Final Project Assignment Instructions Overview In order to fully comprehend

  Final Project Assignment Instructions

Overview

In order to fully comprehend the many aspects that factor into information forensics and risk management, you must examine a situation from the perspective of a computer forensic specialist. For the Final Project Assignment, you will be placed in a hypothetical scenario in which you must utilize all of the information gained throughout this course.

Instructions

Assume that you are the Chief Information Security Officer (CISO) of <Place your full name here> Corporation.  If your name is “Mariah Smith” the name of the company should be named the Mariah Smith Corporation. While performing your regularly scheduled duties, you receive a call from the Senior Vice President of the Human Resources Department informing you that, in the past 4 days, there have been 4 occurrences of money transfer to unauthorized recipients. Given your position and your understanding of recent cyber and information security attacks, you assume that an attack of some sort is at fault for the unauthorized transfers.

During the conversation, you are given the name of the department where the fund transfers have occurred.  The department is internal to the organization but only certain fund transfers were committed internal to the network. In addition, you know the external public IP address of the system that executed the transfers. Privilege escalation, man-in-the-middle attacks, buffer overflows, and malicious code were all present during the Information Assurance Team’s initial investigation.  Some of this is puzzling, given the IP address location that seems to be the source. You are given specific instruction not to engage anyone from the department where the money transfer have occurred; however, you are permitted to engage law enforcement and third party agencies if appropriate. This is to preserve any ongoing investigations and to allow the greatest opportunity to catch the suspect. 

Refer to the Final Project Network Diagram.  The enterprise network is much larger, with many additional pieces of hardware. Regardless, these are the only systems the initial investigation indicated were affected. The organization fund/money transfer systems are comprised of Microsoft, Linux, and Solaris servers. The firewall prior to the Cisco core switch only allows access to necessary web facing application ports. The Microsoft servers are responsible for authentication through directory services. Despite one firewall and some group policy being verified as sound and uncompromised by the investigation, the current information system components identified play certain roles in the unauthorized transfers.

The Final Project Network Diagram will be used as a point of reference in determining what is necessary to determine how this incident could occur in a real organization; this includes applications, information systems, human experts, and any other stakeholder involved in such an incident. Your goal is to identify where vulnerabilities and threats could exist specific to anauthorized transfers in this scenario and how to mitigate future occurances. 

The final plan must identify the technology and equipment and all access and file data that is compulsory—including log files, auditing, group policies, firewall rules, and other information system elements—to determine the root cause. Upon the successful completion of the investigation plan, a subsequent plan will determine a superior information system and plan for future mitigation and prevention. This can include everything from firewall rules to policy.

Before being graded, all code, access control rules, diagrams, and/or Visio diagrams (each) must include screenshots with a valid date and piece of data that shows completion on the student’s personal computer. The Final Project Assignment must be comprehensive and include a minimum of 5,000 words (excluding the title page, diagrams, and reference page). Each project deliverable should be well supported by related, relevant, and current scholarly literature. In total, it should contain at least 20 peer-reviewed sources. The Final Project Assignment must also be written in current APA format, include a title page, table of contents, introduction, conclusion, references, and appendixes with appropriate data. You are encouraged to utilize Microsoft Visio or a similar application in order to provide visual aides to assist in your assessment of the situation as well as Microsoft Project and/or valid alternatives. In your analysis, be sure to include the following:

· A comprehensive literature review of unauthorized transactions, how this can occur, and a comprehensive review of the affected IT infrastructure;

· A project adhering to an industry standard methodology (such as PMBOK) to manage the Final Project completion;

· An appraisal of the situation using the knowledge gained from this course and personal experience;

· A thorough assessment of the Information Assurance Team’s initial findings;

· A performance of a forensic investigation on the matter;

· An illustration of your strategy for conducting this investigation;

· The formulation of a complete plan including: a proposed personnel structure/team, mechanisms of defense, budget, schedule, risk management, procurement management, secure systems analysis, and design to prevent this incident from occurring in the future; 

· Over two (2) new unique IT architecture diagrams using at least two (2) network security frameworks that highlight the new strategy and design that could mitigate future unauthorized transactions. Diagrams must have screenshots from the user’s computer in the program they were designed and include the operating system date and time from the student’s person computer.

· A strong attempt to integrate a biblical worldview into the secure enterprise solution. 

Introduction  More than 3 scholarly sources and 250 words 

Review of literature – 2,500 words 10 scholarly journal articles

Mitigation Plan – Over two (2) new comprehensive network architecture diagrams with proper screenshots and over 20 pieces of hardware that 2,000 words 10 scholarly sources

Conclusion – More than 2 scholarly sources and 250 words 

Total Overall – Over 5,000 words and Over 20 unique scholarly sources

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Imagine you are the HR manager of a local health

Imagine you are the HR manager of a local health care organization. You have received a complaint from an employee claiming that they are being paid less than a co-worker who started their employment on the same day and who has the same job title and responsibilities. Discuss your initial

Equity in the educational field

Description The aim of the paper is to present a synthesized literature review of equity in the educational field and also present the concept of equity in line with three other concepts in an argumentative way supported by well-known authors in this field. (Bourdieu, Felouzis, Rawls etc) I will attach

Think about a successful healthcare environment where you worked. In

Think about a successful healthcare environment where you worked. In detail, discuss one or two habits of system thinking by a team member or leader who you observed in that environment. Do you think these habits improved efficiency and the care delivered to patients? Why or why not? Use at least

Infrastructure Review As a nurse executive leader, you may very

  Infrastructure Review As a nurse executive leader, you may very well be tasked with the evaluation of the current technology safeguards, infrastructure, and regulations surrounding the security of the enormous amount of patient data collected in your organization. As nursing continues to increase point-of-care clinical technology, there is potential

Guiding Questions: Concept Map This document is designed to give

   Guiding Questions: Concept Map This document is designed to give you questions to consider and additional guidance to help you successfully complete the Concept Map assessment. You may find it useful to use this document as a pre-writing exercise, as an outlining tool, or as a final check to

An educator overhears a conversation between two students. One of

 An educator overhears a conversation between two students. One of the students is talking about how dangerous it is to walk home. The student lives in an area with known gang activity. Every day, the student gets in fights with gang members while walking home. The educator stops the conversation

This is the second part of an assignment. I am

 This is the second part of an assignment. I am attaching sources/details as inspiration to continue the second part of it as it follows:Create a cognition brochure for your own clinic while considering your audience/patients/prospects. Write using nonscientific terms, be clear and concise, and include content based on researched best

Hirokazu Koreeda’s Distance (2001) – Premium Paper Help

Premium Paper Help is a professional writing service that provides original papers. Our products include academic papers of varying complexity and other personalized services, along with research materials for assistance purposes only. All the materials from our website should be used with proper references.

Midterm Assignment Instructions Review the material on long and short-term

Midterm Assignment Instructions Review the material on long and short-term memory. Then answer the following questions: Describe long-term memory and short-term memory. Give an example of explicit memory and how you have experienced this concept yourself. Give an example of implicit memory and how you have experience this concept yourself.

HSM 260 Week 6 Assignment Fee Setting Nursing Assignment Help

This archive file of HSM 260 Week 6 Assignment Fee Setting consists of: Assignment: Fee SettingResource: Ch. 11 in Financial Management.Complete Exercises 11.1 & 11.2 on pp. 158-159.Determine the most important issues for a human service agency to address in fee setting.Determine the issues that arc least important.Justify your answers.Post

There is a connection between chapter three and chapter one.

There is a connection between chapter three and chapter one. Therefore, as an extension of our week in the mock chapter three from last week, we will write a mock chapter one. This assignment will help determine your readiness to write a full-length chapter one. Directions: Develop a 2 page

Module 1 – SLP INTRODUCTION TO GLOBALIZATION; CULTURAL INTELLIGENCE SLP Assignment Overview What is cultural intelligence? Cultural

Module 1 – SLP INTRODUCTION TO GLOBALIZATION; CULTURAL INTELLIGENCE SLP Assignment Overview What is cultural intelligence? Cultural intelligence (CQ), which refers to the capability to adapt and function successfully in culturally diverse environments, has been linked to positive individual-level outcomes in culturally diverse contexts, including performance, interaction quality, interpersonal trust,

You must be knowing about logo generators or websites that

  You must be knowing about logo generators or websites that let you design a logo on your own for free. All of these are the output of technology. Something that was not achievable earlier but now you can enjoy doing all those things with ease. The same is the

Consider the following statement: “In preparing for the Cherokee removal,

Consider the following statement: “In preparing for the Cherokee removal, state and federal officials were motivated solely by desire to seize the natives’ land.” In your post, consider the following: Does this statement present the full picture? Revise this statement to present a more complex explanation of the motivations that

Week 10 Health Services Discussion Nursing Assignment Help

I’m studying for my Health & Medical class and need an explanation. Health Services Admin Capstone Discussion – Wk 10 “Developing an Action Plan” Please respond to the following: Imagine that you are the Director of the Admitting Department of a hospital, and your strategy to increase patient satisfaction is

1. Identify the function of media in society. 2. Analyze

   1.  Identify the function of media in society.  2. Analyze problems of media in society. 3.  Describe your overall result. what kinds of media did you consume, and what functions were present? 4. Using your sociological imagination, identify at least three demographics or cultural factors. that are likely to influence patterns of media

Organization Design – Premium Paper Help

Premium Paper Help is a professional writing service that provides original papers. Our products include academic papers of varying complexity and other personalized services, along with research materials for assistance purposes only. All the materials from our website should be used with proper references.