Provide an overview of new web-based organization plans

Assignment Help Computer Network Security
Reference no: EM131299380

Security Requirements

New Content for Section 1: Project Outline

For this assignment, be sure to include the following:

• Provide a brief description of the organization that will be used as the basis for the projects in the course.
• Include the company size, location, and other pertinent information.
• The organization should be large enough to require a Web-based or Internet network with security as an important factor in the infrastructure design.

New Content for Section 1: Security Requirements

For this part of the Key Assignment, include the following:

• Provide an overview of the new Web-based or Internet network the organization plans to implement.

• Prepare an overview of the security requirements for the network, including a discussion of the services that the overall network will support and areas for consideration to secure them.

Network Security Architecture Design Document

This course is comprised of a series of Individual Project assignments that will contribute to a Key Assignment submission at the end of the course. Each week, you will complete a part of a Network Security Architecture Design document. You will select a newer organization and apply your research to the development of a Network Security Architecture Design that would be appropriate for the organization to implement a new Web-based or Internet network with an overall security architecture included in its design.

You will be given a Key Assignment to develop a Network Security Architecture Design document for an organization of your choosing. The goal of this project is to develop the security architecture design for a new Web-based or Internet network.

Organization Selection

The first step will be to select an organization as the target for your Network Security Architecture Design document. This organization will be used as the basis for each of the assignments throughout the course, and should conform to the following guidelines:

• Nontrivial: The organization should be large enough, and require a sufficiently sized network to allow reasonable exercise of the network security architecture research and design process. The organization can be fictional if necessary, and appropriate assumptions may be made.

• Domain Knowledge: You should be familiar enough with the organization to allow focus on the project tasks without significant time required for domain education.

• Accessibility: You should have good access to the people and other information related to the project, because this will be an important part of the process.

Select an organization that meets these requirements, and submit your proposal to your instructor before proceeding further with the assignments in the course. Approval should be sought within the first several days of the course. Your instructor will tell you how to submit this proposal and the notification that will be given for project approval.

Key Assignment

For the assignments in this course, you will be developing a Network Security Architecture Design document that defines the security design for the organization's Web-based or Internet network. Your first task in this process will be to select an organization to use as the basis of your research and analysis for each of the assignments in the course. You will also create the shell document for the final project deliverable that you will be working on during each unit. As you proceed through each project phase, you will add content to each section of the final document to gradually complete the final project delivery. Appropriate research should be conducted to support the development of your document, and assumptions may be made when necessary.

The project deliverables are as follows:

• Submit your project proposal to your instructor for approval
• Network Security Infrastructure Design Document
• Use Word
• Title Page

o Course number and name
o Project name
o Your name
o Date

• Table of Contents (TOC)

o Use an autogenerated TOC.
o Place it on a separate page.
o It should be a maximum of 3 levels deep.
o Be sure to update the fields of the TOC so it is up-to-date before submitting your project.

• Section Headings (create each heading on a new page with "TBD" as content, except for sections listed under New Content below)

o Section 1: Project Outline
o Section 1: Security Requirements
o Section 2: Perimeter Security
o Section 3: Client and Server Security
o Section 4: Wireless and Remote Access Security
o Section 5: Security Configuration Management

New Content for Section 1: Project Outline

For this assignment, be sure to include the following:

• Provide a brief description of the organization that will be used as the basis for the projects in the course.
• Include the company size, location, and other pertinent information.
• The organization should be large enough to require a Web-based or Internet network with security as an important factor in the infrastructure design.

New Content for Section 1: Security Requirements

For this part of the Key Assignment, include the following:

• Provide an overview of the new Web-based or Internet network the organization plans to implement.
• Prepare an overview of the security requirements for the network, including a discussion of the services that the overall network will support and areas for consideration to secure them.

Reference no: EM131299380

Questions Cloud

Firm profit-maximizing level of output : The firm estimates the probability of the new regulation being enforced is 0.5. Find the firm's profit-maximizing level of output. Round your answer to one decimal.
Does this study really provide anonymity or just confidental : They can learn the results of the test by telephone, still without giving their name. Does this practice offer anonymity or confidentiality?
Develop a class named kitchentimer : You will develop a class named "KitchenTimer". This is the first class you will be developing from scratch. The class will have two fields, one to track the minutes remaining and another to track the seconds remaining.
Define a buffer and explain how a buffer works : On the basis of your research, respond to the following: Define a buffer and explain how a buffer works. Analyze and explain the buffer system in buffered aspirin (carboxylic acid)
Provide an overview of new web-based organization plans : Provide an overview of the new Web-based or Internet network the organization plans to implement. Prepare an overview of the security requirements for the network.
Would revealing the sponsor to respondents bias the poll : The standards accepted by polling organizations also require giving respondents the name and address of the organization that carries out the poll. Why do you think this is required?
Describe understanding of us public health system : In an opening paragraph describe your understanding of U.S. public health system using course material - In a second paragraph discuss how two of the module activities address different aspects of the three core functions of public health (assessme..
Elasticity of substitution illustrate : What does elasticity of substitution illustrate? What two factors affect its magnitude?
Price acceptance decisions : How does convenience impact your buying or price acceptance decisions? Please provide a detailed, in your own words explanation.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Hacking occurred and the organization had the right plan

Security Computer forensics and hacking go hand in hand. Discuss in (Need 2 Reports with 2 pages each report = 4 Total Pages), two cases where hacking occurred and the organization had the right plan in place to combat the hack. Describe the proce..

  Describe the organizational authentication technology

Identify and describe the organizational authentication technology and network security issues and make a list of access points internal and external (remote).

  Find sequence of courses to satisfy all prerequisites

Bob loves foreign languages and wants to plan his course schedule for the following years. He is interested in the following nine language courses: LA15, LA16, LA22, LA31, LA32, LA126, LA127, LA141.

  Identify the three different kinds of access control

Identify the three different kinds of access control, which one most resembles a Windows OS environment, military. What are the three authentication factors. Provide an example for each one.

  Trusted computer system evaluation criteria

How well did the Common Criteria (CC) address these four problems of TCSEC - relevance and correctness of content, clarity and logical flow, spelling, grammar, and proper citations/bibliography.

  What is cyber security and what are some of its key concept

What is cyber security, and what are some of its key concepts? What are the most significant threats to your data, and what are some of the root causes of those threats

  Company financial embezzlement cases

Article topic ideas: Information breaches (these will be the vast majority), disgruntled employee cases involving data theft or leaking of information and company financial embezzlement cases that are directly related to IT

  Open this using a brute-force attack

What is the worst case number of combinations he must now test to try open this using a brute-force attack?

  Advise on security issues

ITI581 Security Fundamentals - CCA Pty Ltd Case Study - You have been hired as a network security consultant to advise on security issues as a result of the recent re-structuring of the network

  Discuss the risks of having a single root user

Originally Linux/UNIX systems had one all-powerful user called root that managed systems. Discuss the risks of having a single root user and how more limited management abilities can be given to others users on Linux/UNIX systems.

  Why is the authentication header mode ipsec incompatible

Design and explain any issues or problems - Why is the authentication header (AH) mode of IPSec incompatible with network address translation schemes

  Give the security levels top secret-secret and confidential

Give the security levels Top SECRET,SECRET,CONFIDENTIAL, and UNCLASSIFIED (order from highest to lowest), and catergories A, B,C, specify what type of access (read,write, both or neither) is allowed in each of the following situations .

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd