Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Security Requirements

New Content for Section 1: Project Outline

For this assignment, be sure to include the following:

• Provide a brief description of the organization that will be used as the basis for the projects in the course.
• Include the company size, location, and other pertinent information.
• The organization should be large enough to require a Web-based or Internet network with security as an important factor in the infrastructure design.

New Content for Section 1: Security Requirements

For this part of the Key Assignment, include the following:

• Provide an overview of the new Web-based or Internet network the organization plans to implement.

• Prepare an overview of the security requirements for the network, including a discussion of the services that the overall network will support and areas for consideration to secure them.

Network Security Architecture Design Document

This course is comprised of a series of Individual Project assignments that will contribute to a Key Assignment submission at the end of the course. Each week, you will complete a part of a Network Security Architecture Design document. You will select a newer organization and apply your research to the development of a Network Security Architecture Design that would be appropriate for the organization to implement a new Web-based or Internet network with an overall security architecture included in its design.

You will be given a Key Assignment to develop a Network Security Architecture Design document for an organization of your choosing. The goal of this project is to develop the security architecture design for a new Web-based or Internet network.

Organization Selection

The first step will be to select an organization as the target for your Network Security Architecture Design document. This organization will be used as the basis for each of the assignments throughout the course, and should conform to the following guidelines:

• Nontrivial: The organization should be large enough, and require a sufficiently sized network to allow reasonable exercise of the network security architecture research and design process. The organization can be fictional if necessary, and appropriate assumptions may be made.

• Domain Knowledge: You should be familiar enough with the organization to allow focus on the project tasks without significant time required for domain education.

• Accessibility: You should have good access to the people and other information related to the project, because this will be an important part of the process.

Select an organization that meets these requirements, and submit your proposal to your instructor before proceeding further with the assignments in the course. Approval should be sought within the first several days of the course. Your instructor will tell you how to submit this proposal and the notification that will be given for project approval.

Key Assignment

For the assignments in this course, you will be developing a Network Security Architecture Design document that defines the security design for the organization's Web-based or Internet network. Your first task in this process will be to select an organization to use as the basis of your research and analysis for each of the assignments in the course. You will also create the shell document for the final project deliverable that you will be working on during each unit. As you proceed through each project phase, you will add content to each section of the final document to gradually complete the final project delivery. Appropriate research should be conducted to support the development of your document, and assumptions may be made when necessary.

The project deliverables are as follows:

• Submit your project proposal to your instructor for approval
• Network Security Infrastructure Design Document
• Use Word
• Title Page

o Course number and name
o Project name
o Your name
o Date

• Table of Contents (TOC)

o Use an autogenerated TOC.
o Place it on a separate page.
o It should be a maximum of 3 levels deep.
o Be sure to update the fields of the TOC so it is up-to-date before submitting your project.

• Section Headings (create each heading on a new page with "TBD" as content, except for sections listed under New Content below)

o Section 1: Project Outline
o Section 1: Security Requirements
o Section 2: Perimeter Security
o Section 3: Client and Server Security
o Section 4: Wireless and Remote Access Security
o Section 5: Security Configuration Management

New Content for Section 1: Project Outline

For this assignment, be sure to include the following:

• Provide a brief description of the organization that will be used as the basis for the projects in the course.
• Include the company size, location, and other pertinent information.
• The organization should be large enough to require a Web-based or Internet network with security as an important factor in the infrastructure design.

New Content for Section 1: Security Requirements

For this part of the Key Assignment, include the following:

• Provide an overview of the new Web-based or Internet network the organization plans to implement.
• Prepare an overview of the security requirements for the network, including a discussion of the services that the overall network will support and areas for consideration to secure them.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M92054028
  • Price:- $50

Priced at Now at $50, Verified Solution

Have any Question?


Related Questions in Computer Network & Security

Assignment - 8021q tunneling q-in-q configuration8021q

Assignment - 802.1Q Tunneling (Q-in-Q) Configuration 802.1Q tunneling (aka Q-in-Q) is a technique often used by Metro Ethernet providers as a layer 2 VPN for customers. 802.1Q (or dot1q) tunneling is pretty simple...the ...

How would you explain the concept of a quality adjusted

How would you explain the concept of a quality adjusted life year? When is it appropriate to use "QALYs" instead of simply improved life expectancy as the outcome measure in an economic evaluation?

Americans purchase a lot of coffee grown in brazil and

Americans purchase a lot of coffee grown in Brazil and elsewhere in Latin America. It would seem that in order to avoid the huge transportation costs of bringing coffee here and to provide jobs for Americans, we should g ...

You just signed a 30-year lease agreement for a business

You just signed a 30-year lease agreement for a business property. The monthly rent for the first year is $1,000/month, with the ?rst month's rent due today. Starting from the second year onward, the monthly rent will be ...

Cybersecurity policy design issues describe cybersecurity

Cybersecurity Policy Design Issues Describe cybersecurity policy features that are needed to protect against the Insider Threat, Operations Security, Access Control and Biometric Authentication What features can be added ...

Part ian attacker seeks to view the contents of a specific

Part I An attacker seeks to view the contents of a specific Microsoft Word document file to which they do not have any kind of access. You may assume that: - no exploitable vulnerabilities of any kind exist; - the attack ...

Assignment descriptionproject scope a typical

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

Sms use short message peer to peer smpp protocolimessage

SMS use Short Message Peer to Peer (SMPP) protocol IMessage based on Apple push notifications (APNS) - binary protocol WhatsApp uses standard Extensible Messaging and Presence Protocol (XMPP) Write a pragraph explaining ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As