What type of security and protection is required

Assignment Help Computer Engineering
Reference no: EM132077216

Question: You have recently accepted a position as a network administrator supporting the computer network at Camp David the US Presidential retreat in Thurmont, Maryland. The President has requested that a WEP wireless network be installed to support the computing needs of visiting dignitaries.

Your commanding officer is having second thoughts on using the wireless network that was first considered. He is concerned about the security of a wireless endpoints. You have recently completed your ISC2 CISSP certification and the commanding officer would like you to draw upon your knowledge of secure architecture design and prepare a slide presentation on wireless networking and what can be done to secure a wireless network.

Include the following:

1. Your answers to the 6 secure architecture data collection questions of:

• Why are we building this system?

• Who is going to use it and why?

• How is it going to be used?

• What environment will it work within?

• What type of security and protection is required?

• What does it need to be able to communicate with?

2. A sample assessment of how you would gather the information necessary to design secure architecture

3. Consider and recommend hardware and software solutions and remote access systems.

4. Conclude your presentation with your strategy for conducting a penetration test and vulnerability assessment to assure external nation state hackers cannot breach the Camp David secure network.

5. Include substantial research material in the speaker notes

Prepare an 8-20-slide presentation to address these points. Include speaker notes in the presentation. Plan the presentation and speaker notes so that someone else could actually give the presentation.

Be sure to document your references using APA format.

Reference no: EM132077216

Questions Cloud

Calculate roa with changes and without changes : You are the operations manager for a small kayak and canoe manufacturer (Valley Kayaks) located on the Pacific Northwest (Oregon).
Explain the areas of physical security : The Discussion Board (DB) is part of the core of online learning. Classroom discussion in an online environment requires the active participation of students.
Characteristics that green visions have in common : What are the characteristics that “green visions” have in common?
Write a sql query that you would use to search : Write a SQL query that you would use to search for any books by J.J. Parsons in a table called Books, where the author's names are stored in a field called
What type of security and protection is required : You have recently accepted a position as a network administrator supporting the computer network at Camp David the US Presidential retreat in Thurmont.
Determine several global creative organizations : Discuss why those organizations could be considered as creative.Identify and discuss several global creative organizations .
Three line segments form a right triangle : A program to read in three integers representing line lengths. Determine if the three line segments form a right triangle.
Identify the main functions of proposed information system : 1. Identify the main functions of your proposed information system and why they are important to the business.
What is the identification process of emerging technology : What is the Identification process of Emerging Technology and How is it applicable to Aqua Pharm? Explain the Innovation Specification and the Path of Emerging.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd