You are the cybersecurity professional for Company A and are responsible for protecting the information of the company. Your roles include managing the company’s cybersecurity capabilities and tools, conducting vulnerability management, and assessing risk to sensitive information. Company A has recently purchased Company B and wants to merge both networks.
Executives of Company A have tasked you with making risk-based decisions on integrating Company B’s network with Company A’s existing network. Company B has provided its latest vulnerability scans, network diagrams, and existing cybersecurity capabilities and tools. As a deliverable to the executives, you will submit your recommendations for a secure network design that merges the two networks and allows remote access for employees of both companies in the form of a merger and implementation plan.
For this project, you will use the given scenario and the following supporting documents to complete your network merger and implementation plan:
• “Company A Network Diagram”
• “Company A Risk Analysis”
• “Company B Network Diagram”
• “Company B Vulnerability Report and Cybersecurity Tools”
Scenario
Company A is a global company based in the United States that operates in the financial industry. Company A serves its customers with financial products, such as checking accounts, bank cards, and investment products. Company A has recently acquired Company B and needs to integrate with or remove similar capabilities and tools from Company B. Company B is smaller in size, has no dedicated cybersecurity professional role, and utilizes third-party support for infrastructure needs. Company B offers specialized software to medical providers and accepts credit cards as a payment option.
The executives of the newly merged company have expressed interest in integrating the use of the cloud to allow for scalability and redundancy. As the security professional of the merged networks, you are tasked with creating a secure network design that includes the use of zero trust principles and that utilizes both on-premises and cloud infrastructure. You also have been tasked with ensuring compliance with all regulatory requirements of the merged company, along with utilizing cloud-based technologies to provide security capabilities. Company executives have provided a budget of $50,000 in the first year to create a secure network design to utilize cloud-based services.
Requirements
Your submission must be your original work. No more than a combined total of 30% of the submission and no more than a 10% match to any one individual source can be directly quoted or closely paraphrased from sources, even if cited correctly. The similarity report that is provided when you submit your task can be used as a guide.
You must use the rubric to direct the creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each requirement below may be evaluated by more than one rubric aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course.
Tasks may not be submitted as cloud links, such as links to Google Docs, Google Slides, OneDrive, etc., unless specified in the task requirements. All other submissions must be file types that are uploaded and submitted as attachments (e.g., .docx, .pdf, .ppt).
A. Describe two current network security problems and two current infrastructure problems for each company, based on business requirements given in the scenario.
B. Analyze the given network diagram and vulnerability scan for both companies by doing the following:
1. Describe two existing vulnerabilities for each company.
2. Explain the impact, risk, and likelihood associated with each described vulnerability from part B1 as it relates to each company.
C. Create a network topology diagram with details of the proposed merged network requirements.
D. Identify the layer for all components in the topology diagram referencing the layers of the OSI model and TCP/IP protocol stack.
E. Explain the rationale for adding, deleting, or repurposing network components in the newly merged network topology diagram, including details of how each component addresses budgetary constraints.
F. Explain two secure network design principles that are used in the proposed network topology diagram.
G. Explain how the proposed merged network topology diagram addresses two regulatory compliance requirements that are relevant to the newly merged company, including the following in your explanation:
• the name of the regulatory compliance requirement
• why the regulatory requirement is relevant to the newly merged company
• how the proposed merged network topology diagram meets the regulatory requirement
H. Describe two emerging threats that are applicable to the merged organization, including the following in the description:
• potential network security risks of implementing the topology
• potential performance impacts on the merged network after implementation of the proposed design
• how to manage the identified potential security risks
I. Summarize your recommendations for implementation of this proposed merged network based on the scenario and budgetary requirements, including the following in the summary:
• a cost-benefit analysis for on-premises and cloud infrastructure solutions
• a justification for your recommendations to implement the proposed secure merged network design
J. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.
K. Demonstrate professional communication in the content and presentation of your submission.
Integrated Network Security and Infrastructure Design for Merging Company A and Company B: A Risk-Based Approach to Secure Cloud and On-Premises Integration
Insufficient Segmentation: Company A operates in the financial industry, where segregation of sensitive data and systems is essential. However, insufficient segmentation across its network could expose sensitive financial data, like customer transaction histories and personal details, to unauthorized users within the organization. This lack of separation also makes it easier for attackers to move laterally within the network if they breach one area.
Legacy Systems: As a large, established company, Company A likely has several legacy systems that may not have received security patches or updates in recent years. These systems, which might include outdated servers, software, or applications, often have known vulnerabilities that are easily exploited by cybercriminals. Without regular security updates, legacy systems become prime targets for attackers.
Over-Reliance on On-Premises Infrastructure: While Company A may have robust on-premises infrastructure, this model limits scalability and flexibility. The inability to scale quickly in response to changing demands or unexpected spikes in business operations can be a significant bottleneck. Cloud adoption would offer greater scalability and redundancy to address these concerns.
Lack of Cloud Integration: Although Company A has a large-scale infrastructure, it has not fully integrated cloud technologies, leaving opportunities for scalability, cost-efficiency, and enhanced disaster recovery. By not utilizing cloud-based services, Company A may be missing opportunities to improve business continuity and reduce overhead costs.
Lack of Dedicated Cybersecurity Expertise: Company B outsources its cybersecurity, which means it lacks a dedicated internal cybersecurity team. This lack of in-house expertise makes the company vulnerable to attacks, as outsourced teams may not be as responsive or proactive in identifying and mitigating potential threats. This problem is exacerbated if the third-party team is not fully aligned with Company B’s security needs or business objectives.
Insecure Third-Party Connections: Company B’s reliance on third-party providers for infrastructure management creates potential security risks. The company may have limited control over the security measures of its third-party service providers, making it susceptible to data breaches or cyber-attacks that could be facilitated through these external connections.
Limited Network Scalability: Company B, being smaller than Company A, likely has an infrastructure that is not designed to scale quickly. This limitation could become a critical challenge when the two companies merge, as Company B’s systems may not be able to handle the increased volume of data or users from Company A.
Inconsistent Software and Hardware Standards: Given Company B’s smaller size, its infrastructure may have a mix of old and new technologies. This inconsistency can lead to compatibility issues when integrating Company A's systems, making it difficult to achieve seamless interoperability between the two organizations.
Unpatched Legacy Systems: Legacy systems that are not regularly updated present a significant security risk. These outdated systems could have known vulnerabilities (e.g., unpatched software flaws) that are easily exploited by cybercriminals.
Insecure Network Segmentation: If Company A does not properly segment its network into distinct zones (e.g., internal, external, DMZ), attackers who gain access to one part of the network could laterally move to other critical systems, potentially accessing sensitive financial data.
Insecure Third-Party Connections: Third-party service providers may not have strong cybersecurity measures in place, which could expose Company B to attacks. If a third-party provider experiences a breach, it could result in the compromise of Company B’s network and data.
Weak Endpoint Security: Company B’s lack of dedicated cybersecurity expertise might lead to weak endpoint protections. Employees’ devices, such as laptops or mobile phones, could be easily infected with malware or targeted for unauthorized access if they do not have adequate security measures (e.g., firewalls, antivirus, device encryption).
Legacy System Vulnerabilities:
Insecure Network Segmentation:
Third-Party Vulnerabilities:
Endpoint Security Weaknesses:
A comprehensive network topology for the merged organization should include the following:
Each component in the topology can be mapped to the OSI model:
Cloud Integration:
Repurposing Redundant Systems:
Copyright © 2012 - 2025 Apaxresearchers - All Rights Reserved.