Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Designing a Complete Network Security Policy

Learning Outcomes: At the end of the assignment, student should be able:

To have an understanding of the network security issues in organizations and how to solve them by developing and applying a network security policy, which contains different security techniques and solutions at different levels in any organization.

Company: (Choose any business organization with multiple branches you wish to secure with complete description and background of services and other offerings)

As network security specialist your task is to develop and design a complete network security policy for the organization you have selected securing its network from different security vulnerabilities in a WAN environment where users will not only be connected locally but also globally using Internet.

It must focus on securing following aspects:

? Individual users security

? Securing PC's and other peripheral devices

? Securing Mobile devices and their connectivity

? Securing Network devices and equipment's

? Securing different Servers

? securing Network Bandwidth

? Securing Emails and email Servers

? Securing Webservers and organizational website

? Securing Remote access users and sites etc.

Individual Deliverables (Research & Documentation by individual members)

You have to complete this assignment by coming up with a complete security plan including a proper layered security strategy mentioning about security protocols, services allowed and disallowed, authentication and authorization systems, network security devices (hardware and software), firewall & their configurations, IDS and VPN systems, Remote Access Systems for remote users etc.

The complete network policy should have a practical implementation approach with regard to administrative perspective. It must be properly documented with
references, justifications and diagrams wherever necessary to deem the assignment being successfully completed.

You have to research and find best optimal and practical solutions for above components by giving proper evaluations to justify your policy solutions and arrange them in a complete network security policy to secure the organization.

Deliverables

Based on the above requirements you have to develop a document and submit it to blackboard with all your group member details with their specific tasks they performed in a matrices table.

Expected length is 5,000 - 7,000 words, with as many illustrations as possible and with all references clearly  indicated and provided. You can use a diagramming application, e.g. Visio, for diagrams and copy them to the Word Document.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92749970

Have any Question?


Related Questions in Management Information System

The part you need to think about is what do all the changes

The part you need to think about is what do all the changes really mean for healthcare? Not only what skills will you require in the future, but who will you be hiring and what role will they fulfill? If we think that he ...

Assignment purpose the purpose of this assignment is to

Assignment Purpose: The purpose of this assignment is to explore exchange of heath information Assignment Description: Step One: Perform a web search and locate information about healthcare data interchange standards suc ...

Case study emerging wireless technology in the healthcare

Case Study : Emerging Wireless Technology in the Healthcare Industry The medical industry is a good example of an industry that must balance the security issues associated with wireless technologies with the business val ...

Read cybercrime deterrence and international legislation

Read "Cybercrime Deterrence and International Legislation: Evidence From Distributed Denial of Service Attacks," by Hui, Kim, and Wang, from MIS Quarterly (2017). Refer to this reading when completing Topic 8 DQ1. Read " ...

Ethics and information managementusing campbellsville

Ethics and Information Management Using Campbellsville University library and/or other sources, read at least four (4) academically reviewed articles on the ethical issues that may arise in information management. Please ...

Dscussion ethics and information management using

Discussion: Ethics and Information Management Using University library and/or other sources, read at least four (4) academically reviewed articles on the ethical issues that may arise in information management. Please no ...

Topic we all had the unfortunate experience of seeing how

Topic: We all had the unfortunate experience of seeing how computers can, at times, make life's journey abit more difficult. This is especially true in knowledge centric workplaces. Describe an example of a very poorly i ...

Using your organization or an organization you are familiar

Using your organization or an organization you are familiar with, describe an IT Security Infrastructure. You have been tasked with the job of reviewing the current security infrastructure at your organization. Your revi ...

Business process management is the technique used by

Business process management is the technique used by organizations to comprehend and describe the activities that help them function. Good process management can help make organizations more efficient and productive. For ...

Question 1 osi 7 layer modela what are benefits of using a

Question 1: OSI 7 layer Model. a) What are benefits of using a layered network model? b) Encryption takes place at which layer? c) Flow control takes place at which layer? d) Packets are found at which layer? e) Packet f ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As