Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

In this assignment, you will write a paper in which you create a network security plan for a small business.

Tasks:

You are an IT manager for a small business. You are being asked to create a network security plan both for internal IT workers and for the company in general.

You are to put together a network security plan that addresses each of the following components:

  • Create a standard procedure for adding new users to a network.
  • Explain the use of virtual private networks (VPNs) and their security benefits and drawbacks.
  • Create a summary of a network plan, including the use of a firewall, written for a business person with limited knowledge of IT.
  • Document the uses of an intrusion detection system.
  • Identify and explain whether workers should be required to report potential security violations and create a policy based on your viewpoints.
  • Determine the best e-mail policy for an organization and document it for a business owner.
  • Create a password-change policy for a networking group.
  • Provide an executive summary briefing for a non-IT manager to review the business implications for the IT policies that you are recommending.

Submission Details:

  • By Monday, March 14, 2016, prepare a 7- to 9-page report. Write in a clear, concise, and organized manner; demonstrate ethical scholarship in accurate representation and attribution of sources (i.e., use APA format); and display accurate spelling, grammar, and punctuation.
  • Save your document in a Microsoft Word document with the name M5_A1_LastName_FirstIinitial.doc, and upload it to the M5 Assignment 1 LASA 2 Dropbox.

LASA 2 Grading Criteria and Rubric

All LASAs in this course will be graded using a rubric. This assignment is worth 300 points. Download the rubric and carefully read it to understand the expectations.

Assignment 1 Grading Criteria Maximum Points
Explained the use of VPNs and their security benefits and drawbacks. 32
Created a standard procedure for adding new users to a network. 36
Created a summary of a network plan, including the use of a firewall, written for a business person with limited knowledge of IT. 36
Documented the uses of an intrusion detection system. 40
Identified and explained whether workers should be required to report potential security violations and created a policy based on your viewpoints. 36
Determined the best e-mail policy for an organization and document it for a business owner. 28
Created a password-change policy for a networking group. 28
Writing Components:
  • Organization (16)
  • Usage and Mechanics (16)
  • APA Elements (24)
  • Style (8)
64
Total: 300

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91706940

Have any Question?


Related Questions in Computer Engineering

The contracts manager at a company needs to make a large

The contracts manager at a company needs to make a large legal document available to an overseas customer. However, she has some challenges: The document contains sensitive information; it is too large to send via e-mail ...

Are us executives paid too much particularly compared to

Are U.S. Executives paid too much particularly compared to the average worker in their organization?

In python why would one use a decision statement contained

In Python, Why would one use a decision statement contained inside the branch of another decision statement?

The demand for salt is relatively price inelastic while the

The demand for salt is relatively price inelastic, while the demand for pretzels is relatively price elastic. How can you best explain why and elaborate your answer.

Question what some of the reasons that evolutionary models

Question : What some of the reasons that evolutionary models are considered by many to be the best approach to software development. The response must be typed, single spaced, must be in times new roman font (size 12) an ...

Let a and b be events the symmetric difference atriangleb

Let A and B be events. The symmetric difference A(triangle)B is defined to be the set of all elements that are in A or B but not both. In logic and engineering, this even is also called the XOR (exclusive or) of A and B. ...

Explain that when an unauthorized individual gains access

Explain that when an unauthorized individual gains access to the information an organization trying to protect, that act is categorized as a deliberate act of espionage or trespass.

Question suppose you are stranded on a desert island on

Question : Suppose you are stranded on a desert island on which queues are plentiful, but you need a stack. How can you implement a stack using two queues? What is the big-Oh running time of the stack operations?

What are information silos what are the problems caused by

What are information silos? What are the problems caused by information silos? How organizations can solve the problems caused by information silos?

Explain that when an unauthorized individual gains access

Explain that when an unauthorized individual gains access to the information an organization trying to protect, that act is categorized as a deliberate act of espionage or trespass.

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As