SEC 402 Implementing Network and Personnel Security Measures

Assignment Help Other Subject
Reference no: EM132976169 , Length: word count:1200 words

SEC 402 Cyber Security Assignment - Implementing Network and Personnel Security Measures, Strayer University, USA

The specific course learning outcome associated with this assignment is: Develop a plan for implementing network and personnel security measures.

Overview - The security consulting firm that you work for has been awarded a contract to implement a new IT Security Infrastructure to secure the Information Technology data assets of a local government agency. This agency has many remote workers that are in the field and need to connect back to the agency's system servers.

The remote workers use a wireless network infrastructure to connect their electronic pads to servers located within the local government's facility. The remote workers have needed to access property records, citing zoning violations electronically, and validate building permits.

The public demand to expand IT services has grown faster than its ability to provide an adequately secured infrastructure. In fact, this government entity was previously featured on the news for having minimal security controls and methods for accessing the property tax information of citizens. The inadequate security allowed many construction trade businesses to illegally access property records and zoning violations.

Your role in this project is to enhance and optimize the security mechanisms for accessing these systems.

Instructions - Write a 4-5 page paper in which you:

Create an information flow diagram (using Visio or Dia):

Illustrates how remote users will securely connect to the government agency's network.

Illustrates the patch of network devices that data packets must travel to get from server to remote user's device and back to the server. Note: The graphically depicted solution is not included in the required page length.

Provide an equipment list of network security devices that would be needed to ensure the integrity and sensitivity of private information. In this list:

Propose at least two vendor brands per each device and the associate costs required to procure these items.

Identify the functionality each device serves and the expected benefits the government agency should experience upon the successful installation of this equipment.

Develop a maintenance plan that should be recommended to the government agency to ensure having the latest security measures available within the network in which you:

Describe the risks associated with not fulfilling the activities outlined within your maintenance plan.

Indicate specific activities, personnel and resources required, and frequency of execution.

Recommend at least four physical security measures that could be developed to ensure the electronic perimeter of electronic assets.

Recommend at least two physical security vendors that could achieve the four security measures you identified. Justify your recommendations with your response.

Evaluate and consider activities that the Human Resources Department could perform in order to complement and instill security from within the organization. Provide a rationale with your response.

Use three sources to support your writing. Choose sources that are credible, relevant, and appropriate. Cite each source listed on your source page at least one time within your assignment. For help with research, writing, and citation, access the library or review library guides.

Note -- Need 1200 words paper + title page + references with in-text citations.

Reference no: EM132976169

Questions Cloud

Problem-solving essay : I have been recommended for a job promotion in another state that offers better benefits. I am almost done with my bachelor's degree but the position requires
Compare the iot with regular internet : Why must a truly smart home have a bot? Compare the IoT with regular Internet. Discuss the potential impact of autonomous vehicles on our lives.
Discuss the potential impact of autonomous vehicles : Discuss the potential impact of autonomous vehicles on our lives. Why is the IoT considered a disruptive technology? Compare the IoT with regular Internet.
Explain why the entity relationship model is useful : Explain why the entity relationship (ER) model is useful. How has it helped to produce a more structured relational database design environment?
SEC 402 Implementing Network and Personnel Security Measures : SEC 402 Cyber Security Assignment - Implementing Network and Personnel Security Measures, Strayer University, USA - Develop a plan for implementing network
Represent database design using erd : Design tables based on domain requirements. Represent database design using ERD. Communicate effectively with the readers of your report.
How does trust grow in organizations : When are employees comfortable with whistleblowing? Should technology have a function in extending the whistleblowing capabilities of employees?
Examine at least two types of biases : Examine at least two types of biases that you likely experienced as you evaluated the premises for and against your position.
What is multithreading : How does the operating system use paging to enhance the use of memory? What is multithreading and why is it advantageous?

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd