Create a high-level network security policy

Assignment Help Computer Engineering
Reference no: EM131904781

Assignment

The support of the growth expansion plan and proposal for West Consulting, this week you will develop the data center design and security plan.

Design an enterprise data center solution that expands the campus LAN network, which has reached its capacity.

The design must include the following:

• A logically separated WLAN infrastructure that can be integrated into the existing enterprise network

• Data flows between segments of the enterprise network - public (outside), DMZ, private, and data center

Incorporate feedback you received from your instructor on the diagram from the Week Two Individual Assignment, "West Consulting Modular Design Proposal." Use this revised diagram, and the information from all previous assignments, as the basis for this diagram.

Create a high-level network security policy that identifies key network security measures.

Include the following components:

• List of network assets and their use(s)

• Potential threats and vulnerabilities in which assets need to be protected from including; open ports, malware, viruses, and specific types of attacks

• Detailed security methods you will use to protect these assets and how they will be implemented

• A high-level incident handling process for two of the network attacks you identified, including whom to contact (by role), what should happen to the asset, and how to protect data

Diagram your data center design in Microsoft Visio.

Document your security policy as either:

• A 2- to 3- page Microsoft Word document.

Reference no: EM131904781

Questions Cloud

How do you propose to complete your project : What is the proposed solution or approach? How do you propose to complete your project (It is important to explain how you propose to complete your project)?
Calculate the estimated sharpe ratio of the market portfolio : Create a spreadsheet which calculates the alpha, beta, and firm-specific risk for a portfolio with weights w1, w2, and wM = (1 - w1 - w2).
Identify criteria used for creating effective cybersecurity : Identify criteria used for creating effective cybersecurity policy. Learn what effective measures exist for gauging the nature of a cybersecurity threat.
The difference between policy making and administration : What are some of the possible ramifications if these two overlap in a government public safety related program?
Create a high-level network security policy : Create a high-level network security policy that identifies key network security measures. List of network assets and their use(s)
Identify the future functionality of the application : A basic visual interface to support navigation of the program and identify the future functionality of the application.
How parenting and attachment styles affect therapy : Describe how Carolyn and David fit in terms of authoritarian, authoritative, and permissive forms of parenting.
Summarize the given case in your own words : Paraphrasing of content - Demonstrate that you understand the case by summarizing the case in your own words. Direct quotes should be used minimally.
How many times a week you would like to achieve the goal : Decide how many times a week you would like to achieve the goal. For example, 3x/week. Try to follow your goal chart for one week, recording an "X" when.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd