Define the vulnerability assessment requirement

Assignment Help English
Reference no: EM131608290

You have been hired as part of the network security team at UMUC. After completing orientation and training, your manager calls you into a meeting to discuss your first project.

The university has completed the implementation of the leased building in Adelphi, Maryland.

If you recall, this was the Network Design Proposal completed. The university realizes it needs to secure the faculty, students, and visitors network and data. With your background and skills, the university is looking to you for guidance.

In addition to helping the university secure its network, you are required to obtain your CompTIA Security+ certification within 60-days of being hired.

Part 1:

· Define the vulnerability assessment requirement, propose a solution, and justify the solution.

· Students should review the text and example provided but do not include it with their submission. Delete the text and include you own.

· Define the security policy requirement, propose a solution, and justify the solution.

· Students should be specific when defining the overall security outlook for the organization.

· Define the risk management requirement, propose a solution, and justify the solution.

· Students should describe the process, its value to the organization, and use proper terminology.

· Define the business continuity plan requirements, propose a solution, and justify the solution.

· Student should describe the activity in detail, and include each of the plan types.

· Define the access controls requirement, propose a solution, and justify the solution.

· Students should be specific with the type of access control model they select.

Part 2:

· Define the physical security requirements, propose a solution, and justify the solution.

· At a minimum, students should discuss the three main factors of prevention, detection, and recovery; and include the appropriate control measure.

· Define the mobile device security requirements, propose a solution, and justify the solution.

· Students should include smartphones, laptops, tablets, or any other mobile device that may be introduced in the UMUC environment. Students should also include the considerations and their implications.

· Define the perimeter defense requirements, propose a solution, and justify the solution.

· Students should consider the different types of attacks, security appliances, and the network configuration to implement.

· Define the network defense requirements, propose a solution, and justify the solution.

· Students should discuss common network devices, their vulnerabilities, and propose defensive solutions.

· Define the host defense requirements, propose a solution, and justify the solution.

· Students should the types of attacks hosts are susceptible to, and proposal defensive solutions.

Part 3

· Define the public key infrastructure (PKI) requirements, propose a solution, and justify the solution.

· Students should be specific when discussing the implementation and configuration required for the PKI solution.

· Define the secure protocol implementation requirements, propose a solution, and justify the solution.

· Students should consider data as it is in transit and discuss the numerous scenarios and solutions to protect it.

· Define the file encryption requirements, propose a solution, and justify the solution.

· Students should consider data at rest and discuss the numerous scenarios and solutions to protect it.

· Define the file hashing implementation, propose a solution, and justify the solution.

· Students should consider where hashing should be implemented in the network design and explain what it provides in each instance.

· Define the backup and restoration implementation, propose a solution, and justify the solution.

· Students should explain the process, where it is applicable in the UMUC network scenario, and how it will be achieved (process, hardware, and frequency).

Reference no: EM131608290

Questions Cloud

What is the reduction in outstanding cash balances : What is the reduction in outstanding cash balances as a result of implementing the lockbox system?
Research on current trends and advancements : Support your hypotheses using research on current trends and advancements of the Web (e.g. new Web technologies, types of Web sites, user demands, etc.).
Discuss baseball and politics : Do you think politics and sports should be kept separate, Baseball and Politics
Analyze data for selected task : Explain how you would use the tool to organize and analyze data for your selected task.
Define the vulnerability assessment requirement : Define the vulnerability assessment requirement, propose a solution, and justify the solution.
What would be oberon''s before-tax component cost of debt : What would be Oberon's before-tax component cost of debt? Why do we use market-based weights instead of book-value-based weights when computing the WACC?
Objections to organizations on the far right : Think of some practice or position to which you are opposed. For example, you might have objections to organizations on the far right or left politically.
Discuss how tone of doctoral writing differ from the voice : How do the voice and tone of doctoral writing differ from the voice and tone of writing at other academic levels
Forced the redesign of campus networks : Discussion topic: Research and discuss various trends that have forced the redesign of campus networks.

Reviews

Write a Review

English Questions & Answers

  Write a profile

Write a profile on bishop poleni.

  Education system

Write a rearch paper on education system

  Write an report

The U.S. President Barack Obama said America can "win the future" by rebuilding its manufacturing sector (on June 8, 2011, after visiting an automotive training center at a community college in Virginia, outside Washington). Do you agree, and why?

  Discuss the accuracy of this statement

'Consideration does not have to be adequate or commercially realistic, nor does it need to be expressed in monetary terms, it merely needs to be "sufficient".' Discuss the accuracy of this statement.

  Write an essay on the youngest billionaire

Write an essay on the youngest billionaire

  Transformational leadership in the public sector

The more hierarchical an organization's authority structure, the lower the reported practice of transformational leadership behaviors.

  Modal verbs or modal constructions

Identify all the modal verbs or modal constructions in the passage

  Write a latter to mom thanking to adopting and caring

Write a latter to mom thanking for adopting and caring,

  Ways of knowing & authority in your discipline

To explore and become familiar with your discipline; to prepare you for your major researched essay.

  Writing an effective business letter

Prepare a letter in either block or modified block format, addressed to your employer or supervisor and copied to your marker.

  Discuss the kingdom of saudi arabia

Discuss the Kingdom of Saudi Arabia

  Developing an annotated bibliography

Developing an annotated bibliography

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd