Perform network security analysis and planning

Assignment Help Computer Networking
Reference no: EM131670964

You have been hired as part of the network security team at UMUC. After completing orientation and training, your manager calls you into a meeting to discuss your first project.

The university has completed the implementation of the leased building in Adelphi, Maryland. The university realizes it needs to secure the faculty, students, and visitors network and data. With your background and skills, the university is looking to you for guidance.

In addition to helping the university secure its network, you are required to obtain your CompTIA Security+ certification within 60-days of being hired. As you will recall, the university leased building in Adelphi, Maryland was designed and implemented via the following layout:

1256_1.jpg

1606_2.jpg

You've been asked to perform network security analysis and planning, secure the boundary devices, hosts, and software; and secure the data at rest and in transit.

Your deliverable should explain the requirement, propose a solution, and justify the solution. You should make use of the TestOutLabSim material to create the task, and study for CompTIA Security+ certification. You should also make use of other sources as required.

It is important that your deliverable explain the technical issues in layman's terms. Before you begin, make sure to review the Network Security Proposal (Parts 3).

Attachment:- Securing Data.rar

Reference no: EM131670964

Questions Cloud

What percentage of time will second window have to be opened : When demand cannot be met during any given interval, a second window is opened. What percentage of the time will a second window have to be opened?
Analyze the range of organizational policies : Analyze the range of organizational policies (the policy framework) that are needed to effectively manage cybersecurity risks.
Probability that no customers arrive in five-minute interval : A restaurant manager is interested in taking a more statistical approach to predicting customer load. She begins the process by gathering data.
Segregation between religious and ethnic minorities : From 1400 to 1700, how did many societies indulge in conducting segregation between religious and ethnic minorities.?
Perform network security analysis and planning : Perform network security analysis and planning, secure the boundary devices, hosts, and software; and secure the data at rest and in transit.
How do you believe sustainability affect future of health : Discuss the following question with your team: How do you believe sustainability will affect the future of health care facility design? Why?
Particular moral-ethical dilemma : Compose a 2-page, accompanied by a 2-minute narrated slide presentation that describes a particular moral-ethical dilemma that you encountered
Describe the steps in an implementation plan : Describe the steps in an implementation plan. Identify possible project issues. Describe at least three methods to evaluate project success.
Discussion about the united national environmental program : According to the United National Environmental Program and World Health Organization, in Mumbai, India, air pollution standards for particulate matter.

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd