regional centres of NSW and Queensland. Although a medium sized firm by national standards, MYH is the second largest regional accounting firm in Australia. Most of MYH’s audit clients are in the agriculture, mining, manufacturing and property industries. All of those industries are currently under pressure, either from a downturn in commodity prices or fierce competition from overseas competitors....
Overview Your assignment is to complete a wireless network design for a small company. You will...
Overview Your assignment is to complete a wireless network design for a small company. You will place a number of network elements on the diagram and label them appropriately. A network diagram is important to communicate the design features of a network between network administrators, system administrators and cyber-security analysts. It helps to create a shared mental model between these different technologists, yet each will have their own perspective on what is important to have documented on the diagram. Please...
Background You are a manager in the audit division at Miller Yates Howarth (MYH), an accounting...
Background You are a manager in the audit division at Miller Yates Howarth (MYH), an accounting firm with offices throughout the major regional centres of NSW and Queensland. Although a medium sized firm by national standards, MYH is the second largest regional accounting firm in Australia. Most of MYH’s audit clients are in the agriculture, mining, manufacturing and property industries. All of those industries are currently under pressure, either from a downturn in commodity prices or fierce competition from overseas...
2. SECURING THE WORKFORCE Diversity management in X-tech, a Japanese organisation This case is intended to...
2. SECURING THE WORKFORCE Diversity management in X-tech, a Japanese organisation This case is intended to be used as a basis for class discussion rather than as an illustration of the effective or ineffective handling of an administrative situation. The name of the company is disguised. INTRODUCTION In light of demographic concerns, in 2012, the Japanese government initiated an effort to change the work environment in order to secure the workforce of the future. Japan is world renowned for its...
What role could the governance of ethics have played if it had been in existence in...
What role could the governance of ethics have played if it had been in existence in the organization? Assess the leadership of Enron from an ethical perspective. THE FALL OF ENRON: A STAKEHOLDER FAILURE Once upon a time, there was a gleaming headquarters office tower in Houston, with a giant tilted "£"' in front, slowly revolving in the Texas sun. The Enron Corporation, which once ranked among the top Fortune 500 companies, collapsed in 2001 under a mountain of debt...
Please read the article and answear about questions. Determining the Value of the Business After you...
Please read the article and answear about questions. Determining the Value of the Business After you have completed a thorough and exacting investigation, you need to analyze all the infor- mation you have gathered. This is the time to consult with your business, financial, and legal advis- ers to arrive at an estimate of the value of the business. Outside advisers are impartial and are more likely to see the bad things about the business than are you. You should...
The Business Case for Agility “The battle is not always to the strongest, nor the race...
The Business Case for Agility “The battle is not always to the strongest, nor the race to the swiftest, but that’s the way to bet ’em!”  —C. Morgan Cofer In This Chapter This chapter discusses the business case for Agility, presenting six benefits for teams and the enterprise. It also describes a financial model that shows why incremental development works. Takeaways Agility is not just about the team. There are product-management, project-management, and technical issues beyond the team’s control. Lean-Agile provides...
Using the model proposed by Lafley and Charan, analyze how Apigee was able to drive innovation....
Using the model proposed by Lafley and Charan, analyze how Apigee was able to drive innovation. case:    W17400 APIGEE: PEOPLE MANAGEMENT PRACTICES AND THE CHALLENGE OF GROWTH Ranjeet Nambudiri, S. Ramnarayan, and Catherine Xavier wrote this case solely to provide material for class discussion. The authors do not intend to illustrate either effective or ineffective handling of a managerial situation. The authors may have disguised certain names and other identifying information to protect confidentiality. This publication may not be...
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT