SlideShare a Scribd company logo
1 of 3
Assignment Instructions
Instructions:
Note:
A 15 % or less originality score is required to be uploaded with
the paper prior to any grading.
Scenario
:
You are a Security professional hired by NextGard
Technologies in Phoenix, AZ to provide a Windows security
implementation model for their organization. NextGard
specializes in network consulting services for US companies
and they want to upgrade and secure their current network.
NextGard has 250,000 employees in 5 countries. The Phoenix
office operates as the NextGard Corporate headquarters.
Currently there are five district offices:
• Atlanta, Georgia
• Bangalore, India
• Los Angeles, California
• Montreal, Canada
• New York City, New York
The district offices have satellite employees that have a
combination of desktops, mobile computers and wireless
devices. There is a mix of computers running Windows 2000,
XP, Windows Vista and Windows 7. There is a Windows Active
Directory forest with domains set up for each office and seven
file and print servers which are located in the Phoenix office.
The Phoenix office also contains two proxy servers, configured
as an array, that provide Web cache services and Internet access
control for the organization since the majority of applications
are web-based and hosted from the Phoenix office.
There are also several Microsoft applications that all employees
within a region use that are hosted in the regional offices.
All employees have Internet access so they can browse the web.
Tasks
(Paper Sections):
For the assigned project, you are to submit a proposal for the
management of NextGard.
In the proposal, you must address the following:
Research solutions and detail the appropriate Microsoft
Windows access controls including policies, standards and
procedures that define who users are, what they can do, which
resources they can access, and what operations they can perform
on a system.
Research and detail the cryptography methods to protect
organizational information using techniques that ensure its
integrity, confidentiality, authenticity and non-repudiation, and
the recovery of encrypted information in its original form.
Research and devise a plan to thwart malicious code and
activity by implementing countermeasures and prevention
techniques for dealing with viruses, worms, logic bombs, Trojan
horses and other related forms of intentionally created deviant
code.
Research and formulate a plan to implement monitoring and
analysis by determining system implementation and access as
well as an incident response plan for security breaches or
events.
Research and detail security guidelines for contains the two
proxy servers and Internet access control for the organization
Research and define best practices for the security of
NextGard’s organization.
Conclusion summarizing your findings and recommendations
for the reader.
The Network topology must include all of the sites and
the network infrastructure required to provide the services
described in the Final Project Scenario in the section above
Submission Instructions:
An in-depth submission that is free of spelling and grammar
errors in APA format.
A minimum of 8 pages documenting your research on the
subject and contain a drawing of your design.
Double-spaced format (APA) with a readable style and font and
submitted inside the electronic classroom (unless classroom
access is not possible and other arrangements have been
approved by the professor).
Arial 11 or 12-point font or Times New Roman styles.
Page margins Top, Bottom, Left Side and Right Side = 1 inch,
with reasonable accommodation being made for special
situations and online submission variances
Important:
Good academic writing requires writers to cite the sources of
all facts in text. If you state that the sky is blue then you must
cite who said it. A good rule of thumb is one citation per
paragraph; paragraphs 3-5 sentences (
This is how to avoid unintentional plagiarism
). Papers are always written in third person past tense as you
are writing about events in the past from the point of view of an
observer. The student or writer proposed; One must observe;
The leaders at APUS choose the following systems....for the
following reasons:

More Related Content

Similar to Assignment InstructionsInstructionsNote A 15 or less origi.docx

Designing Compliance within the LAN-to-WAN DomainNote Rev
Designing Compliance within the LAN-to-WAN DomainNote RevDesigning Compliance within the LAN-to-WAN DomainNote Rev
Designing Compliance within the LAN-to-WAN DomainNote Rev
emersonpearline
 
Assignment 4 Designing Compliance within the LAN-to-WAN DomainD.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainD.docxAssignment 4 Designing Compliance within the LAN-to-WAN DomainD.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainD.docx
astonrenna
 
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docxAssignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
eleanorabarrington
 
Assignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
Assignment 4 Designing Compliance within the LAN-to-WAN Domain.docxAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
Assignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
luearsome
 
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and woerm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
eleanorabarrington
 
Mister Network Engineer Due Week 8 and worth 70 points Using the.docx
Mister Network Engineer Due Week 8 and worth 70 points Using the.docxMister Network Engineer Due Week 8 and worth 70 points Using the.docx
Mister Network Engineer Due Week 8 and worth 70 points Using the.docx
jacmariek5
 
Write a 1-page summary for each topic listed below1. Scripting.docx
Write a 1-page summary for each topic listed below1. Scripting.docxWrite a 1-page summary for each topic listed below1. Scripting.docx
Write a 1-page summary for each topic listed below1. Scripting.docx
ambersalomon88660
 
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docxAssignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
astonrenna
 
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docxTerm Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
manningchassidy
 
1. Final Project - This project provides you an opportunity to sol
1. Final Project - This project provides you an opportunity to sol1. Final Project - This project provides you an opportunity to sol
1. Final Project - This project provides you an opportunity to sol
TatianaMajor22
 
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docxAssignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
carlibradley31429
 

Similar to Assignment InstructionsInstructionsNote A 15 or less origi.docx (20)

Designing Compliance within the LAN-to-WAN DomainNote Rev
Designing Compliance within the LAN-to-WAN DomainNote RevDesigning Compliance within the LAN-to-WAN DomainNote Rev
Designing Compliance within the LAN-to-WAN DomainNote Rev
 
Assignment 4 Designing Compliance within the LAN-to-WAN DomainD.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainD.docxAssignment 4 Designing Compliance within the LAN-to-WAN DomainD.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainD.docx
 
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docxAssignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
 
Assignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
Assignment 4 Designing Compliance within the LAN-to-WAN Domain.docxAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
Assignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
 
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and woerm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
 
Mister Network Engineer Due Week 8 and worth 70 points Using the.docx
Mister Network Engineer Due Week 8 and worth 70 points Using the.docxMister Network Engineer Due Week 8 and worth 70 points Using the.docx
Mister Network Engineer Due Week 8 and worth 70 points Using the.docx
 
Write a 1-page summary for each topic listed below1. Scripting.docx
Write a 1-page summary for each topic listed below1. Scripting.docxWrite a 1-page summary for each topic listed below1. Scripting.docx
Write a 1-page summary for each topic listed below1. Scripting.docx
 
CIS 341 Success Begins / snaptutorial.com
CIS 341 Success Begins / snaptutorial.comCIS 341 Success Begins / snaptutorial.com
CIS 341 Success Begins / snaptutorial.com
 
Cis 341 Technology levels--snaptutorial.com
Cis 341 Technology levels--snaptutorial.comCis 341 Technology levels--snaptutorial.com
Cis 341 Technology levels--snaptutorial.com
 
Cis 341 Enthusiastic Study - snaptutorial.com
Cis 341 Enthusiastic Study - snaptutorial.comCis 341 Enthusiastic Study - snaptutorial.com
Cis 341 Enthusiastic Study - snaptutorial.com
 
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docxAssignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
 
Cis 534 Technology levels--snaptutorial.com
Cis 534 Technology levels--snaptutorial.comCis 534 Technology levels--snaptutorial.com
Cis 534 Technology levels--snaptutorial.com
 
Cis 534 Enthusiastic Study / snaptutorial.com
Cis 534 Enthusiastic Study / snaptutorial.comCis 534 Enthusiastic Study / snaptutorial.com
Cis 534 Enthusiastic Study / snaptutorial.com
 
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docxTerm Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
 
1. Final Project - This project provides you an opportunity to sol
1. Final Project - This project provides you an opportunity to sol1. Final Project - This project provides you an opportunity to sol
1. Final Project - This project provides you an opportunity to sol
 
Cis 436 Technology levels--snaptutorial.com
Cis 436 Technology levels--snaptutorial.comCis 436 Technology levels--snaptutorial.com
Cis 436 Technology levels--snaptutorial.com
 
Cis 436 Enthusiastic Study / snaptutorial.com
Cis 436 Enthusiastic Study / snaptutorial.comCis 436 Enthusiastic Study / snaptutorial.com
Cis 436 Enthusiastic Study / snaptutorial.com
 
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docxAssignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
 
Assignment mister network engineer.docx
Assignment mister network engineer.docxAssignment mister network engineer.docx
Assignment mister network engineer.docx
 
Cis 175/tutorialoutlet
Cis 175/tutorialoutletCis 175/tutorialoutlet
Cis 175/tutorialoutlet
 

More from AMMY30

After reading Trifles by Susan Glaspell complete the following works.docx
After reading Trifles by Susan Glaspell complete the following works.docxAfter reading Trifles by Susan Glaspell complete the following works.docx
After reading Trifles by Susan Glaspell complete the following works.docx
AMMY30
 
After reading the IMAA article this week on Effective Manageme.docx
After reading the IMAA article this week on Effective Manageme.docxAfter reading the IMAA article this week on Effective Manageme.docx
After reading the IMAA article this week on Effective Manageme.docx
AMMY30
 

More from AMMY30 (20)

After reviewing the Coleman (2016) article on executive compensation.docx
After reviewing the Coleman (2016) article on executive compensation.docxAfter reviewing the Coleman (2016) article on executive compensation.docx
After reviewing the Coleman (2016) article on executive compensation.docx
 
After reviewing the chapter on Recognizing Contributions, perform .docx
After reviewing the chapter on Recognizing Contributions, perform .docxAfter reviewing the chapter on Recognizing Contributions, perform .docx
After reviewing the chapter on Recognizing Contributions, perform .docx
 
After reviewing the chapter on Recognizing Contributions, perform a .docx
After reviewing the chapter on Recognizing Contributions, perform a .docxAfter reviewing the chapter on Recognizing Contributions, perform a .docx
After reviewing the chapter on Recognizing Contributions, perform a .docx
 
After reviewing the background materials and doing your own research.docx
After reviewing the background materials and doing your own research.docxAfter reviewing the background materials and doing your own research.docx
After reviewing the background materials and doing your own research.docx
 
After reviewing the articles and videos, please address the followin.docx
After reviewing the articles and videos, please address the followin.docxAfter reviewing the articles and videos, please address the followin.docx
After reviewing the articles and videos, please address the followin.docx
 
After reviewing Georgia v. Randolph and Fernandez v. Californi.docx
After reviewing Georgia v. Randolph and Fernandez v. Californi.docxAfter reviewing Georgia v. Randolph and Fernandez v. Californi.docx
After reviewing Georgia v. Randolph and Fernandez v. Californi.docx
 
After reviewing chapter 11 of the E-Text and the Required Resources .docx
After reviewing chapter 11 of the E-Text and the Required Resources .docxAfter reviewing chapter 11 of the E-Text and the Required Resources .docx
After reviewing chapter 11 of the E-Text and the Required Resources .docx
 
After reading Library ArticlesDevine, K., Kloppenborg, .docx
After reading Library ArticlesDevine, K., Kloppenborg, .docxAfter reading Library ArticlesDevine, K., Kloppenborg, .docx
After reading Library ArticlesDevine, K., Kloppenborg, .docx
 
After reading Trifles by Susan Glaspell complete the following works.docx
After reading Trifles by Susan Glaspell complete the following works.docxAfter reading Trifles by Susan Glaspell complete the following works.docx
After reading Trifles by Susan Glaspell complete the following works.docx
 
After reading through Chapter 1, the focus was on targeting the five.docx
After reading through Chapter 1, the focus was on targeting the five.docxAfter reading through Chapter 1, the focus was on targeting the five.docx
After reading through Chapter 1, the focus was on targeting the five.docx
 
After reading There Is No Unmarked Woman, by Deborah Tannen, a.docx
After reading There Is No Unmarked Woman, by Deborah Tannen, a.docxAfter reading There Is No Unmarked Woman, by Deborah Tannen, a.docx
After reading There Is No Unmarked Woman, by Deborah Tannen, a.docx
 
After reading the U.S. Constitution and the Amendments respond t.docx
After reading the U.S. Constitution and the Amendments respond t.docxAfter reading the U.S. Constitution and the Amendments respond t.docx
After reading the U.S. Constitution and the Amendments respond t.docx
 
After reading the two short primary source documents listed below, c.docx
After reading the two short primary source documents listed below, c.docxAfter reading the two short primary source documents listed below, c.docx
After reading the two short primary source documents listed below, c.docx
 
After reading the section titled Dominant Microprocessor Company In.docx
After reading the section titled Dominant Microprocessor Company In.docxAfter reading the section titled Dominant Microprocessor Company In.docx
After reading the section titled Dominant Microprocessor Company In.docx
 
After reading the section titled Dominant Microprocessor Compan.docx
After reading the section titled Dominant Microprocessor Compan.docxAfter reading the section titled Dominant Microprocessor Compan.docx
After reading the section titled Dominant Microprocessor Compan.docx
 
After reading the paper for this week, Steinfield C, LaRose R, C.docx
After reading the paper for this week, Steinfield C, LaRose R, C.docxAfter reading the paper for this week, Steinfield C, LaRose R, C.docx
After reading the paper for this week, Steinfield C, LaRose R, C.docx
 
After reading the Martin Luther King, Jr. speech in the attached lin.docx
After reading the Martin Luther King, Jr. speech in the attached lin.docxAfter reading the Martin Luther King, Jr. speech in the attached lin.docx
After reading the Martin Luther King, Jr. speech in the attached lin.docx
 
After reading the material from Shafer-Landau concerning the appeal .docx
After reading the material from Shafer-Landau concerning the appeal .docxAfter reading the material from Shafer-Landau concerning the appeal .docx
After reading the material from Shafer-Landau concerning the appeal .docx
 
After reading the IMAA article this week on Effective Manageme.docx
After reading the IMAA article this week on Effective Manageme.docxAfter reading the IMAA article this week on Effective Manageme.docx
After reading the IMAA article this week on Effective Manageme.docx
 
After reading the essay, Why Rational People Buy into Conspiracy Th.docx
After reading the essay, Why Rational People Buy into Conspiracy Th.docxAfter reading the essay, Why Rational People Buy into Conspiracy Th.docx
After reading the essay, Why Rational People Buy into Conspiracy Th.docx
 

Recently uploaded

會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
中 央社
 

Recently uploaded (20)

24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
 
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
 
Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio App
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 
Supporting Newcomer Multilingual Learners
Supporting Newcomer  Multilingual LearnersSupporting Newcomer  Multilingual Learners
Supporting Newcomer Multilingual Learners
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17
 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
 
Climbers and Creepers used in landscaping
Climbers and Creepers used in landscapingClimbers and Creepers used in landscaping
Climbers and Creepers used in landscaping
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
 
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
 
MOOD STABLIZERS DRUGS.pptx
MOOD     STABLIZERS           DRUGS.pptxMOOD     STABLIZERS           DRUGS.pptx
MOOD STABLIZERS DRUGS.pptx
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptx
 
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhĐề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptx
 
Including Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdfIncluding Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdf
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical Principles
 

Assignment InstructionsInstructionsNote A 15 or less origi.docx

  • 1. Assignment Instructions Instructions: Note: A 15 % or less originality score is required to be uploaded with the paper prior to any grading. Scenario : You are a Security professional hired by NextGard Technologies in Phoenix, AZ to provide a Windows security implementation model for their organization. NextGard specializes in network consulting services for US companies and they want to upgrade and secure their current network. NextGard has 250,000 employees in 5 countries. The Phoenix office operates as the NextGard Corporate headquarters. Currently there are five district offices: • Atlanta, Georgia • Bangalore, India • Los Angeles, California • Montreal, Canada • New York City, New York The district offices have satellite employees that have a combination of desktops, mobile computers and wireless devices. There is a mix of computers running Windows 2000, XP, Windows Vista and Windows 7. There is a Windows Active Directory forest with domains set up for each office and seven file and print servers which are located in the Phoenix office. The Phoenix office also contains two proxy servers, configured as an array, that provide Web cache services and Internet access control for the organization since the majority of applications are web-based and hosted from the Phoenix office.
  • 2. There are also several Microsoft applications that all employees within a region use that are hosted in the regional offices. All employees have Internet access so they can browse the web. Tasks (Paper Sections): For the assigned project, you are to submit a proposal for the management of NextGard. In the proposal, you must address the following: Research solutions and detail the appropriate Microsoft Windows access controls including policies, standards and procedures that define who users are, what they can do, which resources they can access, and what operations they can perform on a system. Research and detail the cryptography methods to protect organizational information using techniques that ensure its integrity, confidentiality, authenticity and non-repudiation, and the recovery of encrypted information in its original form. Research and devise a plan to thwart malicious code and activity by implementing countermeasures and prevention techniques for dealing with viruses, worms, logic bombs, Trojan horses and other related forms of intentionally created deviant code. Research and formulate a plan to implement monitoring and analysis by determining system implementation and access as well as an incident response plan for security breaches or events. Research and detail security guidelines for contains the two proxy servers and Internet access control for the organization Research and define best practices for the security of NextGard’s organization. Conclusion summarizing your findings and recommendations for the reader. The Network topology must include all of the sites and the network infrastructure required to provide the services
  • 3. described in the Final Project Scenario in the section above Submission Instructions: An in-depth submission that is free of spelling and grammar errors in APA format. A minimum of 8 pages documenting your research on the subject and contain a drawing of your design. Double-spaced format (APA) with a readable style and font and submitted inside the electronic classroom (unless classroom access is not possible and other arrangements have been approved by the professor). Arial 11 or 12-point font or Times New Roman styles. Page margins Top, Bottom, Left Side and Right Side = 1 inch, with reasonable accommodation being made for special situations and online submission variances Important: Good academic writing requires writers to cite the sources of all facts in text. If you state that the sky is blue then you must cite who said it. A good rule of thumb is one citation per paragraph; paragraphs 3-5 sentences ( This is how to avoid unintentional plagiarism ). Papers are always written in third person past tense as you are writing about events in the past from the point of view of an observer. The student or writer proposed; One must observe; The leaders at APUS choose the following systems....for the following reasons: