Week 4 assignment – defense in depth

 

Week 4 Assignment – Defense in Depth

Introduction

The process of implementing security frequently opens one’s eyes to other forms of security not previously considered. In this two-part assignment, you should experience just that. This assignment focuses on a model of implementing security in  layers, which, in many cases, requires a network that is designed  accordingly. The specific course learning outcome associated with this assignment is: 

  • Recommend best security practices to achieve business objectives based on risk assumptions.

Instructions

Design a network that incorporates the following: 

  • One corporate site (Chicago).     
    • All servers exist here (web server, file server, print server, mail server, FTP server).
    • Connection to the Internet (50 MBps).
    • 300 employees who only need access to local corporate resources and the Internet.
  • One remote site (8 miles away).     
    • 20 employees who need access to all resources at corporate, plus the Internet.
    • Connection to the Internet (3 MBps).
Part 1

Use Microsoft Visio or an open-source alternative, such as Dia Diagram Editor, to: 

  • Create a network diagram with defense in depth in mind, citing  specific, credible sources that support the design and depicting at  least four-fifths of the following:     
    • All necessary network devices (routers, switches and/or hubs, firewalls, VPNs, proxies, and others).
    • The interconnections between network devices.
    • Connections to end-user (client) devices (desktops, laptops).
    • Connections from the Internet cloud to the network input.
Part 2

Write a 6–10 page paper in which you: 

  • Describe the flow of data through the network, citing specific, credible sources.     
    • Assume data begins at the remote site.
    • Data flow may be monitored by an IDS.
  • Explain all three elements of the CIA triad and how isolating by  network functions helps deliver a layered approach, citing specific,  credible sources that support your assertions and conclusions.
  • Support your main points, assertions, arguments, or conclusions  with at least four specific and credible academic sources synthesized  into a coherent analysis of the evidence.     
    • Cite each source listed on your source page at least one time within your assignment.
Calculate your order
Pages (275 words)
Standard price: $0.00
Client Reviews
4.9
Sitejabber
4.6
Trustpilot
4.8
Our Guarantees
100% Trustworthy
Information about client is confidential and never disclosed to third parties.
Original Writing
We complete all papers from scratch. You can get a plagiarism report.
Timely Delivery
No missed deadlines – 97% of assignments are completed in time.
Money Back
If you're confident that a writer didn't follow your order details, ask for a refund.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00
Power up Your Academic Success with the
Team of Professionals. We’ve Got Your Back.
Power up Your Study Success with Experts We’ve Got Your Back.