Your submission must be your original work. No more than a combined total of 30% of the submission and no more than a 10% match to any one individual source can be directly quoted or closely paraphrased from sources, even if cited correctly. The originality report that is provided when you submit your task can be used as a guide.
You must use the rubric to direct the creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each requirement below may be evaluated by more than one rubric aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course.
Tasks may not be submitted as cloud links, such as links to Google Docs, Google Slides, OneDrive, etc., unless specified in the task requirements. All other submissions must be file types that are uploaded and submitted as attachments (e.g., .docx, .pdf, .ppt).
A. Describe the problems Company A has with network security and infrastructure using details from one or more of the “Company A Organizational Chart,” “Company A Risk Analysis,” and “Company A Visio Diagram” supporting documents.
B. [Intentionally left blank. Not part of the Assessment]
Note: This assessment requires you to submit pictures, graphics, and/or diagrams. Each file must be a supporting document no larger than 30 MB in size. Diagrams must be original and may be hand-drawn or drawn using a graphics program. Do not use CAD programs because the file will be too large. Your final network drawing should be saved in *.vsd format using Microsoft Visio or a similar software tool.
C. Describe the potential impact of two network security or infrastructure problems of Company B using details from the outputs of Zenmap and OpenVas (see supporting documents below), including rationale for each problem.
1. Explain how correcting each of these problems will improve the functioning of the merged network.
D. Provide a network topology diagram using Microsoft Visio or a similar software tool that represents the proposed merging requirements from the scenario of Company A and Company B, including remediation of all existing infrastructure problems described in part A and part C.
Please follow the web link listed below to download a free student version of Visio Professional 2019.
E. Identify which layer of the OSI model and layer of the TCP/IP protocol stack apply to each component in the merged network topology diagram.
F. Justify the retention or deletion of four existing components as suggested in your proposed network topology diagram. Include how each component’s retention or deletion and any newly required additions to the network address both security concerns and budgetary restrictions found in the scenario.
G. Explain how two secure network design principles are included in your proposed merged network topology diagram.
H. Describe two secure hardware and/or software components integrated into the proposed network topology and how each component will address the security needs of the merged organization.
I. Explain how the proposed network topology diagram for the merged organization addresses security safeguards based on a regulatory compliance requirement.
J. Explain a security threat and one potential network problem that would become a risk as part of the implementation of the proposed network topology diagram, including why each would become a risk.
1. Explain how the security threat and potential network problem should each be managed or mitigated as part of the implementation of the proposed topology diagram.
K. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.
L. Demonstrate professional communication in the content and presentation of your submission.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.Read more
Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.Read more
Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.Read more
Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.Read more
By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.Read more