CMIT 320 6382 Network Security

You have been hired as part of the network security team at UMGC.  After completing orientation and training, your manager calls you into a meeting to discuss your first project.

The university has completed the implementation of the leased building in Adelphi, Maryland.  The university realizes it needs to secure the faculty, students, and visitors network and data.  With your background and skills, the university is looking to you for guidance.  In addition to helping the university secure its network, you are required to obtain your CompTIA Security+ certification within 60-days of being hired.

Don't use plagiarized sources. Get Your Custom Essay on
CMIT 320 6382 Network Security
Just from $13/Page
Order Essay

As you will recall, the university leased building in Adelphi, Maryland was designed and implemented via the following layout:

You’ve been asked to perform network security analysis and planning, secure the boundary devices, hosts, and software; and secure the data at rest and in transit.  Your deliverable should explain the requirement, propose a solution, and justify the solution.  You should make use of the TestOut LabSim material to create the task, and study for CompTIA Security+ certification.  You should also make use of other sources as required.  It is important that your deliverable explain the technical issues in layman’s terms.  Before you begin, make sure to review the Network Security Proposal (Parts 1-3).

In this learning demonstration, you will use TestOut Security Pro to help you understand how to identify and assess network infrastructure and pass the CompTIA Security+ certification. In order to identify your strengths and weaknesses, you will first complete the practice exam that will prepare you for the certification. The learning materials within TestOut LabSim will help you understand the types of vulnerabilities within a network and how to address them. As you step through each set of activities, you will submit a Vulnerability Assessment and Recommendation Document in three parts. Use the results of the certification practice exam you took at the beginning of the class to help guide you on which areas within LabSim you should pay closer attention. You must complete all online labs in TestOut LabSim; these are the activities with the computer mouse icon. Some of the other areas in TestOut LabSim are optional. You can complete any or all of those if you feel you need to learn more about the topics.

There are nine steps in this project that lead you through each deliverable. Begin with Step 1, obtaining access to TestOut Security Pro and enrolling in LabSim, and then continue with Step 2, taking the practice exam.

Network Security Proposal Template

Network Security Proposal

Prepared for:

University of Maryland Global Campus

Prepared by:

Student Name

I. Analysis and Planning

A. Vulnerability Assessment

Requirements

A few businesses incline toward competitors with specific learning of data safety that can be acquired via some certified preparing program. Some positions need work encounter or propelled degrees, for example, a Master of Business Administration in Information Systems. Network security experts by and large have an assortment of capabilities – imagination, inventiveness, initiative and collaboration, among them. Distinctive ace accreditations are available to data security inspectors, including Certified Information Systems Security Professional and Certified Information Security Manager, as are seller attestations offered by relationship, for example, Microsoft and Cisco. Development from data security overseer to data security supervisor or data security authority might be conceivable with experience just as cutting edge illuminating limits.

Proposed Solution

As the network analyst in the University I have made the following recommendations:

· Perform security hazard evaluation.

· Teach the client about strategy of data security.

· Use Operating Systems having good capabilities of fight against malware.

· Use dedicated firewalls, especially for the tablets being used by remote clients

· Develop the response plan which is PC incident.

When the “TestOut Security Pro” is utilized it helps to identify the network infrastructure “TestOut’s Security Pro” confirmation is another affirmation not only measures what you already know. The “TestOut Security Pro” Certification also measures the capacity to supervise security dangers and strengthen security for PC frameworks. The accompanying information areas are tended to:

· Host Defenses

· Application Defenses

· Access Control and Identity Management

· Audits and Assessments

· Policies, Procedures, and Awareness

· Physical Security

· Perimeter Defenses

· Network Defenses

· Data Defenses

Information systems security directors must consolidate solid specialized aptitudes in PC security with incredible interpersonal, authority and authoritative capacities. They are in charge of employing, rousing, preparing and, if fundamental, terminating digital security staff. They survey and execute security strategies, satisfy all legitimate and contractual security orders, and counteract and recognize security ruptures. (cybersec.org, cybersec.org)

Justification

As universities keep on confronting developing dangers to data security, they are experiencing security reviews. Above reviews include outside and inside evaluations of universities’ procedures and processing framework to gauge consistence with selected security recommendations and best practices of industry. The following testing comprises of a security check and appraisal of all outer (open confronting) web addresses. We’ll perform a sweep on the web address pieces of the customer and perform a test that acknowledge known security threats that are powerless to external threats. We’ll test your efforts to establish safety in access endeavours on system and information.

B. Security Policy

Requirements

In the requirements section, students will make explicit UMGC’s requirements for a security policy. Given this section requires information related to security policies, students should review TestOut LabSim section 3 (Policies, Procedures, and Awareness), and use additional resources as necessary.

Proposed Solution

In the proposed solution section, students will
provide details of the proposed solution
, based on the technical requirements and assumptions. Student should be specific and use additional resources as necessary. Given this section requires us to understand security policies, students should review TestOut LabSim section 3 (Policies, Procedures, and Awareness), and use additional resources as necessary.

Justification

This section should be used to justify your proposed solution based on the requirement(s). That is, you are explaining why you proposed the solution in the aforementioned paragraph, based on the requirement you made explicit in aforementioned paragraph. Each section should allow the reader to proceed from requirement, to solution, to justification. Given this section requires us to understand security policies, students should review TestOut LabSim section 3 (Policies, Procedures, and Awareness), and use additional resources as necessary.

C. Risk Management

Requirements

In the requirements section, students will make explicit UMGC’s requirements for a security policy. Given this section requires information related to risk management, students should review TestOut LabSim section 3 (Policies, Procedures, and Awareness), and use additional resources as necessary.

Proposed Solutions

In the proposed solution section, students will
provide details of the proposed solution
, based on the technical requirements and assumptions. Student should be specific and use additional resources as necessary. Given this section requires us to understand risk management, students should review TestOut LabSim section 3 (Policies, Procedures, and Awareness), and use additional resources as necessary.

Justification

This section should be used to justify your proposed solution based on the requirement(s). That is, you are explaining why you proposed the solution in the aforementioned paragraph, based on the requirement you made explicit in aforementioned paragraph. Each section should allow the reader to proceed from requirement, to solution, to justification. Given this section requires us to understand risk management, students should review TestOut LabSim section 3 (Policies, Procedures, and Awareness), and use additional resources as necessary.

D. Business Continuity Plan

Requirements

In the requirements section, students will make explicit UMGC’s requirements for a business continuity plan. Given this section requires information related to a business continuity plan, students should review TestOut LabSim section 3 (Policies, Procedures, and Awareness), and use additional resources as necessary.

Proposed Solutions

In the proposed solution section, students will
provide details of the proposed solution
, based on the technical requirements and assumptions. Student should be specific and use additional resources as necessary. Given this section requires us to understand business continuity plan, students should review TestOut LabSim section 3 (Policies, Procedures, and Awareness), and use additional resources as necessary.

Justification

This section should be used to justify your proposed solution based on the requirement(s). That is, you are explaining why you proposed the solution in the aforementioned paragraph, based on the requirement you made explicit in aforementioned paragraph. Each section should allow the reader to proceed from requirement, to solution, to justification. Given this section requires us to understand business continuity planning, students should review TestOut LabSim section 3 (Policies, Procedures, and Awareness), and use additional resources as necessary.

E. Access Controls

Requirements

In the requirements section, students will make explicit UMGC’s requirements for a access controls. Given this section requires information related to access controls, students should review TestOut LabSim section 2 (Security Basics), and use additional resources as necessary.

Proposed Solutions

In the proposed solution section, students will
provide details of the proposed solution
, based on the technical requirements and assumptions. Student should be specific and use additional resources as necessary. Given this section requires us to understand access controls, students should review TestOut LabSim section 2 (Security Basics), and use additional resources as necessary.

Justification

This section should be used to justify your proposed solution based on the requirement(s). That is, you are explaining why you proposed the solution in the aforementioned paragraph, based on the requirement you made explicit in aforementioned paragraph. Each section should allow the reader to proceed from requirement, to solution, to justification. Given this section requires us to understand access controls, students should review TestOut LabSim section 2 (Security Basics), and use additional resources as necessary.

II. Securing Boundary Devices, Hosts, and Software

A. Physical Security

Requirements

In the requirements section, students will make explicit UMGC’s requirements for remote access and authentication. Given this section requires information related to physical security, students should review TestOut LabSim section 4 (Physical), and use additional resources as necessary.

Proposed Solution

In the proposed solution section, students will
provide details of the proposed solution
, based on the technical requirements and assumptions. Student should be specific and use additional resources as necessary. Given this section requires us to understand physical security, students should review TestOut LabSim section 4 (Physical), and use additional resources as necessary.

Justification

This section should be used to justify your proposed solution based on the requirement(s). That is, you are explaining why you proposed the solution in the aforementioned paragraph, based on the requirement you made explicit in aforementioned paragraph. Each section should allow the reader to proceed from requirement, to solution, to justification. Given this section requires us to understand physical security, students should review TestOut LabSim section 4 (Physical), and use additional resources as necessary.

B. Mobile Device Security

Requirements

In the requirements section, students will make explicit UMGC’s requirements for remote access and authentication. Given this section requires information related to mobile device security, students should review TestOut LabSim section 3 (Policies, Procedures, and Awareness) and section 7 (Host), and use additional resources as necessary.

Proposed Solutions

In the proposed solution section, students will
provide details of the proposed solution
, based on the technical requirements and assumptions. Student should be specific and use additional resources as necessary. Given this section requires us to understand mobile device security, students should review TestOut LabSim section 3 (Policies, Procedures, and Awareness) and section 7 (Host), and use additional resources as necessary.

Justification

This section should be used to justify your proposed solution based on the requirement(s). That is, you are explaining why you proposed the solution in the aforementioned paragraph, based on the requirement you made explicit in aforementioned paragraph. Each section should allow the reader to proceed from requirement, to solution, to justification. Given this section requires us to understand mobile device security, students should review TestOut LabSim section 3 (Policies, Procedures, and Awareness) and section 7 (Host), and use additional resources as necessary.

C. Perimeter Defenses

Requirements

In the requirements section, students will make explicit UMGC’s requirements for remote access and authentication. Given this section requires information related to perimeter defenses, students should review TestOut LabSim section 5 (Perimeter), and use additional resources as necessary.

Proposed Solutions

In the proposed solution section, students will
provide details of the proposed solution
, based on the technical requirements and assumptions. Student should be specific and use additional resources as necessary. Given this section requires us to understand perimeter defenses, students should review TestOut LabSim section 5 (Perimeter), and use additional resources as necessary.

Justification

This section should be used to justify your proposed solution based on the requirement(s). That is, you are explaining why you proposed the solution in the aforementioned paragraph, based on the requirement you made explicit in aforementioned paragraph. Each section should allow the reader to proceed from requirement, to solution, to justification. Given this section requires us to understand perimeter defenses, students should review TestOut LabSim section 5 (Perimeter), and use additional resources as necessary.

D. Network Defense Devices

Requirements

In the requirements section, students will make explicit UMGC’s requirements for remote access and authentication. Given this section requires information related to network defenses, students should review TestOut LabSim section 6 (Network), and use additional resources as necessary.

Proposed Solutions

In the proposed solution section, students will
provide details of the proposed solution
, based on the technical requirements and assumptions. Student should be specific and use additional resources as necessary. Given this section requires us to understand network defenses, students should review TestOut LabSim section 6 (Network), and use additional resources as necessary.

Justification

This section should be used to justify your proposed solution based on the requirement(s). That is, you are explaining why you proposed the solution in the aforementioned paragraph, based on the requirement you made explicit in aforementioned paragraph. Each section should allow the reader to proceed from requirement, to solution, to justification. Given this section requires us to understand network defenses, students should review TestOut LabSim section 6 (Network), and use additional resources as necessary.

E. Host Defenses

Requirements

In the requirements section, students will make explicit UMGC’s requirements for remote access and authentication. Given this section requires information related to host defenses, students should review TestOut LabSim section 7 (Host), and use additional resources as necessary.

Proposed Solutions

In the proposed solution section, students will
provide details of the proposed solution
, based on the technical requirements and assumptions. Student should be specific and use additional resources as necessary. Given this section requires us to understand host defenses, students should review TestOut LabSim section 7 (Host), and use additional resources as necessary.

Justification

This section should be used to justify your proposed solution based on the requirement(s). That is, you are explaining why you proposed the solution in the aforementioned paragraph, based on the requirement you made explicit in aforementioned paragraph. Each section should allow the reader to proceed from requirement, to solution, to justification. Given this section requires us to understand network defenses, students should review TestOut LabSim section 7 (Host), and use additional resources as necessary.

III. Securing Data at Rest and in Transit

A. Public Key Infrastructure

Requirements

In the requirements section, students will make explicit UMGC’s requirements for remote access and authentication. Given this section requires information related to public key infrastructure, students should review TestOut LabSim section 2 (Security Basics) and section 9 (Data), and use additional resources as necessary.

Proposed Solutions

In the proposed solution section, students will
provide details of the proposed solution
, based on the technical requirements and assumptions. Student should be specific and use additional resources as necessary. Given this section requires us to understand public key infrastructure, students should review TestOut LabSim section 2 (Security Basics) and section 9 (Data), and use additional resources as necessary.

Justification

This section should be used to justify your proposed solution based on the requirement(s). That is, you are explaining why you proposed the solution in the aforementioned paragraph, based on the requirement you made explicit in aforementioned paragraph. Each section should allow the reader to proceed from requirement, to solution, to justification. Given this section requires us to understand public key infrastructure, students should review TestOut LabSim section 2 (Security Basics) and section 9 (Data), and use additional resources as necessary.

B. Secure Protocol Implementation

Requirements

In the requirements section, students will make explicit UMGC’s requirements for remote access and authentication. Given this section requires information related to secure protocol implementation, students should review TestOut LabSim section 9 (Data), and use additional resources as necessary.

Proposed Solutions

In the proposed solution section, students will
provide details of the proposed solution
, based on the technical requirements and assumptions. Student should be specific and use additional resources as necessary. Given this section requires us to understand secure protocol implementation, students should review TestOut LabSim section 9 (Data), and use additional resources as necessary.

Justification

This section should be used to justify your proposed solution based on the requirement(s). That is, you are explaining why you proposed the solution in the aforementioned paragraph, based on the requirement you made explicit in aforementioned paragraph. Each section should allow the reader to proceed from requirement, to solution, to justification. Given this section requires us to understand secure protocol implementation, students should review TestOut LabSim section 9 (Data), and use additional resources as necessary.

C. File Encryption

Requirements

In the requirements section, students will make explicit UMGC’s requirements for remote access and authentication. Given this section requires information related to file encryption, students should review TestOut LabSim section 9 (Data), and use additional resources as necessary.

Proposed Solutions

In the proposed solution section, students will
provide details of the proposed solution
, based on the technical requirements and assumptions. Student should be specific and use additional resources as necessary. Given this section requires us to understand file encryption, students should review TestOut LabSim section 9 (Data), and use additional resources as necessary.

Justification

This section should be used to justify your proposed solution based on the requirement(s). That is, you are explaining why you proposed the solution in the aforementioned paragraph, based on the requirement you made explicit in aforementioned paragraph. Each section should allow the reader to proceed from requirement, to solution, to justification. Given this section requires us to understand file encryption, students should review TestOut LabSim section 9 (Data), and use additional resources as necessary.

D. Hashing

Requirements

In the requirements section, students will make explicit UMGC’s requirements for remote access and authentication. Given this section requires information related to hashing, students should review TestOut LabSim section 9 (Data), and use additional resources as necessary.

Proposed Solutions

In the proposed solution section, students will
provide details of the proposed solution
, based on the technical requirements and assumptions. Student should be specific and use additional resources as necessary. Given this section requires us to understand hashing, students should review TestOut LabSim section 9 (Data), and use additional resources as necessary.

Justification

This section should be used to justify your proposed solution based on the requirement(s). That is, you are explaining why you proposed the solution in the aforementioned paragraph, based on the requirement you made explicit in aforementioned paragraph. Each section should allow the reader to proceed from requirement, to solution, to justification. Given this section requires us to understand hashing, students should review TestOut LabSim section 9 (Data), and use additional resources as necessary.

E. Backup and Restore

Requirements

In the requirements section, students will make explicit UMGC’s requirements for remote access and authentication. Given this section requires information related to backup and restoration, students should review TestOut LabSim section 9 (Data), and use additional resources as necessary.

Proposed Solutions

In the proposed solution section, students will
provide details of the proposed solution
, based on the technical requirements and assumptions. Student should be specific and use additional resources as necessary. Given this section requires us to understand backup and restoration, students should review TestOut LabSim section 9 (Data), and use additional resources as necessary.

Justification

This section should be used to justify your proposed solution based on the requirement(s). That is, you are explaining why you proposed the solution in the aforementioned paragraph, based on the requirement you made explicit in aforementioned paragraph. Each section should allow the reader to proceed from requirement, to solution, to justification. Given this section requires us to understand backup and restoration, students should review TestOut LabSim section 9 (Data), and use additional resources as necessary.

What Will You Get?

We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.

Premium Quality

Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.

Experienced Writers

Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.

On-Time Delivery

Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.

24/7 Customer Support

Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.

Complete Confidentiality

Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.

Authentic Sources

We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.

Moneyback Guarantee

Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.

Order Tracking

You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.

image

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

image

Trusted Partner of 9650+ Students for Writing

From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.

Preferred Writer

Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.

Grammar Check Report

Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.

One Page Summary

You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.

Plagiarism Report

You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.

Free Features $66FREE

  • Most Qualified Writer $10FREE
  • Plagiarism Scan Report $10FREE
  • Unlimited Revisions $08FREE
  • Paper Formatting $05FREE
  • Cover Page $05FREE
  • Referencing & Bibliography $10FREE
  • Dedicated User Area $08FREE
  • 24/7 Order Tracking $05FREE
  • Periodic Email Alerts $05FREE
image

Our Services

Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.

  • On-time Delivery
  • 24/7 Order Tracking
  • Access to Authentic Sources
Academic Writing

We create perfect papers according to the guidelines.

Professional Editing

We seamlessly edit out errors from your papers.

Thorough Proofreading

We thoroughly read your final draft to identify errors.

image

Delegate Your Challenging Writing Tasks to Experienced Professionals

Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!

Check Out Our Sample Work

Dedication. Quality. Commitment. Punctuality

Categories
All samples
Essay (any type)
Essay (any type)
The Value of a Nursing Degree
Undergrad. (yrs 3-4)
Nursing
2
View this sample

It May Not Be Much, but It’s Honest Work!

Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.

0+

Happy Clients

0+

Words Written This Week

0+

Ongoing Orders

0%

Customer Satisfaction Rate
image

Process as Fine as Brewed Coffee

We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.

See How We Helped 9000+ Students Achieve Success

image

We Analyze Your Problem and Offer Customized Writing

We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.

  • Clear elicitation of your requirements.
  • Customized writing as per your needs.

We Mirror Your Guidelines to Deliver Quality Services

We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.

  • Proactive analysis of your writing.
  • Active communication to understand requirements.
image
image

We Handle Your Writing Tasks to Ensure Excellent Grades

We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.

  • Thorough research and analysis for every order.
  • Deliverance of reliable writing service to improve your grades.
Place an Order Start Chat Now
image

Order your essay today and save 30% with the discount code Happy