Any topic (writer's choice)

Instructions

InstructionsThe purpose of this lab is to show how to audit the remote access domain. You will identify common risks, threats, and vulnerabilities found in the remote access domain; assess common risks, threats, and vulnerabilities found in the remote access domain; identify network and security policies to properly secure the remote access domain portion of the network infrastructure; and audit and assess the implementation of security controls in the remote access domain.Lab 7.1aYou will use Microsoft Word to develop your homework assignment by completing the sections listed below:Review the following scenario:You are a security consultant for an information systems security firm and have a new healthcare provider client under HIPAA compliance. Your new client wants to know the requirements and the business drivers for securing the remote access domain in a healthcare environment because it requires compliance with HIPAA. Similarly, your firm has a U.S. government DoD client who also wants you to perform a remote access domain compliance audit per DoD remote access hardening guidelines and baseline requirements. Both organizations want you to focus on the remote access domain only, and you are to use the DoD-provided frameworks and STIGs previously found to summarize a remote access domain hardening strategy.With the information you read from Unit IV and Unit VI, identify the risks, threats, and vulnerabilities commonly found in the remote access domains security solution.Document these in your text document.Review the U.S Department of Defense (DoD) network hardening guidelines https://www.computer.org/cms/s2esc/s2esc_excom/Minutes/2005-03/DISA%20STIGs/Desktop-Application-STIG-V2R1.pdf and other NIST standards you discovered in previous labs.Summarize these in your homework assignment.Lab 7.1bNavigate to the following website: http://iase.disa.mil/stigs/net_perimeter/network-other/Pages/network-other.aspxScroll down to the Remote Access STIGs banner, and click on + Guidance Documents to expand the options.Click on the Remote Access VPN STIG link to download the ZIP file to your desktop. Double-click the ZIP file to extract the Remote Access VPN STIG folder, double-click the folder to open it, and then double-click the Overview PDF file to open it. This document reviews the potential vulnerabilities and configuration recommendations for secure remote access as per DoD guidelines.Review the following concepts from this overarching DoD standards document for secure remote access and discuss these guidelines in your homework assignment:Security Considerations for Remote Access and TeleworkAssessment, Enforcement, and Remediation ServicesEndpoint SecuritySecurity Readiness Review RequirementsLab 7.1cNavigate to the Web address: http://iase.disa.mil/stigs/net_perimeter/network-other/Pages/network-other.aspx. If necessary, scroll down again to the Remote Access STIGs banner, and click on + Guidance Documents to expand the options.Review some more remote access security checklists and guideline documents, by clicking through ZIPs and folders as you did in Step 5 until you reach the Overview PDF for each of the following:RAS Remote Access Server STIGRemote Access Policy STIGRemote Endpoint STIGReview the security controls listed in each of the Secure Remote Access checklists to help mitigate the risks, threats, and vulnerabilities within the remote access domain.Review how these security checklists and DoD guideline documents can help organizations baseline their security and achieve the compliance requirements in both government and commercial organizations.Discuss these guidelines in your homework assignment.Lab 7.2Write an executive summary that summarizes the top remote access domain risks, threats, and vulnerabilities and include a description of the risk mitigation tactics you would perform to audit the remote access domain for compliance. Use the U.S. DoD remote access hardening guidelines as your example for a baseline definition for compliance.NOTE: When you submit your homework assignment, you can combine the assignments into one document for grading. Please clearly mark the answers for Lab 7.1a, Lab 7.1b, Lab 7.1c, and Lab 7.2 within your submission by labeling those sections within your assignment.Your homework assignment should be a minimum of two-pages in APA format. Include a minimum of two sources, with at least one source from the CSU Online Library in addition to your textbook.

Answer

Computer ScienceLab 7.1aIn summary, the DoD provide framework for hardening remote access domain security requires organizations to implement appropriate polices and regulation to protect the key segments of their remote IT infrastructure. As such, they are expected to reduce active directory attack surface, monitor the remote domain for symptoms of compromise and have correctional controls.One of the threats to remote access domain security solution is loss or compromising of confidential data. This is a risk that results from malicious access and use of data from the network. Examples of confidential data that may be compromised includes user credit card details. Another vulnerability of the domain is unauthorized remote access to the IT systems. This threat is attributed to users who do...

To avoid plagiarism, part of the answer is hidden. Click on the button below to order the full answer.
Order Answer Back
Price Calculator
Manage orders
Why we are Ranked the best
  • Unlimited Revisions
  • Free 24/7 Support and chat
  • Money back guaranteed
  • Low prices with discounts
  • Experienced writers.
  • Free Unlimited support

Hear from our customers

Get a quote Chat with support Find an expert Frequently asked questions