Project #59886 - Enterprise Security Discussion Questions

Enterprise Security Discussion Questions

NO PLAGIARISM PLEASE! These are informal answers.  NOT an essay paper. 

Answer the 8 Discussion Questions below.

#1.  Write a 200- to 300-word short-answer response for the following:
Review the Threat Management Gateway (TMG) Overview lab (Link and document attached). What did you learn? What did you think was most valuable? Why?

#2.  Respond to Troy on his answer to #1 in a minimum of 200 words.

I found this lab difficult to locate at first within the TechNet site. I did eventually locate it and get the lab running (for classmates that have not done it yet, when launching the lab use the Web Client not the Windows Client) and it took a little while to familiarize myself with what the lab was intended to do. You must first download the manual to get instructions for the different exercises. Once I learned how to use the connections tab to navigate through the different computers I followed all instructions to completion of the lab.
I first learned how to use the Threat Management Gateway (TMG) configuration setting to properly enable or disable the malware inspection feature. The Malware Inspection functionality is part of the new Web Access Policy. Next, I followed the steps to learn how to use the Network Inspection System (NIS) on TMG to block network traffic related to exploiting unpatched computers. The third step is an exercise to learn the Controlling Web Access with URL Filtering. URL Filtering uses the online Microsoft Reputation Service database to find the categorization of a particular URL. The last lab exercise deals with configuring outbound HTTPS inspection. I followed the steps to configure TMG to inspect outbound HTTPS network traffic. To implement outbound HTTPs inspection, TMG will intercept outgoing HTTPS requests, and set up two separate HTTPS connections for each client connection.
It is hard to say which of these exercises is most valuable because they all are important features to protect a network. I would say I think the most important is the proper configuration of the malware inspection. This feature protects the network from viruses entering the system. Malware can be extremely damaging to a network and can result in denial of service.

#3.  Write a 200- to 300-word short-answer response for the following:
Discuss the general architecture of enterprise systems, including both hardware and software components. Provide at least two examples of each for a system with which you are familiar (from experience or research).

#4.  Respond to Peter on his answer to #3 in a minimum of 200 words.

The goal of enterprise architecture is to create a unified IT environment standardized hardware and software systems across the firm or all of the firm's business units, with tight symbiotic links to the business side of the organization which typically is 90% of the firm as seen earlier, at least by way of budget and its strategy. More specifically, the goals are to promote alignment, standardization, reuse of existing IT assets, and the sharing of common methods for project management and software development across the organization. The end result, theoretically, is that the enterprise architecture will make IT cheaper, more strategic, and more responsive.
The purpose of enterprise architecture is to create a map of IT assets and business processes and a set of governance principles that drive an ongoing discussion about business strategy and how it can be expressed through IT. There are many different suggested frameworks to develop a enterprise architecture. Most frameworks contain four basic domains, such as:
    1    Business architecture: documentation that outlines the company's most important business processes.
    2    Information architecture: identifies where important blocks of information, such as a customer record, are kept and how one typically accesses them.
    3    Application system architecture: a map of the relationships of software applications to one another.
    4    The infrastructure technology architecture: a blueprint for the gamut of hardware, storage systems, and networks. The business architecture is the most critical, but also the most difficult to implement, according to industry practitioners.

#5.  Respond to Mack on his answer to #3 in a minimum of 200 words.

The general architecture of enterprise system is a like a blueprint or game plan that details the operation and structure of an organization. The purpose of an enterprise architecture is to establish how a business can essentially and effectively attain its current and future aspirations. The enterprise architecture for IT is utilized to build a constant infrastructure, simple integration, and reinforce coordination, and provide an efficient method to develop technology resolutions. An efficient Enterprise Architecture enables consistency in delivering of effective services to their employees. When deploying IT needs and services, the Enterprise Architecture allows you to define roles, standards, technologies, policies, business models, and decision-making specifications. So, basically the architecture of the enterprise systems are very important in order to detail the rules that are utilized to acquire, configure, and managed technology. There are hardware and software components that are involve within the enterprise systems architecture. Some example of hardware components are servers, printers, and desktop computers. Some software components for architecture enterprise systems are office suite, database management systems, and the operating system. Establishing the rules and policies for the mention hardware and software components is critical to an organization. The architecture allows you to detail how each component will operate and function.


#6.  Write a 200- to 300-word short-answer response for the following:
What are two important security issues that enterprise systems commonly face? How do these issues threaten information and what high-level steps can a company take to mitigate these threats?

#7. Write a 200- to 300-word short-answer response for the following:
In addition to the system components, what are other likely vulnerabilities? What makes them tempting targets? How could an attacker exploit them?

#8. Write a 200- to 300-word short-answer response for the following:
What are three important security risks when developing cross-functional systems? How can these be addressed during system development and system implementation?

Subject Computer
Due By (Pacific Time) 02/28/2015 06:00 am
Report DMCA

Chat Now!

out of 1971 reviews

Chat Now!

out of 766 reviews

Chat Now!

out of 1164 reviews

Chat Now!

out of 721 reviews

Chat Now!

out of 1600 reviews

Chat Now!

out of 770 reviews

Chat Now!

out of 766 reviews

Chat Now!

out of 680 reviews
All Rights Reserved. Copyright by - Copyright Policy