Reference no: EM132531047
Part 1
Research the topic of physical security for networks. In a 3-5-paragraph posting, discuss the following information:
Key factors to consider when choosing a location for a network operation center (NOC)
5 areas of physical security to consider when constructing a NOC
Consideration of natural and man-made disasters
Part 2
You have recently accepted a position as a network administrator supporting the computer network at Camp David the US Presidential retreat in Thurmont, Maryland. The President has requested that a WEP wireless network be installed to support the computing needs of visiting dignitaries.
Your commanding officer is having second thoughts on using the wireless network that was first considered. He is concerned about the security of a wireless endpoints. You have recently completed your ISC2 CISSP certification and the commanding officer would like you to draw upon your knowledge of secure architecture design and prepare a slide presentation on wireless networking and what can be done to secure a wireless network.
Include the following:
Your answers to the 6 secure architecture data collection questions of:
Why are we building this system?
Who is going to use it and why?
How is it going to be used?
What environment will it work within?
What type of security and protection is required?
What does it need to be able to communicate with?
A sample assessment of how you would gather the information necessary to design secure architecture
Consider and recommend hardware and software solutions and remote access systems.
Conclude your presentation with your strategy for conducting a penetration test and vulnerability assessment to assure external nation state hackers cannot breach the Camp David secure network.
Collection methods necessary for computing components
: Evaluate collection methods necessary for computing components (e.g., network infrastructure, servers, and workstations) for evaluation and storage in a SIEM.
|
Identify what are different types of hash values
: Identify what are the different types of hash values. Then tell me, what is the recommended hash value and WHY (
|
How much was cash from financing
: Cash from operations was positive $450,000 and cash from investing was negative $490,000. How much was cash from financing?
|
Reflection of how knowledge-skills-theories data science
: Provide a reflection of how the knowledge, skills, or theories Data science and Big Data analysis have been applied,
|
Consideration of natural and man-made disasters
: Key factors to consider when choosing a location for a network operation center (NOC). Consideration of natural and man-made disasters
|
Define information technology strategy
: Define Strategic Planning. Define Information Technology (IT) Strategy. Discuss two challenges that ModMeters could encounter when developing an IT strategy.
|
Contrast formal and informal aspects of power
: Compare and contrast formal and informal aspects of power.
|
Infotech import in strat plan
: Describing how the knowledge, skills, or theories of this course have been applied or could be applied, in a practical manner to your current work environment.
|
Being the bridge and service delivery life cycle
: Critique the idea that the CIO can be a bridge between enterprise finance, marketing, and sales functions. Justify the legitimacy of the statement.
|