Page 1

CIS 534 Week 3 Case Study The Ethical Hacker

For more classes visit www.snaptutorial.com Case Study: The Ethical Hacker Due Week 3 and worth 70 points Imagine for a moment that you are a hacker; an ethical one. You are called upon by law enforcement based on your expertise to hack into a network of a business known to be launching crimes against humanity as its primary mission for operation and capital gain. Assume you are not to be concerned with any politics of the job and your actions are legal and ethically justified. This nefarious business takes its own security seriously and therefore has implemented several forms of network security such as firewalls, Web proxies for its Web gateways, and VPNs for remote users. You also know that this business exists much like any normal corporation, renting several floors of office space to accomm …………………………………………………………………………………

CIS 534 Week 4 Assignment 1 Defense in Depth

For more classes visit


www.snaptutorial.com Assignment 1: Defense in Depth Due Week 4 and worth 70 points Oftentimes, the process of implementing security opens one’s eyes to other forms of security they hadn’t thought of previously. Well, in this assignment you should experience just that. This assignment focuses on a model of implementing security in layers which in many cases requires a network that is designed accordingly. In this assignment, you are to design a network to incorporate the following: Corporate Site (Chicago) • All servers exist here (Web server, file server, print server, mail server, ftp server) • Connection to the Internet (50mbps) • 300 employees who only need access to local corporate resources and the Internet 1 Remote Site (8 miles away) • 20 employees who need access to all resources at corporate plus the Internet • Connection to the Internet (3mbps) …………………………………………………………………………………

CIS 534 Week 8 Assignment 2 Mister Network Engineer

For more classes visit www.snaptutorial.com Assignment 2: Mister Network Engineer Due Week 8 and worth 70 points Using the network diagram below, your task is to incorporate the devices on the lower right into the diagram to create a secure


corporate network. The devices you need to incorporate into the network diagram include: Web server, ftp server, vulnerability scanner, an …………………………………………………………………………………

CIS 534 Week 10 Term Paper Project: Designing a Secure Network

For more classes visit www.snaptutorial.com Term Paper Project: Designing a Secure Network Due Week 10 and worth 190 points This term paper involves putting together the various concepts learned throughout this course. You are tasked with designing the most secure network possible, keeping in mind your goal of supporting three (3) IT services: email, file transfer (centralized), and VPN. Your first step is to design a single network capable of supporting there three (3) different services. Once you have fully designed your network, you will need to provide three (3) workflow diagrams explaining how your designed network handles the three (3) different transactions. The first is an internal user sending an email using his / her corporate email address to a user on the Yahoo domain with an arbitrary address of user534@yahoo.com. The second workflow diagram should show a user initiating an FTP session from inside your network to the arbitrary sit …………………………………………………………………………………

CIS 534 Possible is Everything/snaptutorial.com  

For more classes visit www.snaptutorial.com Case Study: The Ethical Hacker Due Week 3 and worth 70 points Imagine for a moment that you are...

CIS 534 Possible is Everything/snaptutorial.com  

For more classes visit www.snaptutorial.com Case Study: The Ethical Hacker Due Week 3 and worth 70 points Imagine for a moment that you are...

Advertisement