Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Network security proposal

05/01/2021 Client: saad24vbs Deadline: 24 Hours

You have been hired as part of the network security team at UMUC. After completing orientation and training, your manager calls you into a meeting to discuss your first project.


The university has completed the implementation of the leased building in Adelphi, Maryland. If you recall, this was the Network Design Proposal completed in CMIT 265. The university realizes it needs to secure the faculty, students, and visitors network and data. With your background and skills, the university is looking to you for guidance. In addition to helping the university secure its network, you are required to obtain your CompTIA Security+ certification within 60-days of being hired.




Part 1:




· Define the vulnerability assessment requirement, propose a solution, and justify the solution.


· Students should review the text and example provided but do not include it with their submission. Delete the text and include you own.


· Define the security policy requirement, propose a solution, and justify the solution.


· Students should be specific when defining the overall security outlook for the organization.


· Define the risk management requirement, propose a solution, and justify the solution.


· Students should describe the process, its value to the organization, and use proper terminology.


· Define the business continuity plan requirements, propose a solution, and justify the solution.


· Student should describe the activity in detail, and include each of the plan types.


· Define the access controls requirement, propose a solution, and justify the solution.


· Students should be specific with the type of access control model they select.




Part 2:


· Define the physical security requirements, propose a solution, and justify the solution.


· At a minimum, students should discuss the three main factors of prevention, detection, and recovery; and include the appropriate control measure.


· Define the mobile device security requirements, propose a solution, and justify the solution.


· Students should include smartphones, laptops, tablets, or any other mobile device that may be introduced in the UMUC environment. Students should also include the considerations and their implications.


· Define the perimeter defense requirements, propose a solution, and justify the solution.


· Students should consider the different types of attacks, security appliances, and the network configuration to implement.


· Define the network defense requirements, propose a solution, and justify the solution.


· Students should discuss common network devices, their vulnerabilities, and propose defensive solutions.


· Define the host defense requirements, propose a solution, and justify the solution.


· Students should the types of attacks hosts are susceptible to, and proposal defensive solutions.




Part 3


· Define the public key infrastructure (PKI) requirements, propose a solution, and justify the solution.


· Students should be specific when discussing the implementation and configuration required for the PKI solution.


· Define the secure protocol implementation requirements, propose a solution, and justify the solution.


· Students should consider data as it is in transit and discuss the numerous scenarios and solutions to protect it.


· Define the file encryption requirements, propose a solution, and justify the solution.


· Students should consider data at rest and discuss the numerous scenarios and solutions to protect it.


· Define the file hashing implementation, propose a solution, and justify the solution.


· Students should consider where hashing should be implemented in the network design and explain what it provides in each instance.


· Define the backup and restoration implementation, propose a solution, and justify the solution.


· Students should explain the process, where it is applicable in the UMUC network scenario, and how it will be achieved (process, hardware, and frequency).



Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Top Essay Tutor
University Coursework Help
Helping Hand
Writer Writer Name Offer Chat
Top Essay Tutor

ONLINE

Top Essay Tutor

I have more than 12 years of experience in managing online classes, exams, and quizzes on different websites like; Connect, McGraw-Hill, and Blackboard. I always provide a guarantee to my clients for their grades.

$40 Chat With Writer
University Coursework Help

ONLINE

University Coursework Help

Hi dear, I am ready to do your homework in a reasonable price.

$37 Chat With Writer
Helping Hand

ONLINE

Helping Hand

I am an Academic writer with 10 years of experience. As an Academic writer, my aim is to generate unique content without Plagiarism as per the client’s requirements.

$35 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Conquered the incan empire with force deceit and diplomacy - Greek philosophy reflection. - Summarize article - The ugly american book sparknotes - Advantages of transactional model of communication - 490 513 in expanded form - Irish daily star contact - Signature assignment financial statement analysis and firm performance - Don't stop searching or waste invaluable time waiting! - Mini lathe saddle adjustment - Tim bicycle shop sells speed bicycles - Zalora value proposition - Percentage of acetic acid in vinegar lab answers - Breath james nestor big w - Jb hi-fi trade in value list - Why is it called alkaline earth metals - Iaru global summer program - Frequency response of amplifiers lecture notes - Define the contested boundaries among amazon apple facebook and google - Desjardins suggests that the earth's biological productivity be thought of in what way? - Literature review: the correlation between proper nutritional education and weight management - Moe's southwest grill annual report 2017 - Immigration and public administration 5 page paper - Ubs access card nfc - 102 minutes that changed the world - What is the value of pi 4 - Week 1 Discussion For composition III - The st martin's handbook 8th edition - On a classified balance sheet companies usually list current assets - +971561686603 Abortion pills in Dubai/Abu Dhabi-mifepristone & misoprostol in DUBAI - Jeff nippard full body program pdf - Outpatient vs hospital presentation - Word of the week 2 - Key elements of a short story - Niddrie mill primary school - Nola pender's health promotion model theory - Nature of the dreaming - General protections involving dismissal - 20 mcclelland street willoughby - Loveliest of trees the cherry now stanza 3 explanation - One foul swoop clothing - Can tertiary alcohols be oxidised - Abercrombie and fitch diversity issues - The challenge of third world development howard handelman pdf - Skeletal and muscular system worksheet - Older adult of nursing care - The ntl handbook of organizational development and change pdf - Final Exam quiz - Federal safeguards for financial managers - The dove counterbalance intelligence test - 362 - Twin screw extruder food processing - Casio fx 82au plus ii manual - Animal farm compare and contrast essay - Royal hobart hospital endocrinology - Advantages of electric heating - Crafting and executing strategy 22nd edition - Model risk excel add in - Cmpe3 - Motifs in julius caesar - The market for pizza has the following demand and supply - Racq car seat fitting - 2 separate training and development assignments? - Guide dog instructor training - Organisation of data in statistics - Effective writing a handbook for accountants 11th edition pdf - Is evolution a good explanation for psychological concepts - Technicol sa registration form - 3 m mastery problem accounting answers - Secondary road map symbol - Chapter 3 checkpoint questions introduction to java - Worcester university accommodation costs - How to deal with resource overload in project management - Pn depression case study - I need a turnitin report done on this to see if it has been plagarised. - Mitosis and meiosis lab 5 answers - Test tube rack scientific diagram - Bamboo consulting is a consulting firm owned - Andre's mother questions and answers - See the doc and respond if you can complete it in 12 hours - Ecosystem approach - Price elasticity of demand worksheet with answers - How to critique a speech - Anandam manufacturing company cash flow statement - K3 child care humble tx - Aca code of ethics informed consent - Enthalpy of lattice formation - Iready scale score explanation - Acceptance and commitment therapy for eating disorders - Target customer of milk tea - Azman haroon north lakes - 1 in a centralized organization decision making authority is - Initial discussion - Ethics crime and criminal justice 2nd edition pdf - Assignment 2 - Benefits of roman expansion - Apple inc performance in a zero sum world economy - Naplan administration handbook 2021 - Locate a bad news message somewhere on the internet - Essentials of business communication 11th edition pdf