Final Project Assignment Instructions Overview In order to fully comprehend

  Final Project Assignment Instructions

Overview

In order to fully comprehend the many aspects that factor into information forensics and risk management, you must examine a situation from the perspective of a computer forensic specialist. For the Final Project Assignment, you will be placed in a hypothetical scenario in which you must utilize all of the information gained throughout this course.

Instructions

Assume that you are the Chief Information Security Officer (CISO) of <Place your full name here> Corporation.  If your name is “Mariah Smith” the name of the company should be named the Mariah Smith Corporation. While performing your regularly scheduled duties, you receive a call from the Senior Vice President of the Human Resources Department informing you that, in the past 4 days, there have been 4 occurrences of money transfer to unauthorized recipients. Given your position and your understanding of recent cyber and information security attacks, you assume that an attack of some sort is at fault for the unauthorized transfers.

During the conversation, you are given the name of the department where the fund transfers have occurred.  The department is internal to the organization but only certain fund transfers were committed internal to the network. In addition, you know the external public IP address of the system that executed the transfers. Privilege escalation, man-in-the-middle attacks, buffer overflows, and malicious code were all present during the Information Assurance Team’s initial investigation.  Some of this is puzzling, given the IP address location that seems to be the source. You are given specific instruction not to engage anyone from the department where the money transfer have occurred; however, you are permitted to engage law enforcement and third party agencies if appropriate. This is to preserve any ongoing investigations and to allow the greatest opportunity to catch the suspect. 

Refer to the Final Project Network Diagram.  The enterprise network is much larger, with many additional pieces of hardware. Regardless, these are the only systems the initial investigation indicated were affected. The organization fund/money transfer systems are comprised of Microsoft, Linux, and Solaris servers. The firewall prior to the Cisco core switch only allows access to necessary web facing application ports. The Microsoft servers are responsible for authentication through directory services. Despite one firewall and some group policy being verified as sound and uncompromised by the investigation, the current information system components identified play certain roles in the unauthorized transfers.

The Final Project Network Diagram will be used as a point of reference in determining what is necessary to determine how this incident could occur in a real organization; this includes applications, information systems, human experts, and any other stakeholder involved in such an incident. Your goal is to identify where vulnerabilities and threats could exist specific to anauthorized transfers in this scenario and how to mitigate future occurances. 

The final plan must identify the technology and equipment and all access and file data that is compulsory—including log files, auditing, group policies, firewall rules, and other information system elements—to determine the root cause. Upon the successful completion of the investigation plan, a subsequent plan will determine a superior information system and plan for future mitigation and prevention. This can include everything from firewall rules to policy.

Before being graded, all code, access control rules, diagrams, and/or Visio diagrams (each) must include screenshots with a valid date and piece of data that shows completion on the student’s personal computer. The Final Project Assignment must be comprehensive and include a minimum of 5,000 words (excluding the title page, diagrams, and reference page). Each project deliverable should be well supported by related, relevant, and current scholarly literature. In total, it should contain at least 20 peer-reviewed sources. The Final Project Assignment must also be written in current APA format, include a title page, table of contents, introduction, conclusion, references, and appendixes with appropriate data. You are encouraged to utilize Microsoft Visio or a similar application in order to provide visual aides to assist in your assessment of the situation as well as Microsoft Project and/or valid alternatives. In your analysis, be sure to include the following:

· A comprehensive literature review of unauthorized transactions, how this can occur, and a comprehensive review of the affected IT infrastructure;

· A project adhering to an industry standard methodology (such as PMBOK) to manage the Final Project completion;

· An appraisal of the situation using the knowledge gained from this course and personal experience;

· A thorough assessment of the Information Assurance Team’s initial findings;

· A performance of a forensic investigation on the matter;

· An illustration of your strategy for conducting this investigation;

· The formulation of a complete plan including: a proposed personnel structure/team, mechanisms of defense, budget, schedule, risk management, procurement management, secure systems analysis, and design to prevent this incident from occurring in the future; 

· Over two (2) new unique IT architecture diagrams using at least two (2) network security frameworks that highlight the new strategy and design that could mitigate future unauthorized transactions. Diagrams must have screenshots from the user’s computer in the program they were designed and include the operating system date and time from the student’s person computer.

· A strong attempt to integrate a biblical worldview into the secure enterprise solution. 

Introduction  More than 3 scholarly sources and 250 words 

Review of literature – 2,500 words 10 scholarly journal articles

Mitigation Plan – Over two (2) new comprehensive network architecture diagrams with proper screenshots and over 20 pieces of hardware that 2,000 words 10 scholarly sources

Conclusion – More than 2 scholarly sources and 250 words 

Total Overall – Over 5,000 words and Over 20 unique scholarly sources

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Option 2: Critical analysis of a contemporary topic In this

Option 2: Critical analysis of a contemporary topic In this option, you have a write a short paper on a contemporary topic. Using data, reasoning, and arguments, present your assessment of the topic. It is important that you make recommendations and identify the limitations of your research that have led

Please answer below in word limit of 500 by watching

Please answer below in word limit of 500 by watching the below videos.And also have to reply to 3 classmate posts in 150 word limit each(please see the attached document for 3 classmate posts)   Cash Budget Close to 50% of the typical industrial and retail firm’s assets are held

400-500 words Organizations—and problems—have grown in complexity. As Senge and

 400-500 words Organizations—and problems—have grown in complexity. As Senge and others observe, unless we can recognize the systemic structures that underlie complexity, even the brightest people will find that, despite their best efforts and intentions, they are not achieving their intended results For this question, share an example of an

Refer to the AWS Customer Success web page where you

  Refer to the AWS Customer Success web page where you can read case studies. You can search case studies by Company Type or by Solution to find studies for this assignment. GTR is pleased with the report you submitted, which addressed many of the concerns with AWS. They are

Living in Disadvantaged Neighborhoods is Bad for Your Health. http://www.unnaturalcauses.org/video_clips_detail.php?res_id=217

 Living in Disadvantaged Neighborhoods is Bad for Your Health. http://www.unnaturalcauses.org/video_clips_detail.php?res_id=217 Cardiologist David Weiland wonders why Gwai, a relatively young patient with no history of smoking, family heart disease, or other typical behavioral or genetic risk factors ended up having a heart attack. How does the film answer his question? Please include

Instructions Open the following Word Doc worksheet and answer the

  Instructions Open the following Word Doc worksheet and answer the questions IN YOUR OWN WORDS about ONE of the three authors from this week’s stories: Alice Walker, James Joyce, or Louise Erdrich.  DO NOT COPY AND PASTE ANSWERS FROM THE INTERNET.  Author Study Worksheet You will need to compile

Susan Glaspell: “A Jury of Her Peers”

Source: Susan Glaspell: “A Jury of Her Peers” Transform a humanities argument into a visual and aural presentation. Transform the short story into a visual presentation by using MS PowerPoint. Use graphs, charts, pictures, links, sound effects, or whatever else you can think of to allow your audience to understand

Good database design must be matched to good table structure.

  Good database design must be matched to good table structure. Normalization is a very important ingredient in database design. Respond to the following in a minimum of 175 words: Why are some table structures considered to be bad and others good? How do you recognize the difference between good

Homelessness

GNED500: Social Analysis Project Proposal The intention of this assignment is to develop a clear plan for your analysis of a social problem/issue. One proposal should be completed and submitted by each group. Your proposal should include 2-3 paragraphs introducing/overviewing the topic (can be used to frame the introduction for

With these thoughts in mind, create a blog entry that

  With these thoughts in mind, create a blog entry that responds to the following: Reflecting on what you have learned over the past 6 weeks, explain how your perception of psychology has changed. Next, describe how at least three specific topics or theories you’ve learned about this term can

Module 05 Content This week you will evaluate security requirements

  Module 05 Content This week you will evaluate security requirements for the XYZ company. The updated XYZ Company Network Diagram is available here: If you are not using Visio, then you can use this JPG image instead: XYZ Updated Network.zip Based on the information in the diagram, complete the Project

Social aspect of advertising – Premium Paper Help

Premium Paper Help is a professional writing service that provides original papers. Our products include academic papers of varying complexity and other personalized services, along with research materials for assistance purposes only. All the materials from our website should be used with proper references.

3 – 4 pages Ariel 12 Double Space Please make

3 – 4 pages Ariel 12 Double Space Please make sure to read the two cases about Disney before you answer the below questions. Use either the Bloomberg terminals located at the Feliciano School of Business or other reputable sources such as finance.yahoo.com, morningstar.com or Wall Street Journal etc. for

First identify the manner of death (homicide, suicide, accidental, or

First identify the manner of death (homicide, suicide, accidental, or natural) for each of the following situations (a-f), then explain in detail your reasoning, and finally discuss what physical evidence may have been present at the crime scene and why. a. Blunt force trauma to the back of the head