Categories
Writers Solution

Comprehensive and Secure Networking Solution

Portfolio Project (200 Points)

Module #8: Comprehensive and Secure Networking Solution

Scenario:

Rocky Mountain Corporation (RMC) has relocated to a new building that was previously wired and set up for a local area network (LAN). The company implemented a 50-user client/server-based Wireless network, using WPA in which all printers, folders, and other resources are shared; everyone has access to everything and there is no security outside of the defaults that were in place when the system was set up.

You have been hired to secure the RMC network and ensure that the company has a properly designed network that allows for future growth (500 users in 12 months) and for the highest levels of security to protect against internal and external attacks.

RMC has scheduled a meeting with its key executives and you in order to provide you with any additional information you may need.

Instructions:  

In an eight- to ten-page proposal, address the following three sections and their action items to provide a comprehensive secure environment:

Section 1: Topology (type of network) and network devices

RMC needs to set up a network; it requires clarification regarding the type of network (or topology) in order to properly configure the connections among all PCs within the organization. The company is looking for guidance regarding the type of network devices that will connect devices to the Local Area Network (LAN).

  • The company asks that you explain what internal and external networking components are required (explain each and justify why you chose the network devices you did).
  • Provide a cryptography method that will ensure vital data is encrypted.
  • Provide an explanation of what network protocols will be used on the LAN and why.
  • Ensure that the network has the capacity to:
    • connect all users to company resources (e.g. printers, scanners, and other items).
    • provide file sharing options.
    • manage these resources in a central location.
    • allow for internal users to access the internet; and
    • allow external users vendors to access the LAN remotely.
  • Your proposal should include budgetary cost estimates for the chosen topology.

Section 2: IP Infrastructure

RMC has asked that you provide details regarding an IP structure (which includes static, DHCP—or the possibility of both—and proper IP Class assignment), which is mindful of the company’s expectation of continued growth.

  • Provide a remote access plan to ensure that users who access the network remotely do so in a secure and efficient manner

Section 3: Security

Basic security has been in place and now the company would like you to make this a more secure facility in hopes of protecting against internal and external security threats.

  • Generate a plan to provide secure access control methods for all internal-user access including a viable password policy, which includes complexity, duration, and history requirements.
  • Provide a thorough plan to protect the network from malware and various types of malicious attacks.

Submission:

Your proposal should include all of the bulleted elements in the three sections above, with support, detail, and elaboration for each section explicitly grounded in knowledge from the assigned readings and media along with outside sources.

  • Length: Your paper must be eight to ten pages in length, not including the required cover and references pages.
  • Sources: Include a minimum of six sources. (For each of the three sections, include at least two scholarly references as well as material from the uCertify.) The CSU Global LibraryLinks to an external site. is a great place to find your sources.
    • You cannot use your textbook as your primary source of information. You must draw on other sources such as books, websites, business and trade journals, legal and compliance journals, government agencies, professional associations, and industry standards, for example.
    • Visit the library’s special research guide for this discipline.
    • If you have questions about the format or content of references, discuss it with your instructor.
  • Formatting: Ensure your entire document, including citations of sources, is in conformity with the APA standards in the CSU Global Writing Center APA standards in the CSU Global Writing CenterLinks to an external site.. Visit the to find numerous guides on how to write and research papers including an APA template paper.
  • Paper Sections on Comprehensive and Secure Networking Solution: Your submission should include the following (title each portion accordingly):
    Cover page
    • Abstract: The abstract is an “executive overview” of your paper. It must be a 50- to 100-word summary that would be appropriate to present to a manager. The abstract provides the reader with the essence of your project without reading the paper in its entirety.
    • Table of Contents: This lists the sections of your paper with corresponding page numbers. Include tables and figures (if you have more than two in your paper), and any appendices.
    • Introduction: In this section, state the basis of the Detailed Technical Proposal—Comprehensive and Secure Solution example that you will be presenting. Discuss how this analysis will be based upon the concepts studied in the course.
    • Body of the paper. Include discussion, implications, and conclusion/recommendations. Provide a thorough discussion of your findings and the implications of your study. Use as headings each of the three sections under Instructions.
    • References
  • ………Get more on Comprehensive and Secure Networking Solution
Categories
Writers Solution

having carried out some basic review of available secondary data to secure your interest

Assessment Details and Submission Guidelines
Trimester T2 2021
Unit Code HC3131
Unit Title Business Research Project
Assessment Type 1, Topic Approval, Presentation
Assessment Title Topic Approval
Purpose of the assessment (with ULO Mapping) 1.Clearly identify your chosen topic, having carried out some basic review of available secondary data to secure your interest (at least 3 academic articles, plus a business report, or a relevant current news item). Indicate the Research Problem, as you see it so far, and at least ONE research question at this stage (additional questions may be defined as you progress with this unit). 10%.
Matches outcomes 1,2,3
2.A brief presentation in-class in week 5. 4 PPTS 10% Plus 3 minute voice-over/video
Matches to Unit Learning Outcomes 4 and 5
Weight 20 % of the total assessments
Total Marks 20
Word limit Not more than 1200 words for the Topic Approval and 4 PPTS for presentation
Due Date Friday of Week 4 and Week 5
Submission Guidelines • All work must be submitted on Blackboard by 12 midnight of the due date, along with a completed Assignment Cover Page. [If no cover page your mark will be reduced -20%].
• The assignment must be in MS Word format, 1.5 spacing, 12-pt Arial font and 2 cm margins on all four sides of your page with appropriate section headings, paragraphing, and page numbers. Slides in standard PPT format with video/voice over.
• Reference sources must be correctly cited in the text of the report, and listed appropriately at the end in a reference list, all in Harvard referencing style.

Assignment 1 Specifications
Purpose:
This unit aims to give you an opportunity to combine many facets of your acquired MBA skills into the production of a high-quality research project.
Assignment 1 – the Topic Approval – is to ensure you have given sufficient thought to the topic you are choosing to base your research project on.
Your tutor will LEAD and FACILITATE you through the process, week by week. The learning will be progressive, so for best results you will need to be reading the weekly lectures as well as in contact with your tutor during the interactive tutorials.
Assignment Structure should be as the following:
1. Say why this topic interests you. Submit a draft topic for approval.
2. Discuss your initial search for relevant literature and show that it has provided you with a good contextual understanding
3. Define the Research Problem that you intend to address (as you see it, so far)
4. Propose at least ONE research question that you will be seeking to answer through your research project (additional questions may be defined as you progress with this unit)
5. Develop a detailed table of contents and your initial reference list.

GET SOLUTION FOR THIS ASSIGNMENT, Get Impressive Scores in Your Class

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

GET SOLUTION FOR THIS ASSIGNMENT

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

  • Original and non-plagiarized custom papers- Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
  • Timely Deliveryprimewritersbay.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
  • Customer satisfaction- Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
  • Confidential- It’s secure to place an order at primewritersbay.com We won’t reveal your private information to anyone else.
  • Writing services provided by experts- Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
  • Enjoy Please Note-You have come to the most reliable academic writing site that will sort all assignments that that you could be having. We write essays, research papers, term papers, research proposals. having carried out some basic review of available secondary data to secure your interest

Get Professionally Written Papers From The Writing Experts 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays
Categories
Writers Solution

Correct administrative configuration and secure device access

Task-1: Network Configuration
Marking guide lines:
• Design an efficient IP addressing plan: 4 marks
o Note that you need to spare IP addresses for the management LAN.
o Use this guideline to help you with this task: https://www.cisco.com/c/dam/en/us/solutions/collateral/enterprise/design-zone-smart-business-architecture/sba_ipAddr_dg.pdf
• Correct administrative configuration and secure device access: 4 marks
o Configure device name, access banner, domain-lookup
o Configure and secure all device access passwords
o Disable all unused ports
• Configure all required device interfaces with appropriate IP addresses and meaningful descriptions and assign IP addresses to all PCs in the network: 2 marks
• Configure IP routing and verify the network connectivity and fix any issues: 4 mark
o Configure OSPF routing for the network
o Verify the network connectivity with ping.
• Backup all device configuration to a TFTP server in the head quarter: 1 mark
o Configure a TFTP server in the HQ
o Issues commands to backup all device config to the TFTP server.
Task-2: Network Management
Marking guide lines:
• Design the high-level physical layout for the lab to show the cabling structure and equipment rack and export it to a JPEG or PDF file. (4 marks)
• Modify the current network to add the management network (6 marks)
o Create the management interface for the switches (VLAN99) and assign IP addresses to all routers and management interfaces (2 marks)
o Allocate a dedicate physical management port on each switch an assign the management port to VLAN99 (1 mark).
o Connect the management port to a physical interface of the local router (1 mark).
o Configure the router interface and modify the network routing to allow to connect to the management network (2 marks).
• Configure SNMPv2 on each network devices and deploy a network management station at the head quarter to manage the whole network. (3 marks)
o Create a network management station in the head quarter to manager the network. Assign IP address to the station (1 mark).
o Configure a MIB browser on the management station to access the device management information (2 marks).
• Record YouTube video to demonstrate that you can manage the devices (2 marks)

GET SOLUTION FOR THIS ASSIGNMENT, Get Impressive Scores in Your Class

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

GET SOLUTION FOR THIS ASSIGNMENT

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

  • Original and non-plagiarized custom papers- Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
  • Timely Deliveryprimewritersbay.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
  • Customer satisfaction- Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
  • Confidential- It’s secure to place an order at primewritersbay.com We won’t reveal your private information to anyone else.
  • Writing services provided by experts- Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
  • Enjoy Please Note-You have come to the most reliable academic writing site that will sort all assignments that that you could be having. We write essays, research papers, term papers, research proposals. Correct administrative configuration and secure device access

Get Professionally Written Papers From The Writing Experts 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays
Categories
Writers Solution

Considering the importance of data in organization, it is absolutely essential to secure the data present in the database

Considering the importance of data in organization, it is absolutely essential to secure the data present in the database. What are the strategic and technical security measures for good database security? Be sure to discuss at least one security model to properly develop databases for organizational security. Create a diagram of a security model for your research paper.

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

GET SOLUTION FOR THIS ASSIGNMENT

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

  • Original and non-plagiarized custom papers- Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
  • Timely Deliverycapitalessaywriting.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
  • Customer satisfaction- Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
  • Confidential- It’s secure to place an order at capitalessaywriting.com We won’t reveal your private information to anyone else.
  • Writing services provided by experts- Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
  • Enjoy Please Note-You have come to the most reliable academic writing site that will sort all assignments that that you could be having. We write essays, research papers, term papers, research proposals. Considering the importance of data in organization, it is absolutely essential to secure the data present in the database

Get Professionally Written Papers From The Writing Experts 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays
Categories
Writers Solution

Security mechanisms would you use to secure information on the network

Can-D is a fairly large company headquartered in Orlando, Florida. There are 3,000 employees located at their headquarters. The company produces canned video content for popular entertainment ventures. Recently, they partnered with another local company (Video-Cam Corporation) who will be setting up an office at Can-D headquarters. There are some concerns regarding access to information between the various departments involved. As the network administrator, it is your responsibility to develop and propose a solution to address these security concerns. What specific security mechanisms would you use to secure information on the network, and why?
Prepare a 2-3 page Word document that summarizes your proposal to address security concerns. Explain the technologies appropriate for this situation, describe your reasons for using them, and explain configuration issues.
Be sure to cite all references using APA style.
For more information on APA, please visit the Library and click on Citation Resources link.

SEE SOLUTION BELOW

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

Network security solution

Network security is concerned with the policies and practices that prevent and monitor unauthorized access, misuse, modification and or denial of an information network and network devices. Network security also involves the authorization of access to data and programs in a network through an authentication methodLafuente, (Smith, 2013).

For Can-D and Video-Cam Corporation, it is important to haveat least two network access servers, with one being back up. These will perform authentication, authorization and accounting functions by verifying the logon details of potential users. The servers will also define layers of access for authorized users, determining what each users can do while connected to the network depending on their defined profile and posture (Smith, 2013). Programs that control network threats such as antiviruses, firewalls and spyware and malware detection can also be installed on the servers. That it is a large company means that the installed anti-threat programs should be advanced to be able to deal with the potential of many and sophisticated passive and active malicious attacks (Lafuente, 2015). The programs can be custom-made for the company or bought off the shelf (e.g. Cisco network security programs) and customized.

Access control policies, mechanisms and models are important considerations in implementing the network security system. Access control policies will specify how to manage access and who to grant access to what and when. The policies can be based on resource use, authority, obligation or confidentiality. An Access Control List can be the mechanism used to translate the access request. Security model will present the security properties of the access control system (Smith, 2013).

A Network Access Control (NAC) would need to be implemented for interpretation and checking of pre-admission and post-admission security policies. The policies can be regarding levels of anti-virus protection, system update and configuration. NAC solution will enable network security by describing device access to network nodes. It can be used to fix non-compliant nodes in the system enabling network infrastructure such as routers and switches to seamlessly and securely connect back office servers and end user devices. The NAC should also allow scalability to cater for the deployment scenario of a large, growing company that has fluctuating number of users, BYOD policy and remote access (Morrow, (2012).A NAC with 802.1X wired and wireless can be used for rigid control of the network system for Can-D and Video-Cam.“NIST IR 7874-Guidelines for Access…………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………….. secure information on the network ……………………

NOTE THAT WHAT YOU HAVE JUST READ IS A SAMPLE PAPER ABOUT THE TOPIC. CLICK THE ORDER BUTTON TO ORDER YOUR OWN PAPER

Get Professionally Written Papers From The Writing Experts 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays  

Categories
Writers Solution

Secure information on the network

Can-D is a fairly large company headquartered in Orlando, Florida. There are 3,000 employees located at their headquarters. The company produces canned video content for popular entertainment ventures. Recently, they partnered with another local company (Video-Cam Corporation) who will be setting up an office at Can-D headquarters. There are some concerns regarding access to information between the various departments involved. As the network administrator, it is your responsibility to develop and propose a solution to address these security concerns. What specific security mechanisms would you use to secure information on the network, and why?
Prepare a 2-3 page Word document that summarizes your proposal to address security concerns. Explain the technologies appropriate for this situation, describe your reasons for using them, and explain configuration issues.
Be sure to cite all references using APA style.
For more information on APA, please visit the Library and click on Citation Resources link.

SEE SOLUTION BELOW

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

Get Professionally Written Papers From The Writing Experts 

Network security solution

Network security is concerned with the policies and practices that prevent and monitor unauthorized access, misuse, modification and or denial of an information network and network devices. Network security also involves the authorization of access to data and programs in a network through an authentication methodLafuente, (Smith, 2013).

For Can-D and Video-Cam Corporation, it is important to haveat least two network access servers, with one being back up. These will perform authentication, authorization and accounting functions by verifying the logon details of potential users. The servers will also define layers of access for authorized users, determining what each users can do while connected to the network depending on their defined profile and posture (Smith, 2013). Programs that control network threats such as antiviruses, firewalls and spyware and malware detection can also be installed on the servers. That it is a large company means that the installed anti-threat programs should be advanced to be able to deal with the potential of many and sophisticated passive and active malicious attacks (Lafuente, 2015). The programs can be custom-made for the company or bought off the shelf (e.g. Cisco network security………………………………………………………………………………………………………………………………………………………………………………………………………………………………….

Secure information on the network………………………………………………………………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………………………………………………………………………………………………………………………….

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays  

Categories
Writers Solution

You have been asked by management to secure the laptop computer of an individual who was just dismissed from the company under unfavorable circumstances

You have been asked by management to secure the laptop computer of an individual who was just dismissed from the company under unfavorable circumstances. Describe how you would start this incident off correctly by properly protecting and securing the evidence on the laptop. 

 Should be a minimum of  500 words with 3 references. See APA criteria for citing resources. 

  2-3 APA Citations within paragraphs 

 2-3 APA References at the end