Best writers. Best papers. Let professionals take care of your academic papers

Order a similar paper and get 15% discount on your first order with us
Use the following coupon "FIRST15"
ORDER NOW

Hello, I would like to get some assistance with the attached scenario.

Hello, I would like to get some assistance with the attached scenario.

I do not need you to write me an assignment as I have done most of it already. I would like if someone could give me an assessment of the network topology, authentication, access points (internal/external), mobility and suggestions for risk mitigation. Thanks.

GLOBAL FINANCE, INC. (GFI)Global Finance, Inc. (GFI) is a financial company that manages thousands of accounts across Canada, the UnitedStates, and Mexico. A public company traded on the NYSE, GFI specializes in financial management, loanapplication approval, wholesale loan processing, and investment of money management for their customers.The diagram below displays the executive management team of GFI:Figure 1 GFI Executive Organizational ChartBACKGROUND AND YOUR ROLEYou are the Chief Security Officer, hired by COO Mike Willy, to protect the physical and operationalsecurity of GFI’s corporate information systems. Shortly after starting in your new position, you recognizenumerous challenges that you will be facing in this pursuit.Your primary challenge, as is usually the case, is less technical and more of a political nature. CEO JohnThompson has been swept up in the “everything can be solved by outsourcing” movement. He believesthat the IT problem is a known quantity and feels the IT function can be almost entirely outsourced atfractions of the cost associated with creating and maintaining an established internal IT department. In fact,the CEO’s strategy has been to prevent IT from becoming a core competency since so many services canbe obtained from 3rdparties. Based on this vision, the CEO has already begun downsizing the ITdepartment and recently presented a proposal to his senior management team outlining his plan to greatlyreduce the internal IT staff in favor of outsourcing. He plans on presenting this approach to the Board ofDirectors as soon as he has made a few more refinements in his presentation.COO Willy’s act of hiring you was, in fact, an act of desperation: the increasing operational dependence ontechnology services combined with a diminishing IT footprint gravely concerned Mike Willy, and hebegged to at least bring in an Information Security expert with the experience necessary to evaluate thecurrent security of GFI’s infrastructure and systems. The COO’s worst nightmare is a situation where theConfidentiality, Integrity, and Availability of GFI’s information systems were compromised – bringing thecompany to its knees – then having to rely on vendors to pull him out of the mess.COO Willy has reasons for worrying. GFI has experienced several cyber-attacks from outsiders over thepast a few years:In 2013, the Oracle database server was attacked and its customer database lost its confidentiality,integrity, and availability for several days. Although the company restored the Oracle databaseserver back online, its lost confidentiality damaged the company reputation. GFI ended up payingits customers a large sum of settlement for their loss of data confidentiality.In 2014, another security attack was carried out by a malicious virus that infected the entireCEOJohn ThompsonVice PresidentTrey ElwayExecutiveAssistantKim JohnsonExecutiveAssistantJulie AndersonExecutiveAssistantMichelle WangCCOAndy MurphyCOOMike WillyCFORon JohnsonDirector ofMarketingJohn KingDirector of HRTed Young
Background image of page 1
network for several days. While infected the Oracle and e-mail servers had to be shut down toquarantine these servers. COO Willy isn’t sure whether the virus entered GFI’s systems through amalicious email, from malware downloaded from the Internet, or via a user’s USB flash drive.Regardless of the source of the infection, the company lost $1,700,000 in revenue and intangiblecustomer confidence.In a separate incident in 2014, one of the financial consultants left his company laptopunprotected at the airport while travelling and it was stolen. It contained customer financial dataand the hard drive was not encrypted. Financial reparations were paid to impacted customers.In 2015, a laptop running network sniffer software was found plugged into a network jack under adesk in one of the unoccupied offices.It is apparent from the number of successful cyber-attacks that GFI is an organization severely lacking ininformation security maturity. COO Willy has commissioned you to perform a quantitative and qualitativerisk assessment of GFI’s infrastructure to determine where improvements could be made to reduce the riskof future attacks.CORPORATE OFFICE NETWORK TOPOLOGYThe diagram on the following page displays GFI’s Corporate Office Topology.The GFI network infrastructure consists of a corporate WAN spanning 10 remote facilities that areinterconnected to the GFI headquarters’ central data processing environment.Data is transmitted from aremote site through a VPN gateway appliance that forms a VPN tunnel with the VPN gateway inheadquarters. Through this VPN connection, remote office users access the internal Oracle database toupdate the customer data tables. Through your inspection of the VPN configuration you discover that thedata transaction traversing the remote access connection to the corporate internal databases is notencrypted.Users are authorized to work from home and both dial-up and VPN remote access are available. Dial-up isprovided via Private Branch Exchange (PBX) and a Remote Access Server and VPN remote access isprovided via the VPN gateway. Authentication is password-based via MS-CHAP V2. Users are also ableto take advantage of GFI’s Bring Your Own Device (BYOD) policy and a Wireless antenna allowswireless networking within headquarters. WEP is used to provide wireless security to BYOD users.The network perimeter between the Internet and GFI’s internal network infrastructure is separated by twoBorder (Core) Routers. These Border Routers then connect to two Distribution Routers and the VPNGateway. The Distribution Routers connect to a RAS Server, a Wireless Router that provides a bridgebetween the Wireless Antenna and the internal network, and two Multi-layer switches. The Multilayerswitches connect to six (6) Access Layer VLAN switches that segregate the Accounting, Loan Dept,Customer Services, Mgmt, Credit Dept, and Finance VLANs. The Multi-layer switches also connect to athird Multi-layer switch that provides a connection to GFI’s servers in the Trusted Computing Basesubnet.The trusted computing based (TCB) internal network is situated in a physically separated subnet. A bulk 
 
Looking for a Similar Assignment? Order now and Get 10% Discount! Use Coupon Code "Newclient"