Due Week 8 and worth 130 points Review the page requirements and formatting instructions for this assignment closely. Graphically depicted solutions, as well as the standardized formatting requirements, do NOT count toward the overall page length. Imagine you are an Information Systems Security Officer for a medium-sized financial services firm that has operations in four (4) states (Virginia, Florida, Arizona, and California). Due to the highly sensitive data created, stored, and transported by your organization, the CIO is concerned with implementing proper security controls for the LAN-to-WAN domain. Specifically, the CIO is concerned with the following areas: The CIO has tasked you with proposing a series of hardware and software controls designed to provide security for the LAN-to-WAN domain. The CIO anticipates receiving both a written report and diagram(s) to support your recommendations. Write a three to five (3-5) page paper in which you: The graphically depicted solution is not included in the required page length. Your assignment must follow these formatting requirements: The specific course learning outcomes associated with this assignment are: Purchase the answer to view it Purchase the answer to view it Purchase the answer to view it Purchase the answer to view it

The responsibility of an Information Systems Security Officer (ISSO) in a financial services firm is to ensure the implementation of proper security controls for the LAN-to-WAN domain. This domain is crucial as it deals with the communication between the organization’s Local Area Network (LAN) and the Wide Area Network (WAN). The Chief Information Officer (CIO) is concerned about the security of this domain due to the highly sensitive data handled by the organization.

To address these concerns, the ISSO needs to propose a series of hardware and software controls that would provide security for the LAN-to-WAN domain. These controls should focus on protecting the confidentiality, integrity, and availability of data during its creation, storage, and transportation within the organization’s network infrastructure.

A hardware control that can be implemented is the use of firewalls. Firewalls act as a barrier between the LAN and the WAN, inspecting incoming and outgoing network traffic to determine if it meets certain security criteria. Firewalls can be configured to block unauthorized access attempts, prevent malicious downloads, and filter out potentially harmful content from entering or leaving the network. Additionally, Intrusion Detection Systems (IDS) can be installed to detect and prevent unauthorized access attempts, network attacks, or any suspicious activities in the LAN-to-WAN domain.

In terms of software controls, encryption plays a vital role in securing data in transit. Implementing Secure Socket Layer (SSL) or Transport Layer Security (TLS) protocols can ensure the encryption of data when it is transmitted over the LAN-to-WAN domain. This protects the confidentiality and integrity of the data, as it is rendered unreadable to any unauthorized individuals or systems intercepting the communication.

Furthermore, access controls should be implemented to restrict unauthorized access to sensitive data. This can be achieved through the use of strong authentication methods such as two-factor authentication or biometric authentication. Network Access Control (NAC) solutions can also be utilized to ensure that only authorized devices and users are allowed to access the LAN-to-WAN domain.

Additionally, regular patching and updating of software and firmware within the LAN-to-WAN domain is necessary to address any vulnerabilities or weaknesses. This prevents potential exploits that could be used to compromise the security of the network. Strong password policies should also be enforced to prevent unauthorized access to systems and sensitive data.

In conclusion, the ISSO needs to propose a series of hardware and software controls to provide security for the LAN-to-WAN domain in a financial services firm. These controls should include firewalls, Intrusion Detection Systems, encryption protocols, access controls, regular patching and updating of software and firmware, and strong password policies. By implementing these controls, the organization can mitigate potential security risks and protect the confidentiality, integrity, and availability of its data.

Need your ASSIGNMENT done? Use our paper writing service to score better and meet your deadline.


Click Here to Make an Order Click Here to Hire a Writer