Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Network security proposal paper

05/01/2021 Client: saad24vbs Deadline: 24 Hours

You have been hired as part of the network security team at UMUC. After completing orientation and training, your manager calls you into a meeting to discuss your first project.


The university has completed the implementation of the leased building in Adelphi, Maryland. If you recall, this was the Network Design Proposal completed in CMIT 265. The university realizes it needs to secure the faculty, students, and visitors network and data. With your background and skills, the university is looking to you for guidance. In addition to helping the university secure its network, you are required to obtain your CompTIA Security+ certification within 60-days of being hired.




Part 1:




· Define the vulnerability assessment requirement, propose a solution, and justify the solution.


· Students should review the text and example provided but do not include it with their submission. Delete the text and include you own.


· Define the security policy requirement, propose a solution, and justify the solution.


· Students should be specific when defining the overall security outlook for the organization.


· Define the risk management requirement, propose a solution, and justify the solution.


· Students should describe the process, its value to the organization, and use proper terminology.


· Define the business continuity plan requirements, propose a solution, and justify the solution.


· Student should describe the activity in detail, and include each of the plan types.


· Define the access controls requirement, propose a solution, and justify the solution.


· Students should be specific with the type of access control model they select.




Part 2:


· Define the physical security requirements, propose a solution, and justify the solution.


· At a minimum, students should discuss the three main factors of prevention, detection, and recovery; and include the appropriate control measure.


· Define the mobile device security requirements, propose a solution, and justify the solution.


· Students should include smartphones, laptops, tablets, or any other mobile device that may be introduced in the UMUC environment. Students should also include the considerations and their implications.


· Define the perimeter defense requirements, propose a solution, and justify the solution.


· Students should consider the different types of attacks, security appliances, and the network configuration to implement.


· Define the network defense requirements, propose a solution, and justify the solution.


· Students should discuss common network devices, their vulnerabilities, and propose defensive solutions.


· Define the host defense requirements, propose a solution, and justify the solution.


· Students should the types of attacks hosts are susceptible to, and proposal defensive solutions.




Part 3


· Define the public key infrastructure (PKI) requirements, propose a solution, and justify the solution.


· Students should be specific when discussing the implementation and configuration required for the PKI solution.


· Define the secure protocol implementation requirements, propose a solution, and justify the solution.


· Students should consider data as it is in transit and discuss the numerous scenarios and solutions to protect it.


· Define the file encryption requirements, propose a solution, and justify the solution.


· Students should consider data at rest and discuss the numerous scenarios and solutions to protect it.


· Define the file hashing implementation, propose a solution, and justify the solution.


· Students should consider where hashing should be implemented in the network design and explain what it provides in each instance.


· Define the backup and restoration implementation, propose a solution, and justify the solution.


· Students should explain the process, where it is applicable in the UMUC network scenario, and how it will be achieved (process, hardware, and frequency).



Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

University Coursework Help
Top Essay Tutor
Helping Hand
Writer Writer Name Offer Chat
University Coursework Help

ONLINE

University Coursework Help

Hi dear, I am ready to do your homework in a reasonable price.

$102 Chat With Writer
Top Essay Tutor

ONLINE

Top Essay Tutor

I have more than 12 years of experience in managing online classes, exams, and quizzes on different websites like; Connect, McGraw-Hill, and Blackboard. I always provide a guarantee to my clients for their grades.

$105 Chat With Writer
Helping Hand

ONLINE

Helping Hand

I am an Academic writer with 10 years of experience. As an Academic writer, my aim is to generate unique content without Plagiarism as per the client’s requirements.

$100 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Hw - Sandow birk death of manuel - Health policy issues an economic perspective seventh edition pdf - Bkwsu live webcast eu - Reflexology client consultation form - Animal cell 3d model - Aeon carrefour tesco and metro group are - Guns on college campuses debate - Value proposition template doc - Xs l7t spark plug - Nace senior corrosion technologist - Stephen king the body - Koral dental clinic vera - How do you use a dial caliper - Rural conservation zone victoria - I NEED THIS DONE ASAP!!!! DUE SATURDAY NIGHT!!!! - Cuáles son tres formas de decir headset - Capstone Change Project Outcomes - 8sl preparation for trailer tow hitch - Electricity consumer safety regulation 2006 - Nursing Role and Scope - Geology dip and strike - Football helmet fitting guide - Capstone Project Framework - External governance control mechanisms include - Access chapter 4 grader project assessment 1 - 2021 vce exam timetable - Plum creek v oleg borman - Which statement below describes a variable cost - Https learning rasmussen edu - Follett the giving of orders - Collecting gas by water displacement - What time is 12 55 am - Zahi hawass net worth - Rhetorical Elements/Cognate Strategies - 1 page APA - Dozier corporation is a fast-growing supplier of office products - Week 4 - Oncology churchill hospital oxford - New Present Value - Dream chocolate case study answers - Virtual lab model ecosystems answers - Quan Response paper - Fish scales tell the age of a fish worksheet answers - Write a discussion- Ensuring Public Safety - 1/131 stafford street penrith - Reading a scientific paper - P kolino business plan analysis - Tryst with destiny speech transcript - Introduction to java programming and data structures 11th edition pdf - Player b's longest home run - Obtain the thevenin equivalent at terminals ab - Global marketing hollensen 2017 pdf - How to eliminate negativity presentation ppt - Testout 4.3 3 connect network devices - Charging different prices for the same product - What does cross burning mean - Assignment 2 - Chinese english medical terminology - Whistleblowing in publicly traded companies within the last 12 months - Mayo clinic swot analysis 2018 - #10 - Writing assignment - How to run driver verifier - Aseptic technique and cultivation lab report - Mental Illness - What are the conventions of shakespearean comedy - Disclaimer of opinion audit report example india - Cmi drg - TEAM MANAGEMENT assignment 1 - Detroit 60 series running rough - Cloud computing - Mha 516 4 - Hunting the nightmare bacteria questions - Chemistry review packet answer key - Is the tiger in life of pi a metaphor - Bsg quiz 2 answer key - BA ONLY - Mangerial Economics - Cloud Computing - Hypervisors - Willem de kooning's woman and bicycle is controversial for its - Does texting affect writing michaela cullington - Design a feminist button - Monash course progression check - Drawing inferences reasoning questions - Eating the hyphen lily wong summary - 3 questions - Need help please - Pan europa foods sa case study answers - How to disable mcafee endpoint encryption for removable media - Joanna scanlan doc martin - Genesis 11 1-9 nlt - Cites article 10 certificate - Tyler company acquired all of jasmine company's outstanding stock - Research paper with atleast 500 words - Coventry auto parts mandurah - My brother sam is dead questions - Myocardium receives its blood supply from - A steel tank is completely filled with - Examples of first class levers