28 Oct The process of implementing security frequently opens one’s eyes to other forms of security not previously considered. In this two-part assignment, you sho
The process of implementing security frequently opens one's eyes to other forms of security not previously considered. In this two-part assignment, you should experience just that. This assignment focuses on a model of implementing security in layers, which, in many cases, requires a network that is designed accordingly.
The specific course learning outcome associated with this assignment is:
- Recommend best security practices to achieve business objectives based on risk assumptions.
Instructions
Design a network that incorporates the following:
- One corporate site (Chicago).
- All servers exist here (web server, file server, print server, mail server, FTP server).
- Connection to the Internet (50 MBps).
- 300 employees who only need access to local corporate resources and the Internet.
- One remote site (8 miles away).
- 20 employees who need access to all resources at corporate, plus the Internet.
- Connection to the Internet (3 MBps).
Part 1
Use Microsoft Visio or an open-source alternative, such as Dia Diagram Editor, to:
- Create a network diagram with defense in depth in mind, citing specific, credible sources that support the design and depicting at least four-fifths of the following:
- All necessary network devices (routers, switches and/or hubs, firewalls, VPNs, proxies, and others).
- The interconnections between network devices.
- Connections to end-user (client) devices (desktops, laptops).
- Connections from the Internet cloud to the network input.
Part 2
Write a 6-10 page paper in which you:
- Describe the flow of data through the network, citing specific, credible sources.
- Assume data begins at the remote site.
- Data flow may be monitored by an IDS.
- Explain all three elements of the CIA triad and how isolating by network functions helps deliver a layered approach, citing specific, credible sources that support your assertions and conclusions.
- Support your main points, assertions, arguments, or conclusions with at least four specific and credible academic sources synthesized into a coherent analysis of the evidence.
- Cite each source listed on your source page at least one time within your assignment.
- For help with research, writing, and citation, access the library or review library guides.
This course requires the use of Strayer Writing Standards (SWS). The library is your home for SWS assistance, including citations and formatting. Please refer to the Library site for all supports. Check with your professor for any additional instructions.
Submission Requirements
Import completed diagrams or charts into your paper before submitting your work.
View Rubric
Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.