icon

Usetutoringspotscode to get 8% OFF on your first order!

NETWORK DESIGN PROJECT PART 1 INSTRUCTIONS

For this project, you will utilize NIST ICS security framework and high-level network diagram to create a report describing the network design necessary to address common security issues. Inputs: 1. NIST SP 800-82 – security framework and high-level network diagram 2. Other external resources as needed Instructions: 1. Assume that you are designing a network architecture for a complex enterprise with a diverse application, user community, and device mix. 2. Incorporate and modify the NIST SP 800-82 ICS security framework and network diagram as needed to elaborate on a more comprehensive network design. 3. Describe how the overall network architecture addresses the following security threats and vulnerabilities: a. Denial of Service (DOS) and Distributed Denial of Service (DDOS) attacks b. Worms, virus, and Trojan horses c. Man-in-the-middle (MITM) attacks d. Rootkit injections e. Data security/privacy on remote mobile devices 4. Document how each component in the network architecture addresses the security issues from step 2 (and others). 5. Beyond the network design, what additional measures do you recommend to address security concerns? Outputs: Write a 5-page research -based paper in current APA format that focuses on a network solution design using best practices in network security. The paper must include at least 5 references in addition to the course textbook and the Bible. Include ICS security policies and network diagram.

You can leave a response, or trackback from your own site.

Leave a Reply

NETWORK DESIGN PROJECT PART 1 INSTRUCTIONS

NETWORK DESIGN PROJECT PART 1 INSTRUCTIONS
Overview

For this project, you will utilize NIST ICS security framework and high-level network diagram to create a report describing the network design necessary to address common security issues.

Inputs:

1.    NIST SP 800-82 – security framework and high-level network diagram
2.    Other external resources as needed

Instructions:

1.    Assume that you are designing a network architecture for a complex enterprise with a diverse application, user community, and device mix.
2.    Incorporate and modify the NIST SP 800-82 ICS security framework and network diagram as needed to elaborate on a more comprehensive network design.
3.    Describe how the overall network architecture addresses the following security threats and vulnerabilities:
a.    Denial of Service (DOS) and Distributed Denial of Service (DDOS) attacks
b.    Worms, virus, and Trojan horses
c.    Man-in-the-middle (MITM) attacks
d.    Rootkit injections
e.    Data security/privacy on remote mobile devices
4.    Document how each component in the network architecture addresses the security issues from step 2 (and others).
5.    Beyond the network design, what additional measures do you recommend to address security concerns?

Outputs:

Write a 5-page research -based paper in current APA format that focuses on a network solution design using best practices in network security. The paper must include at least 5 references in addition to the course textbook and the Bible. Include ICS security policies and network diagram.

Responses are currently closed, but you can trackback from your own site.

Comments are closed.

NETWORK DESIGN PROJECT PART 1 INSTRUCTIONS

NETWORK DESIGN PROJECT PART 1 INSTRUCTIONS
Overview

For this project, you will utilize NIST ICS security framework and high-level network diagram to create a report describing the network design necessary to address common security issues.

Inputs:

1.    NIST SP 800-82 – security framework and high-level network diagram
2.    Other external resources as needed

Instructions:

1.    Assume that you are designing a network architecture for a complex enterprise with a diverse application, user community, and device mix.
2.    Incorporate and modify the NIST SP 800-82 ICS security framework and network diagram as needed to elaborate on a more comprehensive network design.
3.    Describe how the overall network architecture addresses the following security threats and vulnerabilities:
a.    Denial of Service (DOS) and Distributed Denial of Service (DDOS) attacks
b.    Worms, virus, and Trojan horses
c.    Man-in-the-middle (MITM) attacks
d.    Rootkit injections
e.    Data security/privacy on remote mobile devices
4.    Document how each component in the network architecture addresses the security issues from step 2 (and others).
5.    Beyond the network design, what additional measures do you recommend to address security concerns?

Outputs:

Write a 5-page research -based paper in current APA format that focuses on a network solution design using best practices in network security. The paper must include at least 5 references in addition to the course textbook and the Bible. Include ICS security policies and network diagram.

Responses are currently closed, but you can trackback from your own site.

Comments are closed.

Powered by WordPress | Designed by: Premium WordPress Themes | Thanks to Themes Gallery, Bromoney and Wordpress Themes