Ask Business Economics Expert

Any help will be greatly appreciated:

You have been hired as part of the network security team at UMUC. After completing orientation and training, your manager calls you into a meeting to discuss your first project.

The university has completed the implementation of the leased building in Adelphi, Maryland. If you recall, this was the Network Design Proposal completed in CMIT 265. The university realizes it needs to secure the faculty, students, and visitors network and data. With your background and skills, the university is looking to you for guidance. In addition to helping the university secure its network, you are required to obtain your CompTIA Security+ certification within 60-days of being hired.

Part 1:

  • Define the vulnerability assessment requirement, propose a solution, and justify the solution.
  • Students should review the text and example provided but do not include it with their submission. Delete the text and include you own.
  • Define the security policy requirement, propose a solution, and justify the solution.
  • Students should be specific when defining the overall security outlook for the organization.
  • Define the risk management requirement, propose a solution, and justify the solution.
  • Students should describe the process, its value to the organization, and use proper terminology.
  • Define the business continuity plan requirements, propose a solution, and justify the solution.
  • Student should describe the activity in detail, and include each of the plan types.
  • Define the access controls requirement, propose a solution, and justify the solution.
  • Students should be specific with the type of access control model they select.

Part 2:

  • Define the physical security requirements, propose a solution, and justify the solution.
  • At a minimum, students should discuss the three main factors of prevention, detection, and recovery; and include the appropriate control measure.
  • Define the mobile device security requirements, propose a solution, and justify the solution.
  • Students should include smartphones, laptops, tablets, or any other mobile device that may be introduced in the UMUC environment. Students should also include the considerations and their implications.
  • Define the perimeter defense requirements, propose a solution, and justify the solution.
  • Students should consider the different types of attacks, security appliances, and the network configuration to implement.
  • Define the network defense requirements, propose a solution, and justify the solution.
  • Students should discuss common network devices, their vulnerabilities, and propose defensive solutions.
  • Define the host defense requirements, propose a solution, and justify the solution.
  • Students should the types of attacks hosts are susceptible to, and proposal defensive solutions.

Part 3

  • Define the public key infrastructure (PKI) requirements, propose a solution, and justify the solution.
  • Students should be specific when discussing the implementation and configuration required for the PKI solution.
  • Define the secure protocol implementation requirements, propose a solution, and justify the solution.
  • Students should consider data as it is in transit and discuss the numerous scenarios and solutions to protect it.
  • Define the file encryption requirements, propose a solution, and justify the solution.
  • Students should consider data at rest and discuss the numerous scenarios and solutions to protect it.
  • Define the file hashing implementation, propose a solution, and justify the solution.
  • Students should consider where hashing should be implemented in the network design and explain what it provides in each instance.
  • Define the backup and restoration implementation, propose a solution, and justify the solution.
  • Students should explain the process, where it is applicable in the UMUC network scenario, and how it will be achieved (process, hardware, and frequency).

Include at least two scholarly references in each of the three submissions. Thus, a total of six scholarly references will be included in total. Students may find scholarly sources by visiting UMUC's library and online sources. Students will also include other credible sources as appropriate.

  • Use IEEE-style citations. We do not use APA or MLA-style citations. Students should contact UMUC's Effective Writing Center for assistance.
  • Use proper terminology and expand acronyms in each paragraph they are used. For example, the first time in a paragraph an acronym is used it should be expanded (e.g., University of Maryland University College (UMUC). Thereafter, and as long as you are in the same paragraph, the acronym (e.g., UMUC) can be used. When starting a new paragraph, the rule begins anew.
  • The use of figures and diagrams is encouraged. Students will properly cite the figures and diagrams according to the IEEE-style citation.

Business Economics, Economics

  • Category:- Business Economics
  • Reference No.:- M92393660
  • Price:- $25

Priced at Now at $25, Verified Solution

Have any Question?


Related Questions in Business Economics

Standards drive instruction therefore how do standards

Standards "drive instruction," therefore, how do standards influence curriculum planning?

Explain how the application of the pdca cycle can support a

Explain how the application of the PDCA cycle can support a competitive strategy of low cost leadership.

Ford motors expects a new hybrid-engine project to produce

Ford Motors expects a new? Hybrid-engine project to produce incremental cash flows of $ 95 million each year and expects these to grow at 4?% each year. The upfront project costs are? $900 million and? Ford's weighted av ...

A five-year bond with a yield of 11 continuously compounded

A five-year bond with a yield of 11% (continuously compounded) pays an 8% coupon at the end of each year. a) What is the bond's price? b) What is the bond's duration? c) Use the duration to calculate the effect on the bo ...

Image manufacturing is an electronics manufacturer and

IMAGE Manufacturing is an electronics manufacturer and retailer. Its main products are Ultrabook computers, PCs and calculators. The current price of the Ultrabook is $ 600, the PC is $700 and the calculator is $30. This ...

According to kulish what is about the design of the euro

According to Kulish, what is about the design of the euro currency that lessens its appeal compared to prior national currencies?

How has the value of the euro changed compared to other

How has the value of the Euro changed, compared to other countries, over the past 10 years (since the Great Recession began)?

In lecture we discussed why the production possibilities

In lecture we discussed why the production possibilities frontier (the boundary of the production possibilities set) is bowed 'outwards'. When might the production possibilities set be bowed 'inwards'? Give an example of ...

In 2013 gallup conducted a poll and found a 95 confidence

In 2013, Gallup conducted a poll and found a 95% confidence interval of the proportion of Americans who believe it is the government's responsibility for health care. Give the statistical interpretation. I do not underst ...

The standard deviation of the number of video game as

The standard deviation of the number of video game A's outcomes is 0.5479, while the standard deviation of the number of video game B's outcomes is 0.2498. Which game would you be likely to choose if you wanted players t ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As