Reference no: EM133086514
TOPIC 1. BYOD Deployment Plan
Along with mobility, users want to use their own devices on your network accessing email, calendar events, and contacts. Every device that is allowed on a network introduces unique security challenges.
In a essay, develop a plan for implementing BYOD security in an enterprise network. Make sure to address the following:
1. Summarize at least four security challenges that BYOD and IoT would bring to your organization.
2. Discuss how you will handle each device's unique security challenges? What areas of the network can these devices connect to? Will you limit their access to certain data?
3. Defend the strategy for your design.
TOPIC 2. Wireless Security Solutions
Employees want to be mobile, having the ability to move from their desks to meetings and back again. How do you ensure that the data they are accessing follows the rules for CIA?
In a essay, develop a plan for securing an enterprise-level wireless network, such as the private WGCUSECURE WiFi Network used here on campus. Make sure to address the following:
1. Which wireless security options would you deploy, preventing typical wireless attack vectors? Should you use a layered security approach? Why or why not?
2. Describe the strategy for your design.
3. Include a network diagram visualizing your c¬¬hosen wireless security options. Use Microsoft Visio or online network diagraming tools, as identified in the topic Resources, to visualize your design.
Attachment:- network diagram.rar