Details of this Paper

data privacy and security




Sunshine Machine Works, who recently expanded its infrastructure, now needs to ensure that any authorized employee can access the intranet. Sales people and management staff frequently travel to remote locations, and often require access to documents stored on the intranet file server.;You are the IT Services manager for Sunshine Machine Works. You are to assess the information presented and provide a response to management on how remote access may be handled for Sunshine Machine Works;Wilma Stone Chief Executive Officer It's great that we have expanded and are able to reach out to customers all over the country. With the way things are going, I see real potential for continued success as long as our field assets have the ability to access information here on our local network. I don't have any problem with any or our people getting access to the resources they need. I just don't want anything compromised because I don't want to lose any proprietary information or have any of our customer's data leaked.;Margie Nelson;Chief Financial Officer;I am pretty paranoid when it comes to this remote access stuff. I keep hearing about people getting their networks broken in to and the next thing you know their bank accounts have been drained! However, it is apparent that this is an option whose time has come. I hope we are able to keep our data safe.;Gary Thomas General Manager We have workers who travel to remote locations and need to access information here on the Intranet. I would rather have our people accessing information over a secure connection than sending them out to who knows where with a laptop or thumbdrive full of our company information. Let's see if we can solve the problem of remote access and maintain company proprietary information. Given the scenario, your role and the information provided by the key players involved, it is time for you to make a decision.;If you are finished reviewing this scenario, close this window and return to this Week's You Decide tab, in eCollege, to complete the activity for this scenario.;You can return and review this scenario again at any time. YOUDECIDE;Activity;Assignment;Since you are responsible for IT Services and want to keep the systems and network functioning effectively, you will want to provide technical guidance and leadership on this issue.;Follow the instructions provided in the You Decide Exercise: Cryptographic Tunneling and the OSI Model.;Write a paper consisting of 500-1,000 words (double-spaced) on the security effects of cryptographic tunneling based on an understanding of the OSI (Open Systems Interconnect) model.;Review the OSI Simulation in the week 3 lecture.;Provide input on the type of cryptographic tunneling protocols (e.g., L2TP, IPSEC, SSL, etc.) which may be used, the layer(s) of the OSI at which each operates, and also recommend how they may be implemented. Cryptographic tunneling is inherent in building any common virtual private network (VPN).;Grading Rubric;Category Points Description;Understanding 20 Demonstrate a strong grasp of the problem at hand. Demonstrate understanding of how the course concepts apply to the problem.;Analysis 20 Apply original thought to solving the business problem. Apply concepts from the course material correctly toward solving the business problem.;Execution 10 Write your answer clearly and succinctly using strong organization and proper grammar. Use citations correctly.;Total 50 A quality paper will meet or exceed all of the above requirements.


Paper#70334 | Written in 18-Jul-2015

Price : $22