Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Network security proposal part 1

13/11/2020 Client: papadok01 Deadline: 3 days

Network Security Proposal Template
Network Security Proposal

Prepared by:

Student Name

I. Analysis and Planning

A. Vulnerability Assessment

Requirements

In the requirements section, students will make explicit UMUC’s requirements for a vulnerability assessment. Use the information provided in the TestOut LabSim and the scenario to explain the requirements for UMUC need to a vulnerability assessment. If you need more information, feel free to ask your instructor or make some assumptions. If you make assumptions, be sure to list them. This section should be used to describe the vulnerability assessment requirements of the task at hand. That is, you will be making explicit the requirements as you understand them, which will lead to the next section (your proposed solution). See below for an example. Given this section requires information related to vulnerability assessments, students should review TestOut LabSim section 11 (Assessments and Audits), and use additional resources as necessary.

Example ( Note: The paragraph that follows is an example. It is expected that students will use this as a reference only. Do not copy and paste into your network security proposal. Remember to include references and cite your work per the IEEE standard.)

Secure Network Contractors believes that students, faculty, and staff health, well­being, and morale have a significant impact on the learning experience and productivity of the academic institution. The university wants to ensure a secure operating environment for the students, faculty and staff. In order to achieve that desire, a current understanding of any vulnerabilities that may exist is necessary. Therefore, a requirement for the university is to perform a vulnerability assessment on the existing configuration. Below we make explicit how we will successfully achieve this requirement. That is, we propose what can be done to achieve the requirement of the vulnerability assessment. Then, we justify why this is a necessary requirement for the Network Security Proposal. Etc… (Students should continue to explain the technical requirements).

Proposed Solution

In the proposed solution section, students will provide details of the proposed solution, based on the technical requirements and assumptions. Student should be specific and use additional resources as necessary. For example, if the solution is to perform a vulnerability assessment with a vulnerability scanner, research the types of vulnerability scanners currently available. Select one and describe it to the reader. Given this section requires us to understand vulnerability assessments, students should review TestOut LabSim section 11 (Assessments and Audits), and use additional resources as necessary.

Example ( Note: The paragraph that follows is an example. It is expected that students will use this as a reference only. Do not copy and paste into your network security proposal. Remember to include references and cite your work per the IEEE standard.)

Secure Network Contractors has researched the available vulnerabilities scanners that will allow us to meet the requirement of performing a vulnerability assessment on the UMUC network. A vulnerability scanner is a software program that passively searches an application, computer, or network for weaknesses. [1] Weaknesses in the context of a vulnerability assessment relate to vulnerabilities such as open ports, active IP addresses, running application or services, missing critical patches, default user accounts that have not been disabled, default or blank passwords, misconfiguration, and missing security controls. [1] The solutions available include freely available scanners, and those that can be purchased. The differences between these two types of vulnerability scanners are based on their functionality and outputs. For example, some vulnerability scanners that are free offer a command line tool to perform the scan. Some of the paid vulnerability scanners offer an intuitive, Graphical User Interface (GUI) that allows for a point-and-click solution. The output provided by the scanners range from a list of vulnerabilities to a graphical depiction of the network. Secure Network Contractors recommends an initial vulnerability scan with a freely available tool called Open Vulnerability Assessment System (OpenVAS), so that we can understand the existing network security posture. After we perform the necessary patches and network security implementation described in the remainder of the proposal, we suggest performing a second vulnerability assessment with a second vulnerability scanner tool. This will enable us to initially identify vulnerabilities, fix them to the best of our ability, implement additional security mechanisms, and then rescan the network a second time with another vulnerability scanner to see how well we did. The process is repeatable and should be used continuously to provide situational awareness of our network security posture. Etc… (Students should continue to explain the technical requirements).

Justification

This section should be used to justify your proposed solution based on the requirement(s). That is, you are explaining why you proposed the solution in the aforementioned paragraph, based on the requirement you made explicit in aforementioned paragraph. Each section should allow the reader to proceed from requirement, to solution, to justification. Given this section requires us to understand vulnerability assessments, students should review TestOut LabSim section 11 (Assessments and Audits), and use additional resources as necessary.

Example ( Note: The paragraph that follows is an example. It is expected that students will use this as a reference only. Do not copy and paste into your network security proposal. Remember to include references and cite your work per the IEEE standard.)

Secure Network Contractors believes that Open Vulnerability Assessment System (OpenVAS) is the best solution based on the requirements described by the University of Maryland University College (UMUC). Specifically, the requirement that we perform a vulnerability assessment. This initial assessment will be one of many we propose are performed. We proposed OpenVAS because it is free, with most components licensed under the GNU General Public License (GNU GPL). OpenVAS requires an initial configuration on a Linux-based host, but provides an intuitive and easy to manage backend to determine network and host-based vulnerabilities. Etc… (Students should continue to explain their justification).

B. Security Policy

Requirements

In the requirements section, students will make explicit UMUC’s requirements for a security policy. Given this section requires information related to security policies, students should review TestOut LabSim section 4 (Policies, Procedures, and Awareness), and use additional resources as necessary.

Proposed Solution

In the proposed solution section, students will provide details of the proposed solution, based on the technical requirements and assumptions. Student should be specific and use additional resources as necessary. Given this section requires us to understand security policies, students should review TestOut LabSim section 4 (Policies, Procedures, and Awareness), and use additional resources as necessary.

Justification

This section should be used to justify your proposed solution based on the requirement(s). That is, you are explaining why you proposed the solution in the aforementioned paragraph, based on the requirement you made explicit in aforementioned paragraph. Each section should allow the reader to proceed from requirement, to solution, to justification. Given this section requires us to understand security policies, students should review TestOut LabSim section 4 (Policies, Procedures, and Awareness), and use additional resources as necessary.

C. Risk Management

Requirements

In the requirements section, students will make explicit UMUC’s requirements for a security policy. Given this section requires information related to risk management, students should review TestOut LabSim section 4 (Policies, Procedures, and Awareness), and use additional resources as necessary.

Proposed Solutions

In the proposed solution section, students will provide details of the proposed solution, based on the technical requirements and assumptions. Student should be specific and use additional resources as necessary. Given this section requires us to understand risk management, students should review TestOut LabSim section 4 (Policies, Procedures, and Awareness), and use additional resources as necessary.

Justification

This section should be used to justify your proposed solution based on the requirement(s). That is, you are explaining why you proposed the solution in the aforementioned paragraph, based on the requirement you made explicit in aforementioned paragraph. Each section should allow the reader to proceed from requirement, to solution, to justification. Given this section requires us to understand risk management, students should review TestOut LabSim section 4 (Policies, Procedures, and Awareness), and use additional resources as necessary.

D. Business Continuity Plan

Requirements

In the requirements section, students will make explicit UMUC’s requirements for a business continuity plan. Given this section requires information related to a business continuity plan, students should review TestOut LabSim section 4 (Policies, Procedures, and Awareness), and use additional resources as necessary.

Proposed Solutions

In the proposed solution section, students will provide details of the proposed solution, based on the technical requirements and assumptions. Student should be specific and use additional resources as necessary. Given this section requires us to understand business continuity plan, students should review TestOut LabSim section 4 (Policies, Procedures, and Awareness), and use additional resources as necessary.

Justification

This section should be used to justify your proposed solution based on the requirement(s). That is, you are explaining why you proposed the solution in the aforementioned paragraph, based on the requirement you made explicit in aforementioned paragraph. Each section should allow the reader to proceed from requirement, to solution, to justification. Given this section requires us to understand business continuity planning, students should review TestOut LabSim section 4 (Policies, Procedures, and Awareness), and use additional resources as necessary.

E. Access Controls

Requirements

In the requirements section, students will make explicit UMUC’s requirements for a access controls. Given this section requires information related to access controls, students should review TestOut LabSim section 2 (Access Controls and Identity Management), and use additional resources as necessary.

Proposed Solutions

In the proposed solution section, students will provide details of the proposed solution, based on the technical requirements and assumptions. Student should be specific and use additional resources as necessary. Given this section requires us to understand access controls, students should review TestOut LabSim section 2 (Access Controls and Identity Management), and use additional resources as necessary.

Justification

This section should be used to justify your proposed solution based on the requirement(s). That is, you are explaining why you proposed the solution in the aforementioned paragraph, based on the requirement you made explicit in aforementioned paragraph. Each section should allow the reader to proceed from requirement, to solution, to justification. Given this section requires us to understand access controls, students should review TestOut LabSim section 2 (Access Controls and Identity Management), and use additional resources as necessary.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Buy Coursework Help
Quality Homework Helper
Ideas & Innovations
Writer Writer Name Offer Chat
Buy Coursework Help

ONLINE

Buy Coursework Help

Hi dear, I am ready to do your homework in a reasonable price.

$77 Chat With Writer
Quality Homework Helper

ONLINE

Quality Homework Helper

Hi dear, I am ready to do your homework in a reasonable price.

$77 Chat With Writer
Ideas & Innovations

ONLINE

Ideas & Innovations

Hi, Hope you are doing well. I can do this easily because I have several experiences to write articles on different web sites, creative content for several blogs & also SEO writing. Even I have written many kindle ebooks, Being a creative writer, I think I am the most eligible person for your Ghostwriting project. So lets make no longer delay & start chatting immediately.

$75 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Nsw admission board rules 2015 - Legislator/nurse's role as advocate for improving health care delivery - Dissection tools and their functions - Major essay - Uxbridge middlesex ub8 3ph - Http www free energy info co uk - 490 RN - Discussion - Current issues in tax - Diffusion virtual lab answer key - Work hard get smart no excuses worksheet answers - Ashford university sci 207 lab kit - Hius 221 quiz 2 - Two Prompts (Two Pages) using the book "Brave New World" by Aldous Huxley - Cable pull through jeff nippard - Guldmann gh3 ceiling hoist system - The arp entry deletion failed the requested operation requires elevation - Chris rose logan city council - Bound green group practice - General aseptic fields are managed critically - Ar 25 50 letter example - Realidades 1 capitulo 3a prueba 3a 3 answers - Compare and contrast biosphere and ecosystem - IOM Nursing Reports - 9781337614436 - Philips arenavision 2000w price - Electrical body treatments description - Aps work level standards - Death by powerpoint ted talk - Understanding healthcare management jones and bartlett publishers - Technology Acceptance Model in educational settings - 22.9 cm shoe size - Case Study - Mr. C. - Bargaining mix in negotiation - Noel carroll the philosophy of horror pdf - SOCW 6103 Week 4 - Assignment: Process of Change to Motivate Clients to Seek Treatment - Selective attention definition ap psychology - Appendix of a report - Custom molds inc case study answers - Microsoft dynamics gp econnect programmer's guide - Tense present by david foster wallace - Kelly's personal construct theory emphasizes the notion that - Research article - Assignment: Advocating for the Nursing Role in Program Design and Implementation - Our fear of immigrants questions and answers - Radio show proposal sample - Achaemenid art - Week 8 Proposal Development Assignment - ^786^ Love Marriage sPECIALIST +91-8529590991 Molvi ji - Toyota prius product life cycle analysis - Iu east campus map - The elements of moral philosophy 9th edition rachels pdf - Rmit security access card - 65 livesay road moggill - Question - Coke's european scare case study - Dr kate stern melbourne ivf - 69 metella road toongabbie - Hbr working capital simulation for sunflower nutraceuticals - Popsicle stick truss bridge - Relational set operator - The flying machine theme - Unit 4 DB Leading Change Management - Deliverable 2 - Tutoring on the Normal Distribution - Research paper 8 - Mark twain the lowest animal questions - Critical thinking - Service corporation international case study - Capsim business simulation presentation - Cis 9 - Questions for the documentary film inside job - Ford ranger fbt exempt - Quality at the ritz carlton hotel company case study - Hunger games hunting scene - How to measure the speed of light using a microwave - What is ds domination - Chapter 18 study guide consumer credit - Discussion proof in turnitin - The uses of poverty the poor pay all - Why did macbeth hire murderers to kill banquo - Discussion 2 - Fish roe is permitted to have amaranth added to it - Sensation and perception assignment - Ap human geography syllabus - Discussion - How to make cyclohexane with model kit - Accounting 351 - How to write a restaurant description - List of old testament characters - Word memo - Feather case management and consulting - Managerial accounting edition by balakrishnan sivaramakrishnan and sprinkle - How to write a siop lesson plan - PAD 540 Week 3 - Abb sace tmax settings - Everyday use analysis essay - Google earth anchorage alaska - 2.05 bill of rights email - Reply 1 INF - Properties of quadrilaterals answer key - Journeyman electrician study guide pdf