...Capstone Project Cover Sheet Capstone Project Title: ABC Inc. Firewall upgrade Report Student Name: Michael Wakefield Degree Program: BS- IT Security Mentor Name: Dave Huff Signature Block Student’s Signature Mentor’s Signature Table of Contents Capstone Summary 3 Review of Other Work 13 Rationale and Systems Analysis 19 Goals and Objectives 25 Project Deliverables 28 Project Plan and Timelines 30 Project Development…………………………………………………………………………………………………………………………….31 Additional Deliverables………………………………………………………………………………………………………………………….35 Conclusion…………………………………………………………………………………………………………………………………………….35 References 37 Appendix 1: Competency Matrix 38 Appendix 2: Cisco ASA 5555-X Firewall Specifications…………………………………………………………….40 Appendix 3: ABC Inc. Project Schedule…………………………………………………………………………………….44 Appendix 4: High-Availability Design Screenshots……………………………………………………………………45 Appendix 5: Screenshots of inside to outside access; outside to DMZ access; NAT rules and configurations; and performance graphs and performance results….........................................51 Capstone Report Summary Internet of Everything (IoE) and “Big Data” equates to competitive advantages to the modern business landscape. Numerous white papers are circulating on the Internet highlighting the business case supporting the IoE initiative. For instance, in a white paper conducted by Cisco Inc. on the Value Index of IoE in 2013 reported the following: ...
Words: 9337 - Pages: 38
...Technical Writing Project Cover Sheet Capstone Proposal Project Name: Upgrading ABC Inc. Internet Edge Student Name: Michael Wakefield Degree Program: Bachelor of Science IT-Security Mentor Name: Signature Block Student’s Signature Mentor’s Signature Table of Contents Capstone Proposal Summary 1 Review of Other Work 8 Rationale and Systems Analysis 16 Goals and Objectives 22 Project Deliverables 26 Project Plan and Timelines 27 References 28 Appendix 1: Competency Matrix 4 Capstone Proposal Summary Internet of Everything (IoE) and “Big Data” equates to competitive advantages to the modern business landscape. Numerous white papers are circulating on the Internet highlighting the business case supporting the IoE initiative. For instance, in a white paper conducted by Cisco Inc. on the Value Index of IoE in 2013 reported the following: In February 2013, Cisco released a study predicting that $14.4 trillion of value (net profit) will be at stake globally over the next decade, driven by connecting the unconnected –people-to-people (P2P), machine-to-people (M2P), and machine-to-machine (M2M) - via the Internet of Everything (IoE). Cisco defines the Internet of Everything as the networked connection of people, process, data, and things. The IoE creates new “capabilities, richer experiences, and unprecedented economic opportunity for businesses, individuals, and countries” (The Internet of Everything, Cisco, Inc. 2014). With such a...
Words: 5523 - Pages: 23
...Final Project Next Generation Firewall By: Edward Caudill Submitted as partial fulfillment of the requirements for the Bachelors of Computer Science Independence University April, 2015 Copyright ( 2015 Edward Caudill This document is copyrighted material. Under copyright law, no parts of this document may be reproduced without the expressed permission of the author. Approval Page INDEPENDENCE UNIVERSITY As members of the Final Project Committee, we certify that we have read the document prepared by __________________ entitled ________________________________________ and recommend that it be accepted as fulfilling the Capstone requirement for the Degree of ________________________________________ ____________________________________________________________Date: _________ Name of Course Instructor ____________________________________________________________Date: _________ Associate Dean Signature ____________________________________________________________Date: _________ Senior Associate Dean Signature I hereby certify that I have read this document prepared under my direction and recommend that it be accepted as fulfilling the dissertation requirement. ____________________________________________________________Date: __________ Course Instructor Abstract Taking advantage of a vulnerability (i.e., an identified weakness), in a...
Words: 3381 - Pages: 14
...accessed using telnet and ftp) (running on Linux), Exchange Server (running on a Windows NT Server) and Oracle Server (running on a Solaris – Sun machine). There is a main switch which direct connected to the router and also connects by department s switch. This solution provides them a better bandwidth for each employee by having each subnet for each department which does not conflict with other department. So the performances of each department would not drag down by others department. In addition, I proposed to set up a firewall on the main switch to have a basic protection from outsider. The firewall is implemented with hardware where hardware-based firewalls protect all the computers on network. A hardware-based firewall is easier to maintain and administer than individual software firewalls. The hardware-based firewall provide the solution include virtual private network (VPN) support, antivirus, antispam, antispyware, content filtering, and other security...
Words: 2841 - Pages: 12
...SE571 Course Project Phase I Professor Wagner November 13, 2011 Security Assessment: Course Project Phase I Introduction This report focuses on a security assessment of Aircraft Solutions (AS), which is a well-known leader in the design and fabrication of component products and services for companies in the electronics, commercial, defense, and aerospace industry. Headquartered in Southern California, AS depends heavily on its highly trained workforce, with a large skill base, that is beneficial for the company’s production. The goal of this report is to identify potential vulnerabilities or threats within the operations at AS while identifying their risks and consequences to the firm. Security Weaknesses Given the three areas if investigation for potential weaknesses to the security of AS, hardware, software and policy, In terms of AS assets and how they will be affected if a security threat is placed, I have concluded that one of its major assets is its Business Process Management Hardware (BPM), which handles end-to-end processes that deal with multiple systems and organizations. AS’s operations rely on this system to connect customers, vendors, and suppliers. If affected by a security threat, AS would not be able to function as usual and information could be potentially harmed. Therefore, I have decided to focus this assessment on the areas of hardware and policy. For instance, in the area of hardware it is noticeable in the network infrastructure that there...
Words: 1296 - Pages: 6
...IS 3220 IT Infrastructure Security Project Part 1: Network Survey Project Part 2: Network Design Project Part 3: Network Security Plan ITT Technical Institute 8/4/15 Project Part 1: Network Survey Network Design and Plan Executive Summary: We have been engaged in business for some time, and have been very successful, however we need to re-examine our network configuration and infrastructure and identify that our network defenses are still reliable, before we make any changes. We need to take a hard look at our current configuration of host, services and our protocols within our organization. Data from a large number of penetration tests in recent years show most corporate networks share common vulnerabilities. Many of these problems could be mitigated by appropriate education in “hacker thinking” for technical staff. We will take a look at our security on routers and switches to make sure there are no leakages of data traffic. OBJECTIVE We have identified that we have loss some major accounts to competitors whose bids have been accurately just under our bid offers by exact amounts. We also believe due to shared reporting and public Web site functions that our Web servers have been compromised and our RFP documents have been leaked to competitors which enabled them to under bid us. We want to mitigate Web threats in the future; we realize the web is a mission critical business tool. We want to purchase new products and services, that will give us an edge and better...
Words: 3355 - Pages: 14
...Aircraft Solutions Security Assessment Phase 2 Table of Contents Executive Summary ……………………………………………………………………..1 Company Overview ……………………………………………………………………..1 Assessment ……………………………………………………………………………….2 Security Vulnerabilities …………………………………………………………............2 A Hardware Firewall Vulnerability …………………………………………………....2 A Software Policy Vulnerability ………………………………………………………..3 Recommended Solutions ………………………………………………………………..5 A Hardware Firewall Solution …………………………………………………...........5 A Software Policy Solution …………………………………………………………….6 Impact on Business Processes …………………………………………………………6 Budget …………………………………………………………………………………....7 Summary ………………………………………………………………………………....9 References ………………………………………………………………………………10 Aircraft Solutions Executive Summary Aircraft Solutions (AS) desired a security assessment to highlight the company’s vulnerabilities. AS is a highly esteemed leader in the design and component manufacturing enterprise those solutions can be used within the business applicability of the electronics, commercial, defense and aerospace industries. There were discovered hardware and software vulnerability of non-firewall at the commercial division and software policy updates. The solutions that will be presented are to purchase a firewall system and update the policy update timeframe within the standards that will be introduced from...
Words: 2065 - Pages: 9
...Unit Five Project Kaplan University Table of Contents 1. Abstract 2. Unit Five Project a. Part One: PCI Compliance Standards b. Part Two: Review Questions 3. References Abstract This project outlines customer credit card use and PCI compliance security standards. Categories that PCI compliance security standards are broken down to are provided in detail. Additionally, in the first part of the project, requirements that should be fulfilled by the owner in order to build and maintain secure networks, protect cardholder data, maintenance vulnerability management programs, implement strong access control measures, monitor and test networks, and maintain information security policies, are detailed herein. In the second part of the project, questions are raised and answered, concerning the information outlined on PCI’s potential role in bringing HGA’s mainframe data storage capabilities up to policy standards. Insights regarding HGA’s role in storing cardholder information, and HGA related software, are provided in question and answer format. Keywords: PCI, security, compliance, networks, HGA, policy, access, mainframe. Unit Five Project Part One: The considerable events here are use of credit card...
Words: 2093 - Pages: 9
...CSS150 – Introduction to Information Security Phase 5 Individual Project Kenneth A. Crawford Dr. Shawn P. Murray June 23, 2013 Table of Contents Phase 1 Discussion Board 2 3 Phase 1 Individual Project 5 Phase 2 Discussion Board 8 Richmond Investments: Remote Access Policy 8 Phase 2 Individual Project 11 Richmond Investments: LAN-to-WAN, Internet, and Web Surfing Acceptable Use Policy 11 Phase 3 Discussion Board: Blaster Worm 17 Phase 3 Individual Project 19 Phase 4 Individual Project: 4 Methods to Keeping Systems Secure 22 1. Keep all software up to date: 22 2. Surf the web cautiously: 22 3. Be cautious with e-mail: 22 4. Anti-Virus Software: 23 Phase 5 Individual Project: 4 Methods to Keeping Systems Secure 24 1. Firewalls: 24 2. System Backups: 24 3. Passwords: 25 4. File Sharing: 26 References 27 Phase 1 Discussion Board 2 The “Internal Use Only” (IUO) data classification includes all data and information not intended for public access. The best way to describe this classification is all company and client information that we do not want to see in a newspaper or on the internet. Some examples of this are: Client lists, Client account numbers, Human Resource files, Payroll files, E-Mails, and many others. This data classification affects all seven IT domains. The first and most important IT domain that the IUO affects is the “User Domain”. The users have to be taught general security and proper use of the systems they...
Words: 5085 - Pages: 21
...Information Assurance 1 The Necessity of Information Assurance Adam Smith Student ID: Western Governors University The Necessity of Information Assurance 2 Table of Contents Abstract ........................................................................................................................................... 5 Introduction ..................................................................................................................................... 6 Project Scope .............................................................................................................................. 6 Defense of the Solution ............................................................................................................... 6 Methodology Justification .......................................................................................................... 6 Explanation of the Organization of the Capstone Report ........................................................... 7 Security Defined ............................................................................................................................. 8 Systems and Process Audit ............................................................................................................. 9 Company Background ................................................................................................................ 9 Audit Details .......................................................
Words: 12729 - Pages: 51
...Project Security Plan This plan was developed by David Hanuschak, Managing Director of On-point Technologies, in cooperation with other key members of the On-point Technologies staff. About On-point Technologies We are a three man great solution for your networking needs. On-point technologies are top rated with the Better Business Bureau for customer satisfaction. Objectives This security plan is our first. We will take a broad view of the security risks facing the firm and take prompt action to reduce our exposure. Everyone remembers the virus attack we had earlier this year, and we hope to avoid another disaster like that! However, I hope that by taking a wider view, we may be able to plan for threats we don’t know about yet. I realize that we are limited in time, people, and (of course) cash. Our main priority is to continue to grow a successful business. We cannot hope for Central Intelligence Agency (CIA)-like security, and it wouldn’t be good for our culture to turn On-point into Fort Knox. The project team has weighed these constraints carefully in deciding what to do and has tried to strike a balance between practicality, cost, comfort, and security measures. We are all convinced, however, that doing nothing is not an option. I am taking responsibility for leading this review and ensuring that all the action items are carried out. I am concerned about the risks we face, although having reviewed the plan, I am sure we can address them properly. This...
Words: 2146 - Pages: 9
...For the integrative network design project, we were to choose from the virtual organizations given on how to upgrade their networks to meet their specific needs. The virtual organization that has been chosen to look at is Kudler Fine Foods, who wanted a Wan to tie all three locations together, to make the internal network configuration in each store a WAN, add VOIP to the multi-store network, figure out which store will house the central servers, and make sure the network is expandable beyond the existing stores. We will be giving a final network design. Specifically in the final network design, we are going to give a timeline for the project, explain the design approach and rationale, analyze the detailed design, prove the design meets the requirements set by Kudler Fine Foods, analyze the current security situation, identify electronic and physical threats to the network, describe potential threat detections and protection techniques, explain the importance of explicit enterprise security policies and procedures, describe how firewalls mitigate some network attack scenarios, describe common security concerns inherent to wired, wireless, and mobile network and design a security hardware and software environment that will protect the organization. The first area we will look at is the design of the new network. The new network will have an overall network architecture of a star network in a WAN or wide area network. Both of these network architecture allow for easy expansion...
Words: 1975 - Pages: 8
...The most important is the frame, because it defines the cockpit space and it was designed first. Consequently, the design needs to be made according to the frame shape in order to fit the seat and firewall into it. A part from the frame, it is also needed to coordinate the designing process with the different stages of the steering wheel and the fuel delivery system. 2. Manufacturing restrictions: It is also necessary to take into account the consequent restrictions of the manufacturing process. This means that the firewall and seat geometry needs to be designed considering the characteristics and limitations of the 5D CNC milling machine (used to obtain the milling models) and the Mould. The most important of these restrictions is the necessity of achieving and adequate geometry to be able to take out the final pieces from the Mould. That is why is desired to get smooth surfaces without sudden changes of direction and complicated shapes in order to avoid problems during the different manufacturing stages. 3. Rules...
Words: 1541 - Pages: 7
...Computer Network Charles Watson PROJ/595 James Hiegel Table of Contents Project Scope…………………………………………………… Pages 1-9 WBS…………………………………………………………….. Page 10 Risk Management Plan…………………………………………. Pages 10-14 References………………………………………………………. Page 15 Project Scope Project Scope Statement Project Name | Computer Network | Project Number | | Project Manager | Charles Watson | Prioritization | | Owner(s) | Charles Watson | Statement of Work—Project Description andProject Product | Updating the network will allow the company to have a more reliable network infrastructure as well as the ability to become more scalable. High deliverables for the project include; what software (NOS, Computer OS, anti-virus, and applications, firewalls) is needed, what hardware (computers, servers, cables, routers, VOIP, firewalls), is needed, documentation, budget, scheduling, planning. I plan on completing this project using a team of four people that are highly knowledgeable in computer networks as well as computer systems. 1. The first step is to determine what antivirus software is needed or if the current one is sufficient, but to just a newer version of what is already installed. To determine if the current one can be updated, it has to be compatible with updates to the server such as the OS, NOS. With confidential information, it is imperative that the antivirus/firewall software and firewall hardware can handle the possibility of network intrusions. 2. The NOS (Network...
Words: 3738 - Pages: 15
...Enhanced security student Self-service system Contents Chapter 1 Introduction to the study 3 1.1 Background of the project 3 1.1.1 Overview 3 1.1.2 Problem context 3 1.1.3 Rationale 4 1.1.4 Target Users 5 1.2 Scope and objectives 5 1.3 Project plan 6 1.3.1 System Functionality 6 1.3.2 Deliverables 7 1.3.3 Project Scheduling 8 1.3.4 Assumptions and Constraints 9 CHAPTER 2: LITERATURE REVIEW 10 2. Domain Research 10 2.1 Real Life Self-service system case studies 10 2.2 Protecting data in a self-service system 13 2.2.1 Data Encryption: 14 What is data encryption? 14 Types of Data encryption: 14 Types of data encryption methods: 15 2.2.2 Digital Signature 16 2.2.3 Firewalls 17 Network layer Firewall: 18 Application layer firewall: 18 Proxies: 19 2.24 Intrusion Detection System (IDS) 20 3. Technical Research 23 3.1 Language 23 JavaScript 23 PHP 24 VB.Net 24 3.2 Databases 25 MS Access 25 MS SQL Server 25 MySQL 26 Language and database justification: 26 3.3 System architecture 27 3.4 Methodology 29 Spiral Model 32 Methodology Justification 32 References: 34 Chapter 1 Introduction to the study 1.1 Background of the project 1.2.1 Overview The paper is based on the improvement of the service at the administration office through the implementation of a new system to replace the traditional way currently used to deliver such services to the student community. It focuses mainly...
Words: 6376 - Pages: 26