Create a high-level network security policy

Assignment Help Computer Engineering
Reference no: EM131904781

Assignment

The support of the growth expansion plan and proposal for West Consulting, this week you will develop the data center design and security plan.

Design an enterprise data center solution that expands the campus LAN network, which has reached its capacity.

The design must include the following:

• A logically separated WLAN infrastructure that can be integrated into the existing enterprise network

• Data flows between segments of the enterprise network - public (outside), DMZ, private, and data center

Incorporate feedback you received from your instructor on the diagram from the Week Two Individual Assignment, "West Consulting Modular Design Proposal." Use this revised diagram, and the information from all previous assignments, as the basis for this diagram.

Create a high-level network security policy that identifies key network security measures.

Include the following components:

• List of network assets and their use(s)

• Potential threats and vulnerabilities in which assets need to be protected from including; open ports, malware, viruses, and specific types of attacks

• Detailed security methods you will use to protect these assets and how they will be implemented

• A high-level incident handling process for two of the network attacks you identified, including whom to contact (by role), what should happen to the asset, and how to protect data

Diagram your data center design in Microsoft Visio.

Document your security policy as either:

• A 2- to 3- page Microsoft Word document.

Reference no: EM131904781

Questions Cloud

How do you propose to complete your project : What is the proposed solution or approach? How do you propose to complete your project (It is important to explain how you propose to complete your project)?
Calculate the estimated sharpe ratio of the market portfolio : Create a spreadsheet which calculates the alpha, beta, and firm-specific risk for a portfolio with weights w1, w2, and wM = (1 - w1 - w2).
Identify criteria used for creating effective cybersecurity : Identify criteria used for creating effective cybersecurity policy. Learn what effective measures exist for gauging the nature of a cybersecurity threat.
The difference between policy making and administration : What are some of the possible ramifications if these two overlap in a government public safety related program?
Create a high-level network security policy : Create a high-level network security policy that identifies key network security measures. List of network assets and their use(s)
Identify the future functionality of the application : A basic visual interface to support navigation of the program and identify the future functionality of the application.
How parenting and attachment styles affect therapy : Describe how Carolyn and David fit in terms of authoritarian, authoritative, and permissive forms of parenting.
Summarize the given case in your own words : Paraphrasing of content - Demonstrate that you understand the case by summarizing the case in your own words. Direct quotes should be used minimally.
How many times a week you would like to achieve the goal : Decide how many times a week you would like to achieve the goal. For example, 3x/week. Try to follow your goal chart for one week, recording an "X" when.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Make a program that implements the use of an int array

build a Java application that implements the use of an int array. Use 'for' loops to iterate through the array using the array's length variable to stay within the array bounds

  What can be done to overcome this lack of portability

What can be done to overcome this lack of portability? A subtype can be used as a subtype mark for declaring another subtype.

  Digital image processing refers to the processing

Digital image processing refers to the processing

  Make a client/property database using microsoft access

The file New Database window opens, then type the word Client as the name for this file where cursor is blinking, then click the create bottom.

  Why are you hesitant to commit

Carl picks 20 random names and finds that P1 sorts them faster than P2. "We're using P1!" exclaims Carl. Why are you hesitant to commit?

  Suppose cookies are not disabled on the client

suppose cookies are not disabled on the client.

  Write a c language program to generate a square wave on pin

Write a C language program to generate a square wave on pin 3 of PORTC with a 4 ms period using Timer3 in 16-bit mode with a prescaler value of 1:8.

  Discuss how 80x86 procedures can be called

Discuss how 80x86 procedures can be called from high-level programs or high-level procedures.

  How many bits are used to select a data register

How many bits are used to select a data register? What is the access bank? What benefits does the access bank provide? What is an assembler?

  Generating the cipher text

Consider the plaintext is 101101101. If CBC is not used, what is the resulting ciphertext? If CBC is utilized along with the IV = 111, specify the resulting ciphertext? Show all work.

  Explain how functional dependencies can be used

Explain how functional dependencies can be used to indicate the one-to-one relationship set exists between entity sets account and customer.

  Write program that provides a method named collapse

Write a complete java program that provides a method named collapse, which takes a stack of integers as a parameter and that collapses

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd