Discuss about the network architecture and security

Assignment Help Computer Network Security
Reference no: EM131422297 , Length: 18

One of the responsibilities of a Security Administrator is to create and document policies that protect the organization and guide users to making smart decisions. In this assignment you will build a handbook that can be used for such a purpose. The NIST's Special Publications Website, a government operated Website, provides several documents for you to review in order to see examples that may be helpful to start this assignment


Other helpful Websites for this assignment include:

DISA.mil (http://iase.disa.mil/)

TechRepublic (http://www.techrepublic.com/search?q=Security+Administrator+handbook&e=1)

ACM (http://www.acm.org/search?SearchableText=security+administration)

Publications from the Strayer Learning Resource Center are also available. Additional resources should be used when necessary. Write a twelve to eighteen (12-18) page Security Administrator's handbook including policies tailored to your work environment or for a business environment with which you are familiar.

You may select a fictitious name for your organization for the purpose of this paper. Do not duplicate your company's existing handbook. Create your own unique work based on what you have learned in this course. There will be two (2) major sections of the handbook: Main Body and Policies.

Section 1: Main Body

In four to six (4-6) pages total, develop the basic procedures and guidelines that the organization must address to properly secure its corporate network and information assets in the followings seven (7) items:

Network Architecture and Security Considerations

Wireless Security

Remote Access Security

Laptop and Removable Media Security

Vulnerability and Penetration Testing

Physical Security

Guidelines for Reviewing and Changing Policies

Section 2: Policies

Develop the policies section of the handbook and include two to three (2-3) pages for each policy in which you define the policies used by the organization identifying the unique requirements of your industry. It must include, at a minimum, the following four (4) security policies:

Acceptable Use Policy

Password Policy

Incident Response Policy

User Awareness and Training Policy

To organize your policies and to give your policies structure, follow this sequential format:

Policy Statement




Procedures and Guidelines


Review and Change Management

Use at least four (4) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the title of the company and industry, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required page length.

The specific course learning outcomes associated with this assignment are:

Formulate a security planning model that addresses and solves a security problem at an agency or corporate entity.

Explain the process of developing and implementing an enterprise-wide information security policy.

Summarize the methods and practices related to perimeter security.

Use technology and information resources to research issues in security assessment and solutions.

Write clearly and concisely about topics related to security assessment and solutions using proper writing mechanics and technical style conventions.

Reference no: EM131422297

Mobile technologies and commerce

Your attention in this paper can be focused on any of the following topics covered in our text: · Information Management / IT Architecture. · Database, Data, W

Explain the purpose of the law

Also, don't forget to keep up with references to include on the powerpoint. note: I'm a member in group of the persons .My part is 6 slides.So. the slides must just have inf

Ssl for http traffic

SSL Record protocol of the SSL protocol stack, RADIUS, networks for access control, DNS poisoning, Spear Phishing attacks, centralised or decentralised access control, encry

Necessary and sufficient condition for perfect security

Show that a necessary and sufficient condition for perfect security is H(C|M) = H(C) for every set of probabilities. (Homophonic keys) Prove theorem for homophonic systems.

Explain the importance of standards organizations

A number of organizations exist to define information security standards. Explain the importance of standards organizations with regard to both information systems and infor

Post your thoughts on perception vs reality of cyber threat

Read the article "Cyber Security Risk: Perception vs. Reality in Corporate America". After reading the article, please post your thoughts on the perception vs. reality of a

Describe the key issues or challenges from this case study

Describe the key issues/challenges/crisjs from this case study. Based on the information provided in the case study, describe and document the recommended security strategy t

Security domains of a typical it infrastructure

Analyze the seven security domains of a typical IT infrastructure and determine which two of the seven you would implement first for a nationwide bank. Explain your rational


Write a Review

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd