Reference no: EM132159646
Throughout this course, you have been developing a framework to bring focus to areas of concern for the enterprise to take action toward implementing best practices for network security.
The weekly Individual Project assignments will culminate in the final Key Assignment.
Each weekly assignment will build upon the work and knowledge of previous weeks.
You will create 1 single document that contains all of the weekly assignments in separate sections, culminating with the final submission.
Additional information and the deliverables for each Individual Project will be provided in the assignment description for this project.
You are responsible for adding each of these ongoing Individual Project assignments into your Key Assignment document.
The Network Architecture Security Plan Proposal will consist of the following deliverables:
Week 1: Section 1: Introduction
Week 1: Section 2: Network Architecture
Week 2: Section 3: Managing and Protecting Data
Week 3: Section 4: Risk Assessment
Week 4: Section 5: Digital Evidence Controls, Computer Forensic Analysis, and Recovering Files
Week 5: Section 6: Recommendations for Best Practices
The following is the outline for the document shell:
Use Word
Title Page
Course number and name
Project name
Student name
Date
Table of Contents (TOC)
Use an autogenerated TOC.
This should be on a separate page.
Be sure to update the fields of the TOC so it is up-to-date before submitting your project.
Section Headings (create each heading on a new page with TBD as content except for sections listed under New Content below)
Introduction
Network Architecture
Managing and Protecting Data
Risk Assessment
Digital Evidence Controls, Computer Forensic Analysis, and Recovering Files
Disaster Recover and Business Continuity Policies
Training Plan
Recommendations for Best Practices
The project deliverables for Week 1 will include the completion of 2 sections.
Part 1: Final Key Assignment
Update your Network Architecture Security Plan Proposal for your Key Assignment. This will be a culmination of all of the documents that you have created in this course.
Include any instructor and peer feedback that you received. Your final proposal should include the following:
Updated table of contents
Company background
Network architecture
Managing and protecting data
Risk assessment
Digital evidence controls
Computer forensic analysis and recovering files
Executive summary
Part 2: Section 6: Recommendations for Best Practices
Complete the following:
Make recommendations for best practices that summarize the course concepts introduced in your Network Architecture Security Plan Proposal.
Explain why the proposal should be accepted as best practices for the organization.
Include all research completed during the build of your Key Assignment, such as corrective actions to mitigate the risks for threats that could affect the confidentiality, integrity, or availability of the system, security policies, and antiforensic techniques.
All references should be cited using APA format.