Provide an overview of new web-based organization plans

Assignment Help Computer Network Security
Reference no: EM131299380

Security Requirements

New Content for Section 1: Project Outline

For this assignment, be sure to include the following:

• Provide a brief description of the organization that will be used as the basis for the projects in the course.
• Include the company size, location, and other pertinent information.
• The organization should be large enough to require a Web-based or Internet network with security as an important factor in the infrastructure design.

New Content for Section 1: Security Requirements

For this part of the Key Assignment, include the following:

• Provide an overview of the new Web-based or Internet network the organization plans to implement.

• Prepare an overview of the security requirements for the network, including a discussion of the services that the overall network will support and areas for consideration to secure them.

Network Security Architecture Design Document

This course is comprised of a series of Individual Project assignments that will contribute to a Key Assignment submission at the end of the course. Each week, you will complete a part of a Network Security Architecture Design document. You will select a newer organization and apply your research to the development of a Network Security Architecture Design that would be appropriate for the organization to implement a new Web-based or Internet network with an overall security architecture included in its design.

You will be given a Key Assignment to develop a Network Security Architecture Design document for an organization of your choosing. The goal of this project is to develop the security architecture design for a new Web-based or Internet network.

Organization Selection

The first step will be to select an organization as the target for your Network Security Architecture Design document. This organization will be used as the basis for each of the assignments throughout the course, and should conform to the following guidelines:

• Nontrivial: The organization should be large enough, and require a sufficiently sized network to allow reasonable exercise of the network security architecture research and design process. The organization can be fictional if necessary, and appropriate assumptions may be made.

• Domain Knowledge: You should be familiar enough with the organization to allow focus on the project tasks without significant time required for domain education.

• Accessibility: You should have good access to the people and other information related to the project, because this will be an important part of the process.

Select an organization that meets these requirements, and submit your proposal to your instructor before proceeding further with the assignments in the course. Approval should be sought within the first several days of the course. Your instructor will tell you how to submit this proposal and the notification that will be given for project approval.

Key Assignment

For the assignments in this course, you will be developing a Network Security Architecture Design document that defines the security design for the organization's Web-based or Internet network. Your first task in this process will be to select an organization to use as the basis of your research and analysis for each of the assignments in the course. You will also create the shell document for the final project deliverable that you will be working on during each unit. As you proceed through each project phase, you will add content to each section of the final document to gradually complete the final project delivery. Appropriate research should be conducted to support the development of your document, and assumptions may be made when necessary.

The project deliverables are as follows:

• Submit your project proposal to your instructor for approval
• Network Security Infrastructure Design Document
• Use Word
• Title Page

o Course number and name
o Project name
o Your name
o Date

• Table of Contents (TOC)

o Use an autogenerated TOC.
o Place it on a separate page.
o It should be a maximum of 3 levels deep.
o Be sure to update the fields of the TOC so it is up-to-date before submitting your project.

• Section Headings (create each heading on a new page with "TBD" as content, except for sections listed under New Content below)

o Section 1: Project Outline
o Section 1: Security Requirements
o Section 2: Perimeter Security
o Section 3: Client and Server Security
o Section 4: Wireless and Remote Access Security
o Section 5: Security Configuration Management

New Content for Section 1: Project Outline

For this assignment, be sure to include the following:

• Provide a brief description of the organization that will be used as the basis for the projects in the course.
• Include the company size, location, and other pertinent information.
• The organization should be large enough to require a Web-based or Internet network with security as an important factor in the infrastructure design.

New Content for Section 1: Security Requirements

For this part of the Key Assignment, include the following:

• Provide an overview of the new Web-based or Internet network the organization plans to implement.
• Prepare an overview of the security requirements for the network, including a discussion of the services that the overall network will support and areas for consideration to secure them.

Reference no: EM131299380

Questions Cloud

Firm profit-maximizing level of output : The firm estimates the probability of the new regulation being enforced is 0.5. Find the firm's profit-maximizing level of output. Round your answer to one decimal.
Does this study really provide anonymity or just confidental : They can learn the results of the test by telephone, still without giving their name. Does this practice offer anonymity or confidentiality?
Develop a class named kitchentimer : You will develop a class named "KitchenTimer". This is the first class you will be developing from scratch. The class will have two fields, one to track the minutes remaining and another to track the seconds remaining.
Define a buffer and explain how a buffer works : On the basis of your research, respond to the following: Define a buffer and explain how a buffer works. Analyze and explain the buffer system in buffered aspirin (carboxylic acid)
Provide an overview of new web-based organization plans : Provide an overview of the new Web-based or Internet network the organization plans to implement. Prepare an overview of the security requirements for the network.
Would revealing the sponsor to respondents bias the poll : The standards accepted by polling organizations also require giving respondents the name and address of the organization that carries out the poll. Why do you think this is required?
Describe understanding of us public health system : In an opening paragraph describe your understanding of U.S. public health system using course material - In a second paragraph discuss how two of the module activities address different aspects of the three core functions of public health (assessme..
Elasticity of substitution illustrate : What does elasticity of substitution illustrate? What two factors affect its magnitude?
Price acceptance decisions : How does convenience impact your buying or price acceptance decisions? Please provide a detailed, in your own words explanation.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd