Reference no: EM133073318
Network Addressing and Security
B. Firewall Implementation: You will assess UMUC's technical requirements related to the firewall implementation. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.
Proposed Network Security Hardware
This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. Be sure to review different types of firewalls available, what the firewall will be doing, and the benefits and drawbacks of some models are. Student should be specific when discussing the models, types, and costs.
Justify your proposed solution based on the technical requirements and assumptions.
C. Intrusion Detection System / Intrusion Protection System
Technical Requirements
In this section, you will assess UMUC's technical requirements related to the intrusion detection system (IDS) and Intrusion Prevention System (IPS). You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.
Proposed Network Security Hardware
This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. Describe how IDS and IPS operates and how will or won't IDS and or IPS be used in your solution? Student should be specific when discussing the models, types, and costs.
Justification
This section should be used to justify your proposed solution based on the technical requirements and assumptions.
D. DMZ Implementation
Technical Requirements
In this section, you will assess UMUC's technical requirements related to the DMZ implementation. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.
Proposed Network Security Hardware
This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. What uses would UMUC need for a DMZ? What equipment should be placed into the DMZ? Student should be specific when discussing the models, types, and costs.
Justification
This section should be used to justify your proposed solution based on the technical requirements and assumptions.
E. Physical Security Measures
Technical Requirements
In this section, you will assess UMUC's technical requirements related to the physical security measures. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.
Proposed Network Security Hardware
This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. Be practical, as the classrooms and library are open for students to use. Be sure to address physical access of the computers in the classroom, remember law 3 of the 10 immutable laws of information security. Student should be specific when discussing the models, types, and costs.
Justification
This section should be used to justify your proposed solution based on the technical requirements and assumptions.
F. Additional Network Security Measures
Technical Requirements
In this section, you will assess UMUC's technical requirements related to the additional security measures. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.
Proposed Network Security Hardware
This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. You should consider the carbon units utilizing the computers, what additional measures are needed when dealing with people? Student should be specific when discussing policy, training, and awareness.
Justification
This section should be used to justify your proposed solution based on the technical requirements and assumptions.
Conclusion
Attachment:- Network Addressing and Security.rar