Best writers. Best papers. Let professionals take care of your academic papers

Order a similar paper and get 15% discount on your first order with us
Use the following coupon "FIRST15"
ORDER NOW

Attached is the document, I already wrote, but it is picked up

Attached is the document, I already wrote, but it is picked up for

fraud. Please change the words around, because this will be submitted to turn it in. I would like these sections to make sense, you may also change the design of the images too. Thanks in advance!

Business NeedsWWTC goals must be addressed to find a balance between security and business needs.This will be used to balance what risk could be taken if less security measures were in place. Thecompany needs to identify which expenses can be covered on their budget while also calculatingthe return on investment. This would be a balance between obtaining state of the art computersecurity equipment that is very expensive, or buying less expensive equipment that is not assecure. . The network needs to be available every day and it must be able to handle the workloadof day to day operations. Another need the company must have is ensuring their data is safe. Forinstance, if an employee sends an email or any other type of data to another employee, thenetwork should ensure the integrity of the data by preventing it from being tampered with.WWTC must conduct business analyses, return on investment (ROI), and the triad ofconfidentiality, integrity, and availability (CIA) to continue business operations with minimaldisruption.Business analyses will be needed to calculate what the expenses of security devices andconfiguration are going to be, along with whether the cost would be worth additional security ornot. The return on investment will be calculated by using the following formula: ROI = (Gainfrom investment – cost of investment) / Cost of investment. This will cover all the expenses thatwill be used for network devices along with the configuration and maintenance of the network.WWTC will ensure confidentiality by providing access only to authorized personnel on a need toknow basis. The controls that will be configured are the use of encryption, authentication, andaccess controls. Integrity will be provided through the use of authentication, non-repudiation, andaccountability. The organization will have audit logs in case of security breaches, which will notonly save time but revenue as well. High availability will be provided by having WWTCnetworks adopt the Cisco modular approach by having networks separated into modules, which
Background image of page 1
will ease the congestion in the network and provide fault tolerance. Availability will also beneeded to prevent degradation of business operations, resulting in a loss of revenue.Security DiagramThe network architecture for WWTC is taking the defense in depth strategy when it comes tosecurity, which was previously mentioned in the Security Design section above. The following isthe security diagram for WWTC’s New York office:
Background image of page 2

Step-

 
Looking for a Similar Assignment? Order now and Get 10% Discount! Use Coupon Code "Newclient"