Develop a plan for implementing and configuring firewall

Assignment Help Basic Computer Science
Reference no: EM133238778

Instruction

This assessment task has 2 parts. Students are required to submit a technical report (a .docx file or word processor, not PDF) compiling all parts in a single technical report.

Part A Scenario:

In your class, the teaching team taught you about Firewall and its working procedures. You did some netlab experiments for related topics. Now, assume that you have joined the industry as a network security expert after completing this unit. You need to expand your knowledge by upskilling and researching related content/materials from online and other relevant sources.

Task A.1: (Critical Analysis)
In that role, your manager asked you to develop a plan for implementing and configuring "a virtual firewall for the public cloud". As a part of this plan, you need to write a report where you will explore the benefits of adopting virtual firewall for cloud computing, virtual firewall types, horizon scanning of this technology considering industry standard tools and present a case study describing the merits and/or weaknesses, other aspects (if you want to add any).

Task A.2: (Knowledge Reflection)
In that role, you have also heard that your business is interested about implementing the emerging "zero trust (ZTA) security architecture. While you are giving a plan on virtual firewall implementation for your business, some people think that ZTA and Firewalls cannot work together whereas others think that they are complementary! How you will put your logic/argument and explanation from a security expert's point of view to provide "critical" insights with proper reasoning and logics and address this issue.

Part B (min 1300 words) Scenario:
In your class, the teaching team taught you about IDS and IoT Networks, Protocols, etc. You did some netlab experiments for related topics. Now, assume that you have joined a consultancy firm as a security architect after completing this unit. You need to expand your knowledge by upskilling and researching related content/materials from online and other relevant sources.

Task B.1: (Critical Analysis)
In that role, your manager asked you to develop a white paper explaining the concept "Intrusion Detection System for Internet of Things within Energy Sector". The white paper will inform readers concisely about your proposed concept and present your philosophy on the matter. The report will include:

A proposed architecture for IDS considering an IoT environment within Energy sector. Illustrate the architecture and its different component, how the data flow will occur, what features are used for IDS, How IDS will safeguard the network, other aspects (if you want to add any)

Task B.2: (Knowledge Reflection)
Suppose as a security architect, you are heavily dealing with IDS for internet networks. However, the concept of the convergence of information technology (IT) and operation technology (OT) is new to you (and of course to many of your colleagues). However, your manager wants you to cover why IDS for Energy-IoT is different compared to other IoT setup or typical network (internet) based IDS. You need to provide your philosophy here by investigating the security requirements, gaps, and possible solutions.

Reference no: EM133238778

Questions Cloud

Differences between fifo and lifo as inventory methods : Your initial post must be at least 250 to 300 words in length and must be submitted by the Thursday deadline for the initial post. Respond to the post of at lea
Historical growth rate due to economic downturn : The growth rate of American Airlines is expected to be 1.5% under its historical growth rate due to the economic downturn.
Combat the decline in business due to the covid19 pandemic : Your bos need new strategy for your organization to combat the decline in business due to the Covid19 pandemic, using the Strategic Management Process, briefly
What is name of the future interest : Who has the present interest? How long will the present interest last? What is the name of the future interest?
Develop a plan for implementing and configuring firewall : Develop a plan for implementing and configuring "a virtual firewall for the public cloud". As a part of this plan, you need to write a report where you
Describe an example of a professional development trend : CJA/486 Administration Capstone Assignment - Professional Development Trends Essay, University of Phoenix - Describe example of professional development trend
Increase in volatility of stock prices : Suppose that everything else is held constant, would an increase in volatility of stock prices have any impact on the demand for rare coins?
Mathematical expression : Write out the mathematical expression for each calculation and show clearly the value you are solving for.
What is the name of phenomenom : Bank managers of too-big-to-fail banks could be tempted to engage in irresponsible risk taking. why? what is the name of this phenomenom ?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd