C700 Secure Network Design Assignment

Assignment Help Other Subject
Reference no: EM132965451 , Length: word count:2500 words

C700 Secure Network Design Assignment - Western Governors University, USA

INTRODUCTION - Secure network design is a critical component for protecting resources, processes, and business continuity. Effective network design involves evaluating existing network problems and potential threats, considering secure architectures based on industry best practices and secure design principles, and proposing secure network design solutions that address the business needs of the organization.

For this task, you will access the "Performance Assessment Lab Area" within the course to run Zenmap and OpenVAS. Screenshots saved for submission must include your name and student ID. Your final network drawing should be saved in *.vsd format using Microsoft Visio or a similar software tool.

SCENARIO - Company A is a property and casualty insurer underwriting multiple types of insurance. Company A is acquiring Company B, a financial services organization, in order to diversify and increase market share. Company B conducts business in the same geographical area as Company A and delivers business and individual financial planning services. Both companies provide services from their respective offices and at the customer's site. Both companies use broadband connectivity.

You are the IT director for Company A and will be the chief information officer (CIO) for the merged organization. You are tasked with analyzing, designing, and presenting the proposed IT integration project. Company A has clear IT infrastructure documentation, including a logical diagram, an organizational chart, and a recent security risk analysis. Company B does not have any IT infrastructure documentation, and several security and integration issues are evident. Company B outsources any IT-related needs to a consultant. Leadership for the merged organization has allocated a limited budget of $35,000 for this project and will expect justification for recommended expenditures.

Integration project requirements include following secure network design principles, selecting or repurposing secure network components, assuring secure communication channels, addressing relevant regulatory compliance, minimizing potential network problems and security threats, delivering integration cost savings, and aligning IT to meet the business needs of the post-merger organization. This post-merger organization will reflect one corporate office and a branch office.

REQUIREMENTS - Your submission must be your original work. No more than a combined total of 30% of the submission and no more than a 10% match to any one individual source can be directly quoted or closely paraphrased from sources, even if cited correctly. The originality report that is provided when you submit your task can be used as a guide.

You must use the rubric to direct the creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each requirement below may be evaluated by more than one rubric aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course.

Tasks may not be submitted as cloud links, such as links to Google Docs, Google Slides, OneDrive, etc., unless specified in the task requirements. All other submissions must be file types that are uploaded and submitted as attachments (e.g., .docx, .pdf, .ppt).

A. Describe the problems Company A has with network security and infrastructure using details from one or more of the "Company A Organizational Chart," "Company A Risk Analysis," and "Company A Visio Diagram" supporting documents.

B. Run Zenmap and OpenVAS on Company B's network using the "Performance Assessment Lab Area" web link. Your submission should include the following documents:

- a screenshot of the completed Zenmap scan-should be taken within the lab environment and should include your name

- a screenshot of the OpenVAS report result-should be taken within the lab environment and should include your name

- the completed Zenmap PDF file

- the completed OpenVAS PDF file-should include your name in the summary of the report

Note: This assessment requires you to submit pictures, graphics, and/or diagrams. Each file must be a supporting document no larger than 30 MB in size. Diagrams must be original and may be hand-drawn or drawn using a graphics program. Do not use CAD programs because the file will be too large.

C. Describe the potential impact of two network security or infrastructure problems of Company B using details from the outputs of Zenmap and OpenVas, including rationale for each problem.

1. Explain how correcting each of these problems will improve the functioning of the merged network.

D. Provide a network topology diagram using Microsoft Visio or a similar software tool that represents the proposed merging requirements from the scenario of Company A and Company B, including remediation of all existing infrastructure problems described in part A and part C.

E. Identify which layer of the OSI model and layer of the TCP/IP protocol stack apply to each component in the merged network topology diagram.

F. Justify the retention or deletion of four existing components as suggested in your proposed network topology diagram. Include how each component's retention or deletion and any newly required additions to the network address both security concerns and budgetary restrictions found in the scenario.

G. Explain how two secure network design principles are included in your proposed merged network topology diagram.

H. Describe two secure hardware and/or software components integrated into the proposed network topology and how each component will address the security needs of the merged organization.

I. Explain how the proposed network topology diagram for the merged organization addresses security safeguards based on a regulatory compliance requirement.

J. Explain a security threat and one potential network problem that would become a risk as part of the implementation of the proposed network topology diagram, including why each would become a risk.

1. Explain how the security threat and potential network problem should each be managed or mitigated as part of the implementation of the proposed topology diagram.

K. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.

L. Demonstrate professional communication in the content and presentation of your submission.

Note - Need 2500 words paper + zenmap file + OpenVas file + title page + references with in-text citations.

Reference no: EM132965451

Questions Cloud

What methods or strategies are available for such a company : What methods or strategies are available for such a company to pursue? Which method or methods do you believe are the most effective? Why?
Develop the stockholders equity category of the december : Develop the stockholders' equity category of the December 31, 2014, balance sheet. Assuming the net income for the year was Rs.100,000.
Compute the unit product cost for year : O'Brien Company manufactures and sells one product. The following information pertains to each of the company's first three years of operations:
Stages of the standard breading procedure : What are the three stages of the Standard Breading Procedure? Describe how to set up a breading station.
C700 Secure Network Design Assignment : C700 Secure Network Design Assignment Help and Solution - Western Governors University, USA - Homework Help - Provide a network topology diagram
How much will lee have to pay the dealer : The market is offering a swap rate of 3.25% against Libor. A swap dealer offers to take the swap off Lee's hands. How much will Lee have to pay the dealer?
Why organisations need to embrace change : Explain why organisations need to embrace change and integrate it into planning for quality service.
What are the strategies you make to create sales : Please help me with my Pitch demo.Topic: Internet Cafe a. Who are your target customer?
Why a salesperson should welcome buyer concerns : Explain why a salesperson should welcome buyer concerns. List the common types of buyer resistance that might surface in a presentation.

Reviews

Write a Review

Other Subject Questions & Answers

  What strategies and resources will you use on your degree

What strategies and resources will you use on your degree journey to invest in yourself? What step will you take to put work in that will result in reciprocity?

  Describe the hertzsprung-russel diagram

Describe the Hertzsprung-Russel diagram. How is it useful in classifying stars? Where do stars tend to cluster on the diagram? Where on the H-R diagram

  Develop a presentation that includes information

Develop a presentation that includes information from the video on ways to address anxiety-reducing techniques and improve overall presentation delivery

  Personnel safety issues faced by september

In a minimum of 250 - 300 words, describe at least two personnel safety issues faced by September 11th first responders

  Compare and contrast conflict and functionalist perspectives

Discuss at least three of the manifest functions and one laten function that education provides. Compare and contrast the Conflict and Functionalist Perspectives on who rules the United States.

  Analysis of the costs and benefits

Present a local environmental issue or problem ,a solution or solutions to the problem, an analysis of the associated costs and benefits of the solutions and a determination of the best solutions based on your analysis of the costs and benefits.

  Describe one example of a controversial expectation

The various groups who make up the US public have different expectations of science. How do these differing expectations of science affect the ways groups.

  How the given country compares to ours

Search credible websites for a podcast on a specific health problem in a country of your choice. Provide three thought-provoking takeaways from the podcast.

  Increase the supply of viable organs for transplant

Write a paragraph on the question/statement below: Some have suggested that the sale of organs in the U.S. would increase the supply of viable organs for transplant. Others have said that only voluntary donation is ethical under the U.S. system of..

  Human resource managers must constantly evaluate

Human resource managers must constantly evaluate whether their hiring practices are consistent with current trends and expectations of positions to be filled

  Human needs and desires are best met by cooperating

Justifications for punishment that appeal to beneficial consequences violate Kant's second variation of the categorical imperative. Human needs and desires are best met by cooperating with others.

  Identify three tiers of the response-to-intervention program

Identify the three tiers of the Response-to-Intervention program and describe the characteristics of each. How can self-management techniques be included in the Secondary Tier

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd