Imagine you are an Information Systems Security Officer for amedium-sized financial services firm that has operations in four (4)states (Virginia, Florida, Arizona, and California). Due to the highlysensitive data created, stored, and transported by your organization,the CIO is concerned with implementing proper security controls for theLAN-to-WAN domain. Specifically, the CIO is concerned with the followingareas: Protecting data privacy across the WANFiltering undesirable network traffic from the InternetFiltering the traffic to the Internet that does not adhere to the organizational acceptable use policy (AUP) for the WebHaving a zone that allows access for anonymous users but aggressively controls information exchange with internal resources Having an area designed to trap attackers in order to monitor attacker activitiesAllowing a means to monitor network traffic in real time as a means to identify and block unusual activityHiding internal IP addressesAllowing operating system and application patch management
100% Original paper Customized to your instructions!