Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Cmit 320 network security proposal part 1

28/12/2020 Client: saad24vbs Deadline: 14 Days

You have been hired as part of the network security team at UMUC. After completing orientation and training, your manager calls you into a meeting to discuss your first project.


The university has completed the implementation of the leased building in Adelphi, Maryland. If you recall, this was the Network Design Proposal completed in CMIT 265. The university realizes it needs to secure the faculty, students, and visitors network and data. With your background and skills, the university is looking to you for guidance. In addition to helping the university secure its network, you are required to obtain your CompTIA Security+ certification within 60-days of being hired.




Part 1:




· Define the vulnerability assessment requirement, propose a solution, and justify the solution.


· Students should review the text and example provided but do not include it with their submission. Delete the text and include you own.


· Define the security policy requirement, propose a solution, and justify the solution.


· Students should be specific when defining the overall security outlook for the organization.


· Define the risk management requirement, propose a solution, and justify the solution.


· Students should describe the process, its value to the organization, and use proper terminology.


· Define the business continuity plan requirements, propose a solution, and justify the solution.


· Student should describe the activity in detail, and include each of the plan types.


· Define the access controls requirement, propose a solution, and justify the solution.


· Students should be specific with the type of access control model they select.




Part 2:


· Define the physical security requirements, propose a solution, and justify the solution.


· At a minimum, students should discuss the three main factors of prevention, detection, and recovery; and include the appropriate control measure.


· Define the mobile device security requirements, propose a solution, and justify the solution.


· Students should include smartphones, laptops, tablets, or any other mobile device that may be introduced in the UMUC environment. Students should also include the considerations and their implications.


· Define the perimeter defense requirements, propose a solution, and justify the solution.


· Students should consider the different types of attacks, security appliances, and the network configuration to implement.


· Define the network defense requirements, propose a solution, and justify the solution.


· Students should discuss common network devices, their vulnerabilities, and propose defensive solutions.


· Define the host defense requirements, propose a solution, and justify the solution.


· Students should the types of attacks hosts are susceptible to, and proposal defensive solutions.




Part 3


· Define the public key infrastructure (PKI) requirements, propose a solution, and justify the solution.


· Students should be specific when discussing the implementation and configuration required for the PKI solution.


· Define the secure protocol implementation requirements, propose a solution, and justify the solution.


· Students should consider data as it is in transit and discuss the numerous scenarios and solutions to protect it.


· Define the file encryption requirements, propose a solution, and justify the solution.


· Students should consider data at rest and discuss the numerous scenarios and solutions to protect it.


· Define the file hashing implementation, propose a solution, and justify the solution.


· Students should consider where hashing should be implemented in the network design and explain what it provides in each instance.


· Define the backup and restoration implementation, propose a solution, and justify the solution.


· Students should explain the process, where it is applicable in the UMUC network scenario, and how it will be achieved (process, hardware, and frequency).

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Top Essay Tutor
Helping Hand
Homework Guru
Best Coursework Help
University Coursework Help
Writer Writer Name Offer Chat
Top Essay Tutor

ONLINE

Top Essay Tutor

I have more than 12 years of experience in managing online classes, exams, and quizzes on different websites like; Connect, McGraw-Hill, and Blackboard. I always provide a guarantee to my clients for their grades.

$105 Chat With Writer
Helping Hand

ONLINE

Helping Hand

I am an Academic writer with 10 years of experience. As an Academic writer, my aim is to generate unique content without Plagiarism as per the client’s requirements.

$100 Chat With Writer
Homework Guru

ONLINE

Homework Guru

Hi dear, I am ready to do your homework in a reasonable price and in a timely manner.

$102 Chat With Writer
Best Coursework Help

ONLINE

Best Coursework Help

I am an Academic writer with 10 years of experience. As an Academic writer, my aim is to generate unique content without Plagiarism as per the client’s requirements.

$100 Chat With Writer
University Coursework Help

ONLINE

University Coursework Help

Hi dear, I am ready to do your homework in a reasonable price.

$102 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

SMGT 501 - Forum Description - Article Review - Discussion due in 24 hours - Jupiter securities cimb - Week 9 - Fisher's r to z transformation spss - Four tires of an automobile are inflated - Differences between policies, procedures, standards and guidelines - Example of reverse acting controller - Discussion on below Topics - Case Study - Its only smiles tab - Information systems - Ritz cinema port macquarie - Knowledge work systems kws definition - Geometry area apothem worksheet key - Codes university of tasmania - Sea ray v drive - Philosophy of tech and society - HR Strategies Assignment - Ati the communicator clients displaying aggressive behavior - 45 degree reference line economics - Legal and managerial 2 - Federation university psychology clinic - Political science Week 5 Discussion - Hclo4 naoh neutralization reaction - Discounted cash flow analysis focuses primarily on - Data Visualization Project - How to find heat of reaction from graph - Write a peer response - K Question - Discussion: Changes From Combat, 6411-wk2-1 - Stock system practice - Amy tan the opposite of fate summary - Circles of attention stanislavski - The direct labor budget of yuvwell - Search The Internet For IT Governance Planning. Select A Specific Governance Plan That Exists At A Company Or A Plan Framework From An Organization. Write A 2-Page Paper On Three Or Four Of The Most Important Suggestions From The Plan You Select. - The steel rods be and cd each have a - Week 1 - Strategic - Celf 5 sample report - Erm adoption and implementation in the higher education environment - How has the patient's control over his own health care changed? - Simon langton wise pay - Factor completely 2x2 28x 98 - A firm evaluates all of its projects by applying the irr rule. if the required return is 14 percent - Mccorvey sheet metal net worth - Article Analysis and Evaluation of Research Ethics and Summary and Descriptive Statistics - Nursing 590 - Steve jobs as transformational leader - Pd online brisbane city - The lady tasting tea pdf free - A dentist's drill starts from rest after - Brenda patton was admitted to labor and delivery - Orientation day macquarie university - Middle passage robert hayden analysis - Multi step income statement practice problems - Should continuing nursing education be mandatory for all nurses - Standing wave pattern in waveguide - Wynnum manly used cars 250 tingal road - Mod 7 Class NIASU - History exam - Social Media Marketing - Http mail g fmarion edu com - Members should use the aicpa conceptual framework for independence to - The case for short words summary - Markel m 2015 technical communication 11th ed - Assignment part 2 - Controversial issue paper bshs 355 - Business intelligence concepts components techniques and benefits - Accounts payable procedures flowchart - Advanced Law9 - Economics - Elastic settlement of foundation - Evans technology has the following capital structure - Assume simple co had credit sales of - The chocolate war setting - Double merino pastry gow gee - The manufacturer of the vinegar used in this experiment - Highly brill leisure center swot analysis - Blue nile case study analysis - When you normally drive the freeway between sacramento - Open university switchboard 01908 - Speed reading course melbourne - Light stick chemical reaction - Calcium hypochlorite acid or base - Wellness worksheet 39 answers - An independent measures t hypothesis test is appropriate when ____ - Beth and bob martin have total take home pay - The little mermaid andersen sparknotes - Information security - We remember your childhood well - Week 3: The onset of data analysis - Programmed and nonprogrammed decisions in management - Form 11 consent orders - What is a reporting application name five basic reporting operations - Nursing Research Methods - Michelle o connor unsw - Excel module 4 sam exam - TLASGN4