YOUDECIDE
Scenario, Your Role, Key Players
Information Systems Use Security Policy
ScenarioScenario descriptionRoleWhat is Your Role in this scenario?PlayersLearn more about the Key Players in this scenario.DeliverableWhat would you to resolve this scenario?
Scenario
Sunshine Machine Works, who recently expanded its infrastructure, now needs to ensure that any authorized employee can access the intranet. Sales people and management staff frequently travel to remote locations, and often require access to documents stored on the intranet file server.Play.equella.ecollege.com/file/7dd452b7-36a7-47d0-a6b6-cff6c42dacf7/1/SEC360_W5_YouDecide.html#”>00:00Mute.equella.ecollege.com/file/7dd452b7-36a7-47d0-a6b6-cff6c42dacf7/1/SEC360_W5_YouDecide.html#”>
Role
You are the IT Services manager for Sunshine Machine Works. You are to assess the information presented and provide a response to management on how remote access may be handled for Sunshine Machine Works.Play.equella.ecollege.com/file/7dd452b7-36a7-47d0-a6b6-cff6c42dacf7/1/SEC360_W5_YouDecide.html#”>00:00Mute.equella.ecollege.com/file/7dd452b7-36a7-47d0-a6b6-cff6c42dacf7/1/SEC360_W5_YouDecide.html#”>
Players
StoneChief Executive Officer Margie NelsonChief Financial Officer GarThomasGeneral Manager
Deliverable
Given the scenario, your role and the information provided by the key players involved, it is time for you to make a decision.
If you are finished reviewing this scenario, close this window and return to this Week’s You Decide tab, in eCollege, to complete the activity for this scenario.
You can return and review this scenario again at any time.
YOUDECIDE
Activity
Assignment
Since you are responsible for IT Services and want to keep the systems and network functioning effectively, you will want to provide technical guidance and leadership on this issue.
Follow the instructions provided in the You Decide Exercise: Cryptographic Tunneling and the OSI Model.
Write a paper consisting of 500-1,000 words (double-spaced) on the security effects of cryptographic tunneling based on an understanding of the OSI (Open Systems Interconnect) model.
Review the OSI Simulation in the week 3 lecture.
Provide input on the type of cryptographic tunneling protocols (e.g., L2TP, IPSEC, SSL, etc.) which may be used, the layer(s) of the OSI at which each operates, and also recommend how they may be implemented. Cryptographic tunneling is inherent in building any common virtual private network (VPN).
Grading Rubric:
Category
Points
Description
Understanding20Demonstrate a strong grasp of the problem at hand. Demonstrate understanding of how the course concepts apply to the problem.
Analysis20Apply original thought to solving the business problem. Apply concepts from the course material correctly toward solving the business problem.
Execution10Write your answer clearly and succinctly using strong organization and proper grammar. Use citations correctly.
Total50A quality paper will meet or exceed all of the above requirements.
Note!
Submit your assignment to the Dropbox located on the silver tab at the top of this page. For instructions on how to use the Dropbox
.15625px; margin: 0px 0px 0px 25px; min-height: 20px; overflow: hidden; color: rgb(0, 0, 102); font-family: Arial, Helvetica, sans-serif; line-height: 20px;”>Cryptographic Tunneling and the OSI Model
Write a paper consisting of 500-1,000 words (double-spaced) on the security effects of cryptographic tunneling based on an understanding of the OSI (Open Systems Interconnect) model (Review the OSI Simulation in the Week 3 Lecture).
Provide input on the type of cryptographic tunneling protocols (e.g., L2TP, IPSEC, SSL, etc.) that may be used, the layer(s) of the OSI at which each operates, and also recommend how they may be implemented. Cryptographic tunneling is inherent in building any common virtual private network (VPN).
.equella.ecollege.com/file/1c65cf51-db98-408b-ba0e-8305b53b1c2e/1/SEC360_W6_Assignments.html#”>View Grading Rubric
Submit your assignment to the Dropbox located on the silver tab at the top of this page. For instructions on how to use the Dropbox, read these .next.ecollege.com/default/launch.ed?ssoType=DVUHubSSO2&node=184″>step-by-step instructions