You are a network security consultant and have been hired by a manufacturing firm, Vandelay Industries, to help them secure their enterprise network. Each item below was requested by Vandelay’s executive management and small IT team. Assume that the company has nothing in terms of security as you approach recommending solutions in these areas. Also assume that money is no object, so don’t worry about how much something costs but be within reason in the context of the company’s details below. In other words, they’re not a Bank of America with a 300 million dollar information security budget.
Vandelay’s requested milestones:
Prevention and detection of phishing messages.
Defense of workstations and servers (aka endpoint defense).
Top five operating system hardening techniques for Windows workstations.
Network defense and security monitoring.
Best practices for protecting sensitive systems & information within AWS
Network architecture recommendations to prevent ransomware and destructive malware outbreaks.
Aggressive monitoring on a small group of servers containing highly sensitive information.
Physical security recommendations for both facilities.
Vandelay corporate information and network details:
375 employees, two locations – a HQ building and one distribution facility nearby (pictures attached of each building).
Employees use Windows workstations. Vandelay’s full system fleet has a mixture of Windows workstations, Windows servers, and Linux/Unix servers.
Vandelay utilizes Microsoft O365 for email, productivity, cloud storage etc.
Vandelay utilizes AWS for their corporate website in addition to several applications such as inventory tracking, logistics, customer ordering etc.
You don’t need to go extremely deep, but pitch recommendations that are well thought-out and make sense for this company.
Your paper should be at a minimum:
Five pages double-spaced NOT including the cover page, index, reference page etc. That means a minimum of five pages of your own content to address the eight items above.
Using APA formatting – https://owl.purdue.edu/owl/research_and_citation/apa_style/apa_formatting_and_style_guide/general_format.html
Utilizing no less than 5-7 high-quality references
Using no copied material or direct quotes from your references.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more