Ports and protocols used for processing/transmitting company information.

Description

Background
Before a system or network can be secured, it’s important to document what the system is and what it does. This is known as the system baseline and comprises the majority of Step-1 (Categorize) within the Risk Management Framework (RMF). As this project progresses, multiple artifacts will be provided to provide an overall security baseline needed to assess and mitigate risks to acceptable levels.

Deliverables
Assume you are using your home computer for work, connecting to the company network through a Virtual Private Network (VPN).
Sensitive Information Warning: Do not provide drawings, IP addresses, or diagrams for real-world company networks.

1) Primary Artifacts: Provide an information system description. At a minimum, this should describe what business functions the system provides, what types of information will be processed, and a description of the system baseline. Use chapter 3 of FIPS-199 (Unit-1 assigned reading) to categorize the information system based on loss-impact associated with Confidentiality, Integrity, and Availability expressed in C-I-A format. Example: a system with Low risk in Confidentiality, Low risk in Integrity, but Moderate risk in Availability would be expressed as L-L-M. Explain your rationale.

Note: Organizations may document this information in different ways. However, it’s important to consider this type of information is often presented to managerial-level personnel. While APA is not required for this assignment, your documentation is expected to be organized in a neat and professional manner.

2) Secondary Artifacts:
a) Hardware List: Computers, Network Equipment, Input/Output Devices (VOIP, Printers).
b) Software List: List of software (including the operating system). Identify which hardware has this software.
c) List of Ports and Protocols: List of ports and protocols used for processing/transmitting company information.
d) Network Diagram: Include all devices on your network, even if they are not used for the VPN connection. Use a cloud symbol to represent the company’s network.
e) Data Flow Diagram: It is acceptable to re-use the network diagram, but illustrates the path of information for your VPN connection.

APA Requirements
Cite sources using APA format, including in-text citations and references page. APA formatting is recommended for written documents but is not required.

Submission Instructions
Zip all artifacts together and submit them as a single file. Alternatively, all artifacts may be compiled into a single document.

This question has been answered.

Get Answer