You may perhaps well well perhaps also very well be the cybersecurity legit for Company A and are

You may perhaps well well perhaps also very well be the cybersecurity legit for Company A and are accountable for preserving the guidelines of the company. Your roles encompass managing the company’s cybersecurity capabilities and instruments, conducting vulnerability management, and assessing grief to sensitive files. Company A has honest not too lengthy ago purchased Company B and desires to merge every networks.

Executives of Company A take into accout tasked you with making grief-essentially based choices on integrating Company B’s community with Company A’s existing community. Company B has provided its most modern vulnerability scans, community diagrams, and existing cybersecurity capabilities and instruments. As a deliverable to the executives, you are going to submit your concepts for a gradual community make that merges the 2 networks and enables distant entry for staff of every companies in the operate of a merger and implementation plot.

For this project, you are going to exhaust the given grief and the next supporting paperwork to total your community merger and implementation plot:

•  “Company A Community Blueprint”

•  “Company A Threat Prognosis”

•  “Company B Community Blueprint”

•  “Company B Vulnerability Portray and Cybersecurity Tools”

Scenario Company A is a world company essentially based in the US that operates in the monetary trade. Company A serves its customers with monetary products, a lot like checking accounts, bank playing cards, and funding products. Company A has honest not too lengthy ago purchased Company B and wants to combine with or rob away identical capabilities and instruments from Company B. Company B is smaller in size, has no dedicated cybersecurity legit position, and makes use of third-occasion make stronger for infrastructure needs. Company B supplies essentially honest correct instrument to scientific suppliers and accepts credit playing cards as a fee possibility.  The executives of the newly merged company take into accout expressed passion in integrating the exhaust of the cloud to permit for scalability and redundancy. Because the safety legit of the merged networks, you are tasked with rising a gradual community make that entails the exhaust of zero belief suggestions and that makes use of every on-premises and cloud infrastructure. You also were tasked with guaranteeing compliance with all regulatory necessities of the merged company, along with utilizing cloud-essentially based technologies to fabricate security capabilities. Company executives take into accout provided a funds of $50,000 in the indispensable year to operate a gradual community make to operate the most of cloud-essentially based services and products. Necessities Your submission may perhaps well well take into accout to be your long-established work.
.    A.  Picture two present community security complications and two present infrastructure complications for every company, in step with trade necessities given in the grief.
B.  Analyze the given community plot and vulnerability scan for every companies by doing the next:  1.  Picture two existing vulnerabilities for every company.  2.  Exhibit the affect, grief, and likelihood linked with every described vulnerability from allotment B1 as it pertains to every company.
C.  Make a community topology plot with crucial suggestions of the proposed merged community necessities.
D.  Identify the layer for all parts in the topology plot referencing the layers of the OSI mannequin and TCP/IP protocol stack.
E.  Exhibit the reason for including, deleting, or repurposing community parts in the newly merged community topology plot, including crucial suggestions of how every element addresses budgetary constraints.          F.   Exhibit two steady community make suggestions which will be ragged in the proposed community topology plot.
G.  Exhibit how the proposed merged community topology plot addresses two regulatory compliance necessities which will be relevant to the newly merged company, including the next in your clarification:  •   the name of the regulatory compliance requirement  •   why the regulatory requirement is relevant to the newly merged company  •   how the proposed merged community topology plot meets the regulatory requirement
H.  Picture two emerging threats which will be applicable to the merged organization, including the next in the outline:  •   seemingly community security risks of enforcing the topology  •   seemingly performance impacts on the merged community after implementation of the proposed make  •    administer the identified seemingly security risks
I.  Summarize your concepts for implementation of this proposed merged community in step with the grief and budgetary necessities, including the next in the summary:  •   a worth-earnings prognosis for on-premises and cloud infrastructure solutions  •   a justification to your concepts to implement the proposed steady merged community make
J.  Acknowledge sources, the exhaust of in-textual dispute material citations and references, for dispute material that’s quoted, paraphrased, or summarized.
Okay.  Demonstrate legit dialog in the dispute material and presentation of your submission.

Apply this rubric  :  A:BUSINESS REQUIREMENTS:The submission precisely describes 2 or extra present community security complications and at 2 or extra present infrastructure complications for every company and is aligned with the trade necessities given in the grief.
B1:VULNERABILITIES : The submission precisely describes 2 or extra existing vulnerabilities for every company. The vulnerabilities described are in alignment with the given community plot and vulnerability scan.
B2:IMPACT, RISK, LIKELIHOOD:  The submission explains the affect, grief, and likelihood linked with every described vulnerability from allotment B1 as it pertains to every company. The clarification is total and in alignment with the given community plot and vulnerability scan.
C:TOPOLOGY DIAGRAM: The community topology plot with the crucial suggestions of the proposed merged community necessities is equipped. The plot is total and meets the wishes provided in the grief. MAke a desk beneath the topology for prices that encompass the entirety that we added and reveal that it stays beneath the 50k funds
D:TOPOLOGY COMPONENTS: The submission as it’ll be identifies the layer for all parts in the topology plot referencing the layers of the OSI and TCP/IP protocol stack
E:RATIONALE : The submission explains the reason for including, deleting, or repurposing community parts in the newly merged community topology plot and entails the crucial suggestions of how every element addresses budgetary constraints. The clarification is in alignment with the given grief.  F:SECURE NETWORK DESIGN PRINCIPLES :  The submission explains 2 or extra steady community make suggestions which will be ragged in the proposed community topology plot. The clarification clearly names the steady community make suggestions being ragged and how every principle aligns with the proposed community topology plot.
G:REGULATORY COMPLIANCE : The submission precisely explains how the proposed merged community topology plot addresses 2 or extra regulatory compliance necessities and entails the total listed parts. The regulatory compliance necessities are relevant to the newly merged company.
H:EMERGING THREATS : The submission precisely describes 2 or extra emerging threats which will be applicable to the newly merged organization and entails the total given suggestions.
I:SUMMARY RECOMMENDATIONS: The submission summarizes the concepts for implementation of the proposed merged community. The summary is logical and in alignment with the grief and budgetary necessities and entails all listed specs.

  • CompanyARiskAnalysis1.docx

  • CompanyBVulnerabilityReportandCybersecurityTools1.docx

  • CompanyANetworkDiagram.docx

  • CompanyBNetworkDiagram.docx

D482: Actual Community Originate

DHN1: Actual Community Originate Company A Threat Prognosis

PAGE 1

PAGE 2

Company A Threat Prognosis

Company A performed an interior grief prognosis in anticipation of machine integration with Company B. This grief prognosis turned into performed in step with NIST SP 800-30 Rev 1 to identify the next:

• vulnerabilities

• grief likelihood

Desk A. Threat Classifications

Threat Stage

Description

High

The lack of confidentiality, integrity, or availability will be expected to take into accout a extreme or catastrophic negative enact on organizational operations, organizational resources, or folks.

Moderate

The lack of confidentiality, integrity, or availability will be expected to take into accout a valuable negative enact on organizational operations, organizational resources, or folks.

Low

The lack of confidentiality, integrity, or availability will be expected to take into accout a cramped negative enact on organizational operations, organizational resources, or folks.

Desk B. Data Sensitivity

Originate of Data

Sensitivity

Confidentiality

Integrity

Availability

Buyer PII (e.g., Account Numbers, Social Security Numbers, and Phone Numbers)

High

High

Moderate

Worker PII (e.g., Social Security Numbers and Worker Identification Numbers)

High

High

Moderate

Company intellectual property (e.g., credit scoring calculations)

High

High

Moderate

Marketing and advertising

Moderate

Moderate

Low

Desk C. Gadget Inventory

Gadget Parts

Servers

Home windows server 2019; position: interior SharePoint server

Home windows server 2019; position: Replace server

Home windows server 2012; position: Software program server

Home windows server 2012R2; File server

DMZ Home windows server 2012; position: FTP and external Web Server

Workstations

75 – Home windows 10 Respectable

20 – configured for distant desktop entry

Switches

4 – Cisco 3750X

Firewall

Fortinet’s Fortigate 800D NGFW

Border router

Cisco 7600

Laptops

14 – Home windows 7

6 – Home windows 11

Wi-fi Access Points

2 – Meraki MR28

Cable plant

Cat5e

Desk D. Threat Identification

Threat #

Vulnerability

Threat Likelihood

1

Initiate ports 21-90, 3389

High

2

All customers exhaust eight-character passwords

High

3

Particular person accounts not required are not removed

Moderate

4

All customers take into accout native administrative privileges

Moderate

5

Original password adjustments are not enforced

Moderate

6

Pause-of-Life Equipment in exhaust

Low

image1.jpeg

,

D482 – Actual Community Originate

DHN1: Actual Community Originate

PAGE 1

PAGE 2

Company B Vulnerability Portray

Company B performed this vulnerability evaluation in anticipation of machine integration with Company A. This evaluation turned into performed by a qualified third-occasion assessor, and this myth has been generated with the outcomes. This evaluation turned into performed in step with a methodology described in NIST 800-30 Rev 1 to identify the next:

· Vulnerabilities the exhaust of the CVSS mannequin

· Severity

· Likelihood of prevalence

Desk A. Threat Classifications

Threat Stage

Description

High

The lack of confidentiality, integrity, or availability will be expected to take into accout a extreme or catastrophic negative enact on organizational operations, organizational resources, or folks.

Moderate

The lack of confidentiality, integrity, or availability will be expected to take into accout a valuable negative enact on organizational operations, organizational resources, or folks.

Low

The lack of confidentiality, integrity, or availability will be expected to take into accout a cramped negative enact on organizational operations, organizational resources, or folks.

Desk B. Severity

Severity Stage (CVSS Model)

Description

Necessary

· Exploitation of the vulnerability doubtless finally ends up in root-level compromise of servers or infrastructure devices.

· Exploitation is steadily easy in the sense that the attacker would not need any special authentication credentials or info about particular particular person victims and would not settle on to lead a target consumer, to illustrate, via social engineering, to operate any special functions.

High

· The vulnerability will not be easy to exhaust.

· Exploitation may perhaps well well perhaps cease in elevated privileges.

· Exploitation may perhaps well well perhaps cease in valuable files loss or downtime.

Medium

· Vulnerabilities that require the attacker to manage particular particular person victims via social engineering ways.

· Denial of service vulnerabilities which will be not easy to plot up.

· Exploits that require an attacker to live to mutter the tale the identical native community because the victim.

· Vulnerabilities the attach exploitation provides easiest very cramped entry.

· Vulnerabilities that require consumer privileges for a hit exploitation.

Low

Exploitation of such vulnerabilities customarily requires native or bodily machine entry and would take into accout minute affect on the organization.

Desk C. Stage of Effort

Stage of Effort

Description

High

This requires a high level of dedicated effort from one or extra groups on serious programs, including patching, a pair of configuration adjustments, or extremely technical adjustments that grief bringing services and products down.

Moderate

Right here is a medium-level effort that requires substantial dedication from a partial or total group. This might perhaps well perhaps affect services and products or plot off a partial outage.

Low

These are particular particular person or miniature group efforts on the total requiring a minimal time dedication and require working an update or remedial reveal or series of commands that’s not going to affect production services and products.

Desk D. Gadget Inventory

Gadget Parts

Servers

Virtualized farm working on Hyper-V (2 hosts). Home windows Server 2019 and Ubuntu Linux. Approximately 20 virtualized servers (all the plan in which via the 2 hosts), including the next roles:

· (Ubuntu Linux) FTP server for EDI Incoming Operations

· 3x Area Controllers (1 ragged for M365 identification sync)

· 1x File Storage/Server

· 1x Ruby On Rails server

· 3x ElasticSearch servers (cluster)

· 5x web application servers (Ubuntu Linux cluster, 1x PostGRESQL, 1x MariaDB SQL, 3x working nginX Plus wreverse caching proxy, 1x working Apache Tomcat, PHP 8, web hosting SSL/TLS certificates)

· 4x Distant Desktop Servers for interior shared/purposes

· 2x legacy Replace servers (submit-migration)

75 Workstations

Home windows XP, 7, 10/11 Respectable, Ubuntu Linux, MacOS

Switches

HPE JL262A Aruba 2930F 48G PoE+

Firewall

2x Sophos XG firewalls

Border router

Verizon FIOS router (CR1000A)

Laptops

Home windows 10, 11, Ubuntu 22.04 LTS, MacOS (Ventura, Monterey, Mountainous Sur)

Wi-fi Access Points

10x HPE JZ337A Aruba AP-535

Cable plant

Cat6a

Desk E. Threat Identification

Threat #

Vulnerability (NVT Name)

NVT OID

Severity

Threat

Stage of Effort

1

Allotted Ruby (dRuby/DRb) More than one Distant Code Execution Vulnerabilities

1.3.6.1.4.1.25623.1.0.108010

Necessary

High

High

2

MFA not enforced all the plan in which via all customers

High

High

High

3

Rexec service is working

1.3.6.1.4.1.25623.1.0.100111

High

High

Low

4

All customers take into accout native administrative privileges

Medium

Moderate

High

5

Java RMI Server Skittish Default Configuration Distant Code Execution Vulnerability on publicly-coping with server

1.3.6.1.4.1.25623.1.0.140051

Necessary

High

Moderate

6

Working Gadget (OS) Pause of Life (EOL) Detection

1.3.6.1.4.1.25623.1.0.103674

Necessary

High

Low

7

rlogin Passwordless Login

1.3.6.1.4.1.25623.1.0.113766

High

Moderate

Low

8

Apache Tomcat AJP RCE Vulnerability (Ghostcat)

1.3.6.1.4.1.25623.1.0.143545

Necessary

High

Moderate

9

PostgreSQL dilapidated password

1.3.6.1.4.1.25623.1.0.103552

High

High

Low

10

PostgreSQL admin is reachable from web

Necessary

High

Low

11

VNC Brute Force Login

1.3.6.1.4.1.25623.1.0.106056

High

High

Low

12

FTP Brute Force Logins Reporting

1.3.6.1.4.1.25623.1.0.108718

High

High

Low

13

phpinfo() output Reporting

1.3.6.1.4.1.25623.1.0.11229

High

Moderate

Low

14

vsftpd Compromised Offer Functions Backdoor Vulnerability

1.3.6.1.4.1.25623.1.0.103185

High

High

Moderate

15

rsh Unencrypted Cleartext Login

1.3.6.1.4.1.25623.1.0.100080

High

Moderate

Moderate

QUALITY: 100% ORIGINAL PAPER NO ChatGPT.NO PLAGIARISMCUSTOM PAPER

Best Custom Essay Writing Services

Looking for unparalleled custom paper writing services? Our team of experienced professionals at AcademicWritersBay.com is here to provide you with top-notch assistance that caters to your unique needs.

We understand the importance of producing original, high-quality papers that reflect your personal voice and meet the rigorous standards of academia. That’s why we assure you that our work is completely plagiarism-free—we craft bespoke solutions tailored exclusively for you.

Why Choose AcademicWritersBay.com?

  • Our papers are 100% original, custom-written from scratch.
  • We’re here to support you around the clock, any day of the year.
  • You’ll find our prices competitive and reasonable.
  • We handle papers across all subjects, regardless of urgency or difficulty.
  • Need a paper urgently? We can deliver within 6 hours!
  • Relax with our on-time delivery commitment.
  • We offer money-back and privacy guarantees to ensure your satisfaction and confidentiality.
  • Benefit from unlimited amendments upon request to get the paper you envisioned.
  • We pledge our dedication to meeting your expectations and achieving the grade you deserve.

Our Process: Getting started with us is as simple as can be. Here’s how to do it:

  • Click on the “Place Your Order” tab at the top or the “Order Now” button at the bottom. You’ll be directed to our order form.
  • Provide the specifics of your paper in the “PAPER DETAILS” section.
  • Select your academic level, the deadline, and the required number of pages.
  • Click on “CREATE ACCOUNT & SIGN IN” to provide your registration details, then “PROCEED TO CHECKOUT.”
  • Follow the simple payment instructions and soon, our writers will be hard at work on your paper.

AcademicWritersBay.com is dedicated to expediting the writing process without compromising on quality. Our roster of writers boasts individuals with advanced degrees—Masters and PhDs—in a myriad of disciplines, ensuring that no matter the complexity or field of your assignment, we have the expertise to tackle it with finesse. Our quick turnover doesn’t mean rushed work; it means efficiency and priority handling, ensuring your deadlines are met with the excellence your academics demand.

ORDER NOW and experience the difference with AcademicWritersBay.com, where excellence meets timely delivery.

NO PLAGIARISM