Project #2: Security Strategy Implementation Recommendations

Security Strategy Implementation Recommendations

Overview:

Now that the After Action Reports have been analyzed, the consultants must develop a plan for improving the security posture at Sifers-Grayson. This will be documented in a Security Strategy Recommendations document. The security strategy will be based upon multiple layers of policies, processes, and technologies that, when implemented, will be used to defend the Information Technology enterprise from both internal and external threats and attacks. Note: see https://www.techrepublic.com/blog/it-security/understanding-layered-security-and-defense-in-depth/ for a discussion of the differences between these two security strategies: layered security and defense-in-depth. You will need this information for the Security Strategies section of your paper. Two defensive security strategies have been chosen by the senior members of the team.

  1. Defense Strategy #1: Build a DMZ for the R&D Center. The DMZ will host servers accessed by the engineers while teleworking and while reaching back to the R&D center from the test range. The DMZ will require the following: (a) business class routers, (b) business class firewalls, and (c) intrusion detection and prevention system.

Demilitarized Zone (DMZ). For definitions and diagrams see:  

  1. Layering Network Security Through Segmentation”: https://www.cisa.gov/sites/default/files/publications/layering-network-security-segmentation_infographic_508_0.pdf
  2. NIST DMZ Definition”:

https://csrc.nist.gov/glossary/term/demilitarized_zone

  1. “Recommended Practice: Updating Antivirus in an Industrial Control System”—Search for ‘DMZ’ in this document:

https://www.cisa.gov/sites/default/files/2023-01/Recommended%20Practice%20Updating%20Antivirus%20in%20an%20Industrial%20Control%20System_S508C.pdf

  1. “Network Fundamentals”—Scroll down to ‘DMZ’: https://learning.oreilly.com/library/view/principles-of-computer/9781260474329/ch9.xhtml#lev74
  2. Defense Strategy #2: Implement Enterprise-wide Protective and Detective Measures to defend against both internal and external attackers. These measures will include (a) controlling access to software documentation and source code, (b) implementing enterprise-wide identity management, and (c) implementing either a Security Information and Event Management (SIEM) tool or a Unified Threat Management (UTM) tool.

Your Task: You have been assigned to research products which will be used to implement the two Defense Strategies. You will need to research suitable products and then write a report recommending a set of products and services which can be used to implement the selected strategies. Your report will include summary information and explanations about defense in depth and the two selected strategies. Note: You may need to do additional reading and research to find the information required to support your explanations of defense in depth and the selected defense strategies. Make sure that you cite authoritative sources for this information.

Product Research:

  1. Products to Implement Defense Strategy #1 (Build a DMZ for the R&D Center). You must choose one product for each of the following categories (router, firewall, intrusion detection and prevention).
  • Business Class Router with WAP and VPN capability (choose one of the following brands)
    1. Linksys
    2. CISCO
    3. NetGear
    4. Other (must get instructor’s approval first)
  • Business Class Firewall (Network Based) (choose one of the following brands)
    1. SonicWall
    2. Fortinet
    3. Watchguard
    4. CISCO
    5. Other (must get instructor’s approval first)
  • Intrusion Detection and Prevention System (network based – not cloud)
    1. McAfee
    2. Trend Micro
    3. Entrust
    4. Cisco
    5. Other (must get instructor’s approval first)
  1. Products to Implement Defense Strategy #2 (Implement enterprise-wide protection, detection, and prevention capabilities). These tools or applications will be installed or used on Sifers-Grayson servers (cloud hosting NOT allowed). Select one tool in each of the categories listed below. Your product recommendations must include all of the listed categories.
  2. Application Lifecycle Management (ALM) Tool
  3. Identity & Access Management (IAM) Tool
  4. Security Information and Event Management (SIEM) OR Unified Threat Management (UTM)
  5. Forensic Image Capture Utility (e.g. FTK Imager, Belkasoft, Paladin/Sumuri, SIFT)

Note: Make sure that you are using appropriate resources to find information to support your analysis and product recommendations. Vendor websites, industry or trade publication websites, and government websites are usually acceptable sources of information about the defensive strategies and products you will write about in this assignment.  

Write:

  1. An Introduction section which presents the security strategies being recommended in your report. You should explain what how these strategies will improve the overall security posture of Sifers-Grayson.
  2. A Security Strategies section in which you present an analysis of the defensive security strategies and then provide an explanation as to how each of the two selected defensive strategies will improve the security posture for Sifers-Grayson. Include a comparison of the two primary types of strategies – layered security and defense in depth. Then, explain how the selected security strategies use one or both of these approaches. Use information from Project #1 and the Red Team’s penetration tests to support your justification for implementing the selected security strategies.
  3. A Product Evaluations section in which you present and discuss the technologies and products which will be used to implement each strategy. You must have a separate sub-section for each defense in depth strategy. Under each sub-section, you will name and describe the individual products (i.e. describe firewalls and then describe your chosen firewall product). Your presentation of each product should be in the form of a recommendation to purchase / implement.
  4. A Summary Implementation Recommendations section in which you summarize your product recommendations for products and technologies to be used in implementation the two defensive security strategies. Be sure to explain the benefits of implementing the two strategies (e.g. protection, detection, prevention of incidents caused by attacks).

Additional Information

  1. You will need between 5-8 pages to cover all of the required content. There is no penalty for writing more than 8 pages but, clarity and conciseness are valued. If your paper is shorter than 5 pages, you may not have sufficient content to meet the assignment requirements (see the rubric).
  2. As you write your strategy paper, make sure that you address security issues using standard cybersecurity terminology (e.g. protection, detection, prevention, “governance,” confidentiality, integrity, availability, nonrepudiation, assurance, etc.). See the NICCS Glossary https://niccs.cisa.gov/cybersecurity-career-resources/glossary  if you need a refresher on acceptable terms and definitions.
  3. You must include a cover page with the assignment title, your name, and the due date. Your reference list must be on a separate page at the end of your file.
  4. You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs.
  5. You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must follow a consistent citation style (APA).

ADDITIONAL INSTRUCTIONS FOR THE CLASS – Project #2: Security Strategy Implementation Recommendations

Who we are

We are a professional custom writing website. If you have searched for a question and bumped into our website just know you are in the right place to get help with your coursework.

Do you handle any type of coursework?

Yes. We have posted our previous orders to display our experience. Since we have done this question before, we can also do it for you. To make sure we do it perfectly, please fill out our Order Form. Filling the order form correctly will assist our team in referencing, specifications, and future communication.

Is it hard to Place an Order?

  • 1. Click on “Order Now” on the main Menu and a new page will appear with an order form to be filled.
  • 2. Fill in your paper’s requirements in the “PAPER INFORMATION” section and the system will calculate your order price/cost.
  • 3. Fill in your paper’s academic level, deadline, and the required number of pages from the drop-down menus.
  • 4. Click “FINAL STEP” to enter your registration details and get an account with us for record-keeping and then, click on “PROCEED TO CHECKOUT” at the bottom of the page.
  • 5. From there, the payment sections will show, follow the guided payment process and your order will be available for our writing team to work on it.

SCORE A+ WITH HELP FROM OUR PROFESSIONAL WRITERS – Project #2: Security Strategy Implementation Recommendations

We will process your orders through multiple stages and checks to ensure that what we are delivering to you, in the end, is something that is precise as you envisioned it. All of our essay writing service products are 100% original, ensuring that there is no plagiarism in them. The sources are well-researched and cited so it is interesting. Our goal is to help as many students as possible with their assignments, i.e. our prices are affordable and services premium.

  • Discussion Questions (DQ)

Initial responses to the DQ should address all components of the questions asked, including a minimum of one scholarly source, and be at least 250 words. Successful responses are substantive (i.e., add something new to the discussion, engage others in the discussion, well-developed idea) and include at least one scholarly source. One or two-sentence responses, simple statements of agreement or “good post,” and responses that are off-topic will not count as substantive. Substantive responses should be at least 150 words. I encourage you to incorporate the readings from the week (as applicable) into your responses.

  • Weekly Participation

Your initial responses to the mandatory DQ do not count toward participation and are graded separately. In addition to the DQ responses, you must post at least one reply to peers (or me) on three separate days, for a total of three replies. Participation posts do not require a scholarly source/citation (unless you cite someone else’s work). Part of your weekly participation includes viewing the weekly announcement and attesting to watching it in the comments. These announcements are made to ensure you understand everything that is due during the week. Project #2: Security Strategy Implementation Recommendations

  • APA Format and Writing Quality

Familiarize yourself with the APA format and practice using it correctly. It is used for most writing assignments for your degree. Visit the Writing Center in the Student Success Center, under the Resources tab in Loud-cloud for APA paper templates, citation examples, tips, etc. Points will be deducted for poor use of APA format or absence of APA format (if required). Cite all sources of information! When in doubt, cite the source. Paraphrasing also requires a citation. I highly recommend using the APA Publication Manual, 6th edition.

  • Use of Direct Quotes

I discourage over-utilization of direct quotes in DQs and assignments at the Master’s level and deduct points accordingly. As Masters’ level students, it is important that you be able to critically analyze and interpret information from journal articles and other resources. Simply restating someone else’s words does not demonstrate an understanding of the content or critical analysis of the content. It is best to paraphrase content and cite your source. Project #2: Security Strategy Implementation Recommendations

  • LopesWrite Policy

For assignments that need to be submitted to Lopes Write, please be sure you have received your report and Similarity Index (SI) percentage BEFORE you do a “final submit” to me. Once you have received your report, please review it. This report will show you grammatical, punctuation, and spelling errors that can easily be fixed. Take the extra few minutes to review instead of getting counted off for these mistakes. Review your similarities. Did you forget to cite something? Did you not paraphrase well enough? Is your paper made up of someone else’s thoughts more than your own? Visit the Writing Center in the Student Success Center, under the Resources tab in Loud-cloud for tips on improving your paper and SI score.

  • Late Policy

The university’s policy on late assignments is a 10% penalty PER DAY LATE. This also applies to late DQ replies. Please communicate with me if you anticipate having to submit an assignment late. I am happy to be flexible, with advance notice. We may be able to work out an extension based on extenuating circumstances. If you do not communicate with me before submitting an assignment late, the GCU late policy will be in effect. I do not accept assignments that are two or more weeks late unless we have worked out an extension. As per policy, no assignments are accepted after the last day of class. Any assignment submitted after midnight on the last day of class will not be accepted for grading.

  • Communication

Communication is so very important. There are multiple ways to communicate with me: Questions to Instructor Forum: This is a great place to ask course content or assignment questions. If you have a question, there is a good chance one of your peers does as well. This is a public forum for the class. Individual Forum: This is a private forum to ask me questions or send me messages. This will be checked at least once every 24 hours. Project #2: Security Strategy Implementation Recommendations

    SCORE A+ WITH HELP FROM OUR PROFESSIONAL WRITERS

    We will process your orders through multiple stages and checks to ensure that what we are delivering to you, in the end, is something that is precise as you envisioned it. All of our essay writing service products are 100% original, ensuring that there is no plagiarism in them. The sources are well-researched and cited so it is interesting. Our goal is to help as many students as possible with their assignments, i.e. our prices are affordable and services premium. Looking for a Similar Assignment? Order a custom-written, plagiarism-free paper