Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Network security proposal

05/01/2021 Client: saad24vbs Deadline: 24 Hours

You have been hired as part of the network security team at UMUC. After completing orientation and training, your manager calls you into a meeting to discuss your first project.


The university has completed the implementation of the leased building in Adelphi, Maryland. If you recall, this was the Network Design Proposal completed in CMIT 265. The university realizes it needs to secure the faculty, students, and visitors network and data. With your background and skills, the university is looking to you for guidance. In addition to helping the university secure its network, you are required to obtain your CompTIA Security+ certification within 60-days of being hired.




Part 1:




· Define the vulnerability assessment requirement, propose a solution, and justify the solution.


· Students should review the text and example provided but do not include it with their submission. Delete the text and include you own.


· Define the security policy requirement, propose a solution, and justify the solution.


· Students should be specific when defining the overall security outlook for the organization.


· Define the risk management requirement, propose a solution, and justify the solution.


· Students should describe the process, its value to the organization, and use proper terminology.


· Define the business continuity plan requirements, propose a solution, and justify the solution.


· Student should describe the activity in detail, and include each of the plan types.


· Define the access controls requirement, propose a solution, and justify the solution.


· Students should be specific with the type of access control model they select.




Part 2:


· Define the physical security requirements, propose a solution, and justify the solution.


· At a minimum, students should discuss the three main factors of prevention, detection, and recovery; and include the appropriate control measure.


· Define the mobile device security requirements, propose a solution, and justify the solution.


· Students should include smartphones, laptops, tablets, or any other mobile device that may be introduced in the UMUC environment. Students should also include the considerations and their implications.


· Define the perimeter defense requirements, propose a solution, and justify the solution.


· Students should consider the different types of attacks, security appliances, and the network configuration to implement.


· Define the network defense requirements, propose a solution, and justify the solution.


· Students should discuss common network devices, their vulnerabilities, and propose defensive solutions.


· Define the host defense requirements, propose a solution, and justify the solution.


· Students should the types of attacks hosts are susceptible to, and proposal defensive solutions.




Part 3


· Define the public key infrastructure (PKI) requirements, propose a solution, and justify the solution.


· Students should be specific when discussing the implementation and configuration required for the PKI solution.


· Define the secure protocol implementation requirements, propose a solution, and justify the solution.


· Students should consider data as it is in transit and discuss the numerous scenarios and solutions to protect it.


· Define the file encryption requirements, propose a solution, and justify the solution.


· Students should consider data at rest and discuss the numerous scenarios and solutions to protect it.


· Define the file hashing implementation, propose a solution, and justify the solution.


· Students should consider where hashing should be implemented in the network design and explain what it provides in each instance.


· Define the backup and restoration implementation, propose a solution, and justify the solution.


· Students should explain the process, where it is applicable in the UMUC network scenario, and how it will be achieved (process, hardware, and frequency).



Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Top Essay Tutor
University Coursework Help
Helping Hand
Writer Writer Name Offer Chat
Top Essay Tutor

ONLINE

Top Essay Tutor

I have more than 12 years of experience in managing online classes, exams, and quizzes on different websites like; Connect, McGraw-Hill, and Blackboard. I always provide a guarantee to my clients for their grades.

$40 Chat With Writer
University Coursework Help

ONLINE

University Coursework Help

Hi dear, I am ready to do your homework in a reasonable price.

$37 Chat With Writer
Helping Hand

ONLINE

Helping Hand

I am an Academic writer with 10 years of experience. As an Academic writer, my aim is to generate unique content without Plagiarism as per the client’s requirements.

$35 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Maitland grossman high school - History of dirt bikes - Part time courses mayo - Methods in behavioral research 13th edition pdf - Ped assignment - Honduras tiene un nuevo new programa de - Business Management - Inténtalo escribe el equivalente de las palabras en inglés - Wolverhampton uni library catalogue - Academic honesty policy usyd - Example of an enthymeme in the media - Locus in coordinate geometry - Kingdom phylum class order - Types of non experimental research methods - Amp signature super abn - 250 words and two scholarly sources - Houda nait el barj - Darlington futures ltd v delco australia pty ltd - Merger and acquisition notes for mba - Oze 4x4 270 awning - Eight theories of religion pals pdf - The alamo drafthouse case study - DISASTER MANAGEMENT PAPER - How to know if functions are inverses of each other - What poetic devices are used in my papa's waltz - Boy on a swing questions and answers - Advantages and disadvantages of responsibility accounting - Radioactive dating game lab worksheet answers - Case study treatment plan example - Plaster of paris crucible - Arts of the contact zone - 2 samuel 7 bible study questions - Comparative essay ENC1102 writing assignment - Causes of prejudice vincent n parrillo summary - Aligning stockholder and management interests - Charge of the light brigade poem pdf - Master bilt controller manual - Bsbldr502 lead and manage effective workplace relationships pdf - Nitrogen at an initial state of - Mcdonald's global performance management practices - Cryptography - Examples of feedback to students - Computation - Autodesk redundant license server - 7 important historical events that you believe influence sexuality today - Tableau desktop specialist practice exam - Assignment, finish in 3 hours - Dehydration powerpoint presentations - Animal farm essay questions pdf - Khan academy plate tectonics - Decision Making - When using backflush costing, product costs are first accumulated in the __________ account. - 114/152 palm meadows drive - Keith rn case study answers - Family therapy treatment planner pdf - Probate advertisement online victoria - Infographic and Essay - Culture and values 8th edition pdf - 75mm joist hangers screwfix - CPSC 355 Assignment 3 - Phet states of matter - Article reflection - 6 types of reactions - Have you ever seen rain lyrics - Example of a diary entry - The odyssey robert fagles summary - A rounded version the theory of multiple intelligences summary - Blood feedback loop key - Psychology - Marketing Suggestions - Sex without love by sharon summary - Ucl for x bar chart - Questions to answer - Cherry red and apple blossom white - Ltea 120c - How do woodlice move - How to make a bacterial lawn - Answer both of these prompts. - Portfolio letter to the reader - Fahrenheit 451 reading guide - Palomar health pathmaker - Mansfield state high school catchment - LDR/711A: Leadership Theory And Practice Wk 4 - Case Study Analysis - How do you value life essay - Slumdog millionaire paper planes scene - Bill and joyce schnappauf tax return - St mary's hospital parking - Assignment 3: Capstone Research Project - All minus one jonathan haidt - For the first time in forever - The market is strong-form inefficient when - Wk7 responses 6053 - Year 7 history ancient china - Starry night edvard munch analysis - Passenger let her go lyrics meaning - Clive wearing case study - Transferring and transforming energy - Act 3 crucible summary - Why is america self segregating - Too big to fail movie watch free