C700 Secure Network Design Assignment

Assignment Help Other Subject
Reference no: EM132926941 , Length: word count:2500 words

C700 Secure Network Design Assignment - Western Governors University, USA

INTRODUCTION - Secure network design is a critical component for protecting resources, processes, and business continuity. Effective network design involves evaluating existing network problems and potential threats, considering secure architectures based on industry best practices and secure design principles, and proposing secure network design solutions that address the business needs of the organization.

For this task, you will access the "Performance Assessment Lab Area" within the course to run Zenmap and OpenVAS. Screenshots saved for submission must include your name and student ID. Your final network drawing should be saved in *.vsd format using Microsoft Visio or a similar software tool.

SCENARIO - Company A is a property and casualty insurer underwriting multiple types of insurance. Company A is acquiring Company B, a financial services organization, in order to diversify and increase market share. Company B conducts business in the same geographical area as Company A and delivers business and individual financial planning services. Both companies provide services from their respective offices and at the customer's site. Both companies use broadband connectivity.

You are the IT director for Company A and will be the chief information officer (CIO) for the merged organization. You are tasked with analyzing, designing, and presenting the proposed IT integration project. Company A has clear IT infrastructure documentation, including a logical diagram, an organizational chart, and a recent security risk analysis. Company B does not have any IT infrastructure documentation, and several security and integration issues are evident. Company B outsources any IT-related needs to a consultant. Leadership for the merged organization has allocated a limited budget of $35,000 for this project and will expect justification for recommended expenditures.

Integration project requirements include following secure network design principles, selecting or repurposing secure network components, assuring secure communication channels, addressing relevant regulatory compliance, minimizing potential network problems and security threats, delivering integration cost savings, and aligning IT to meet the business needs of the post-merger organization. This post-merger organization will reflect one corporate office and a branch office.

REQUIREMENTS -

A. Describe the problems Company A has with network security and infrastructure using details from one or more of the "Company A Organizational Chart," "Company A Risk Analysis," and "Company A Visio Diagram" supporting documents.

B. Run Zenmap and OpenVAS on Company B's network using the "Performance Assessment Lab Area" web link. Your submission should include the following documents:

a screenshot of the completed Zenmap scan-should be taken within the lab environment and should include your name

a screenshot of the OpenVAS report result-should be taken within the lab environment and should include your name

the completed Zenmap PDF file

the completed OpenVAS PDF file-should include your name in the summary of the report

Note: This assessment requires you to submit pictures, graphics, and/or diagrams. Each file must be a supporting document no larger than 30 MB in size. Diagrams must be original and may be hand-drawn or drawn using a graphics program. Do not use CAD programs because the file will be too large.

C. Describe the potential impact of two network security or infrastructure problems of Company B using details from the outputs of Zenmap and OpenVas, including rationale for each problem.

1. Explain how correcting each of these problems will improve the functioning of the merged network.

D. Provide a network topology diagram using Microsoft Visio or a similar software tool that represents the proposed merging requirements from the scenario of Company A and Company B, including remediation of all existing infrastructure problems described in part A and part C.

E. Identify which layer of the OSI model and layer of the TCP/IP protocol stack apply to each component in the merged network topology diagram.

F. Justify the retention or deletion of four existing components as suggested in your proposed network topology diagram. Include how each component's retention or deletion and any newly required additions to the network address both security concerns and budgetary restrictions found in the scenario.

G. Explain how two secure network design principles are included in your proposed merged network topology diagram.

H. Describe two secure hardware and/or software components integrated into the proposed network topology and how each component will address the security needs of the merged organization.

I. Explain how the proposed network topology diagram for the merged organization addresses security safeguards based on a regulatory compliance requirement.

J. Explain a security threat and one potential network problem that would become a risk as part of the implementation of the proposed network topology diagram, including why each would become a risk.

1. Explain how the security threat and potential network problem should each be managed or mitigated as part of the implementation of the proposed topology diagram.

K. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.

L. Demonstrate professional communication in the content and presentation of your submission.

Need 2500 words paper + title page + references with in-text citations.

Attachment:- Secure Network Design Assignment Files.rar

Reference no: EM132926941

Questions Cloud

Why should compensation systems be equitable : Why should compensation systems be equitable? How can an organization design an equitable compensation system?
How do ensure health program will be successful : Now that you have assessed the needs of your community and have started to develop a plan, how do you ensure your health program will be successful?
Describe chosen health issue and population : Based on the theory or model you chose (or its specific constructs), describe your initial ideas for at least two strategies to change the behavior.
What theories and models might relate to the population : What theories and models might relate to the population and health issue you have selected? How significant of a problem is the health issue in the population
C700 Secure Network Design Assignment : C700 Secure Network Design Assignment Help and Solution - Western Governors University, USA - Homework Help - Describe potential impact of two network security
Theoretical concepts of microservices architecture : Demonstrate your understanding of the theoretical concepts of microservices architecture in two specific areas
Analyze the effectiveness of society delegation of ethical : Analyze the effectiveness of society's delegation of ethical standards and the supervision of professional conduct to the professions of medicine and nursing
Find and outline the treatment plan for the patient : Describe the most likely specific type of head injury he suffered. An 38 year old was driving his 1970 Chevy Corvette to a Milwaukee Brewers baseball game.
Explain the pathophysiology of extradural hematoma : One, 25 years old, has just been in a motor vehicle accident, Differentiate the pathophysiology of extradural hematoma and subdural hematoma.

Reviews

Write a Review

 

Other Subject Questions & Answers

  How has your experience been integrative towards your goals

How has your experience been integrative towards your academic or professional goals? How have you developed as a learner/thinker as part of your graduate studies at AMU/APUS?

  Discuss the role of government on transport innovations

Throughout the course, the subject of regulation and deregulation (government involvement or intervention) and its impact on intermodal transportation has been.

  What forces of globalization have contributed to dynamic

In this paper, answer the following question: Why have the strategies for peace and prosperity pursued by modern states, especially in Africa, been less successful than previous strategies, and what forces of globalization have contributed to this..

  What time interval is required for a message to travel

What approximate time interval is required for a message to travel from Maine to California by radio waves? (Assume the waves can be detected at this range. The distance from Maine to California is approximately 5 000 km.

  Which of the following is a disadvantage of arbitration

Which of the following is a disadvantage of arbitration? The New York Convention ensures that an arbitration award will be enforced by countries that are parties to the treaty. Which of the following is a defense to lack of enforcement of the arbit..

  About private security duties and responsibilities

Knowing what we know about private security duties and responsibilities.

  Determine three to five driving forces

Determine three to five (3-5) driving forces that fueled international policy decisions involving the international incidents you outlined previously. (Consider treaties, exit strategies, elections, wars, etc.)

  Discuss terrorist attack using chemical or explosive devices

Discuss terrorist attack using chemical, incendiary, or explosive devices is the goal of the Department of Homeland Security and local emergency services.

  What ate structural features and language features

what ate structural features and language features. Good morning. Blackwood Family Medical Centre. Can I help you

  What makes a successful women in tech leader

What makes a successful women in tech leader? Explain how have you demonstrated women in tech attributes. Why is it important to have women in leadership.

  Describe the community nursing practice model

How do you see the benefit of using both the Community Nursing Practice Model and Locsin's Technological Competency as Caring in Nursing in today's nursing.

  How artist role change with different cultural consideration

Who makes art? Do you think artists have innate ability or acquired skill (or both)? How do artist's roles change with different cultural considerations?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd