WEEK 8 ASSIGNMENT – IMPLEMENTING NETWORK AND PERSONNEL SECURITY MEASURES

 

WEEK 8 ASSIGNMENT – IMPLEMENTING NETWORK AND PERSONNEL SECURITY MEASURES

Week 8 Assignment – Implementing Network and Personnel Security Measures

Overview

The security consulting firm that you work for has been awarded a contract to implement a new IT Security Infrastructure to secure the Information Technology data assets of a local government agency. This agency has many remote workers that are in the field and need to connect back to the agency’s system servers.The remote workers use a wireless network infrastructure to connect their electronic pads to servers located within the local government’s facility. The remote workers have needed to access property records, citing zoning violations electronically, and validate building permits.The public demand to expand IT services has grown faster than its ability to provide an adequately secured infrastructure. In fact, this government entity was previously featured on the news for having minimal security controls and methods for accessing property tax information of citizens. The inadequate security allowed many construction trade businesses to illegally access property records and zoning violations.Your role in this project is to enhance and optimize the security mechanisms for accessing these systems.

Instructions

Write a 4–5 page paper in which you:

  • Create an information flow diagram (using Visio or Dia):
    • Illustrates how remote users will securely connect to the government agency’s network.
    • Illustrates the patch of network devices that data packets must travel to get from server to remote user’s device and back to the server. Note: The graphically depicted solution is not included in the required page length.
  • Provide an equipment list of network security devices that would be needed to ensure the integrity and sensitivity of private information. In this list:
    • Propose at least two vendor brands per each device and the associate costs required to procure these items.
    • Identify the functionality each device serves and the expected benefits the government agency should experience upon the successful installation of this equipment.
  • Develop a maintenance plan that should be recommended to the government agency to ensure having the latest security measures available within the network in which you:
    • Describe the risks associated with not fulfilling the activities outlined within your maintenance plan.
    • Indicate specific activities, personnel and resources required, and frequency of execution.
  • Recommend at least four physical security measures that could be developed to ensure the electronic perimeter of electronic assets.
  • Recommend at least two physical security vendors that could achieve the four security measures you identified. Justify your recommendations with your response.
  • Evaluate and consider activities that the Human Resources Department could perform in order to complement and instill security from within the organization. Provide a rationale with your response.
  • Use three sources to support your writing. Choose sources that are credible, relevant, and appropriate. Cite each source listed on your source page at least one time within your assignment. For help with research, writing, and citation, access the library or review library guides.

This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.The specific course learning outcome associated with this assignment is:

  • Develop a plan for implementing network and personnel security measures.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Explain why it is important for public health professionals to

Explain why it is important for public health professionals to be aware of their personal leadership style, traits, and practices. Discuss the benefits of applying servant leadership as a public health professional. Explain how the tenants of servant leadership can be used by a public health leader to empower and

500 words You will be using SPSS software to do

500 words   You will be using SPSS software to do most of your analyses. SPSS is at the mercy of your input. Properly classifying the variables that are part of a study is essential to a correct analysis in SPSS. SPSS classifies variables as nominal, ordinal, or scale and

SU Strategic Planning and Business Plan Discussion Nursing Assignment Help

Ascertain the importance of strategic planning for an organization. Suggest one strategy to structure the strategic planning session for a midsize nonprofit health organization that is competing with several for-profit facilities in the area. Then determine your approach to communicate the mission, vision, and value statements for the strategic planning.

The databases used by the Datacenter Edition servers are experiencing

The databases used by the Datacenter Edition servers are experiencing rapid growth in terms of use and size. Many of the databases are now used across departments. These databases are considered by the Management Council to be one of the company’s best strategic assets. The Management Council wants to consolidate

1. How does Anne Lammott write successfully? How is her

1. How does Anne Lammott write successfully? How is her process different from the average student’s process?  2. What is your specific writing process ? 3. After reading this excerpt, how might you update your writing process? 4. Do you think having a specific writing process actually matters? 5. What

Share your thoughts and opinions on consumer habits in media

  Share your thoughts and opinions on consumer habits in media in this week’s discussion. Think about the brands of products you buy: Are there brand name items you purchase regularly and without reasonable regard to price?  What has influenced you to choose or stick with a brand name item

How does society’s views of race, ethnicity, economic class, religion,

How does society’s views of race, ethnicity, economic class, religion, or sexuality influence individual identity and social stratification? Must be based on a story we have read in class, I′ve chosen ″The Lottery,″ by Shirley Jackson. Must have citations Must not be a summary ″We are to assume the reader

Describe four proven data protection strategies a company can use

 Describe four proven data protection strategies a company can use to protect their data stored in the cloud. Use your textbook and quality external resources for your writing assignment. Remember to cite your sources. APA format is preferred. However, MLA or Chicago (Turabian) would be fine as well. The important

Critically appraise and evaluate whether the duties directors are

  Question: Directors transact the business of the company and are necessary because whilst a company has separate legal personality it is a legal fiction. With reference to statute and case law, critically appraise and evaluate whether the duties directors are subjected to are adequate to prevent directors abusing their

Varieties of American Nationalism

 This week we are looking at the Varieties of American Nationalism and how this chapter created a different American culture (politically, economically, and socially). What I find so interesting is the way that Brinkley has described this as an era of peace and prosperity, without major conflicts in the United

For this assignment, use data from W1 Project.attached Using Microsoft

  For this assignment, use data from W1 Project.attached Using Microsoft Excel and following the instructions given in your lecture, choose and run the appropriate descriptive statistics to describe the characteristics of the sample under study (sex, age, and ethnicity) and Recall1, making sure you include: A graph The appropriate

Understanding the basic tools needed to perform a vulnerability analysis

Understanding the basic tools needed to perform a vulnerability analysis allows a better understanding of the technical capabilities and limitations associated with scanning technologies. Part 1: Complete the following: View the “Vulnerability Scanning Lab” video, located in the Class Resources. Provide screenshots and information related to vulnerabilities against Kioptrix 3,

Chapter 10 Part 2 of 2 Probation is a sentence

Chapter 10 Part 2 of 2 Probation is a sentence of imprisonment that is suspended & served while under supervision of the community.  Parole is the supervised early released of inmates from correctional facility (Schmalleger, 2018).  Currently there has been a renewed interest in releasing prisoners of prison and placing

Instructions All of the six organizations (Google, Walt Disney Company,

  Instructions All of the six organizations (Google, Walt Disney Company, Amazon, P&G, 3M, or Ford Motor Company) you chose from have invested in different methods of analysis to gain and retain industry standing. The threats and opportunities that exist for an organization are identified through studying and appraising the

Please respond to the following: Explain the difference between financial

Please respond to the following: Explain the difference between financial statements and pro forma financial statements. Describe how these statements are developed and used in financial management and planning. note from professor: According to Advani (2012) financial statements consist of the normal balance sheet, income statement and cash flow statement.

Ford Pinto

 The nature of ethical decision making requires that we understand mistakes made by individuals and organizations in the past and evaluate the ways in which personal values interact with organizational culture to increase the likelihood of unethical decisions. This activity allows you to build your evaluation skills by identifying issues

Literature Search Strategy After you have introduced the topic or

   Literature Search Strategy After you have introduced the topic or issue, the next section incorporates a search on relevant literature in the field. With a literature search strategy, discuss exactly how you conducted your search of the literature. That is, very specifically, describe your search strategy. What keywords did