SlideShare a Scribd company logo
1 of 3
Task:
Your team task is to address two network security problems that
this organization’s network faces and use scholarly research to
help document the findings.
Preparing your paper:
Your team makes up the nature of Southworth-DeSassure
Enterprises’ business and will need to identify the type of
business. Your team may assign additional configuration or
networking policies to help the organization. Identifying a
particular type of business or a particular network configuration
may help your team identify problems. For example, if
Southworth-DeSassure Enterprises is a social networking
company, that may present a unique set of problems that are
different from a printing company. Your team will need to
identify and address though research what are some of the
networking problems and provide supporting recommendations
with source material. Half of your sources should be scholarly.
Formatting
All teams are required to use Microsoft Word to prepare their
final paper for grading.
Using APA
Your paper should be formatted using APA guidelines and
contain the following sections:
· Title Page
· Table of Contents (Use the auto-generation features in
Microsoft Word for the TOC)
· Abstract
· Main Body
o Introduction
§ Problem Statement
· Research Question
o Literature Review
o Methodology
o Findings
o Conclusion
· References
TaskYour team task is to address two network security probl

More Related Content

More from alehosickg3

War and Peace Please respond to the followingBased on the lect.docx
War and Peace Please respond to the followingBased on the lect.docxWar and Peace Please respond to the followingBased on the lect.docx
War and Peace Please respond to the followingBased on the lect.docx
alehosickg3
 
Vulnerable Population Summary and Proposed ProgramThe first of you.docx
Vulnerable Population Summary and Proposed ProgramThe first of you.docxVulnerable Population Summary and Proposed ProgramThe first of you.docx
Vulnerable Population Summary and Proposed ProgramThe first of you.docx
alehosickg3
 
Voices of DemocracyThe documents created at the inception of Ameri.docx
Voices of DemocracyThe documents created at the inception of Ameri.docxVoices of DemocracyThe documents created at the inception of Ameri.docx
Voices of DemocracyThe documents created at the inception of Ameri.docx
alehosickg3
 
Visual Representation and Analysis of DataStateTotal.docx
Visual Representation and Analysis of DataStateTotal.docxVisual Representation and Analysis of DataStateTotal.docx
Visual Representation and Analysis of DataStateTotal.docx
alehosickg3
 
Visit a website you access frequently (excluding social networki.docx
Visit a website you access frequently (excluding social networki.docxVisit a website you access frequently (excluding social networki.docx
Visit a website you access frequently (excluding social networki.docx
alehosickg3
 
View the following Films on Demand videosDrug Control in Centra.docx
View the following Films on Demand videosDrug Control in Centra.docxView the following Films on Demand videosDrug Control in Centra.docx
View the following Films on Demand videosDrug Control in Centra.docx
alehosickg3
 
Views on Diversity  January 13, 2016. Your response should be at.docx
Views on Diversity  January 13, 2016. Your response should be at.docxViews on Diversity  January 13, 2016. Your response should be at.docx
Views on Diversity  January 13, 2016. Your response should be at.docx
alehosickg3
 
Vignette of AnnieAnnie is a 47-year-old Chinese-American woman w.docx
Vignette of AnnieAnnie is a 47-year-old Chinese-American woman w.docxVignette of AnnieAnnie is a 47-year-old Chinese-American woman w.docx
Vignette of AnnieAnnie is a 47-year-old Chinese-American woman w.docx
alehosickg3
 

More from alehosickg3 (20)

WarehousingCompanies use cross-docking to improve the performanc.docx
WarehousingCompanies use cross-docking to improve the performanc.docxWarehousingCompanies use cross-docking to improve the performanc.docx
WarehousingCompanies use cross-docking to improve the performanc.docx
 
War and Peace Please respond to the followingBased on the lect.docx
War and Peace Please respond to the followingBased on the lect.docxWar and Peace Please respond to the followingBased on the lect.docx
War and Peace Please respond to the followingBased on the lect.docx
 
Wang, Woo, Choon, Quek, Yang, and Liu (2012) found that using Facebo.docx
Wang, Woo, Choon, Quek, Yang, and Liu (2012) found that using Facebo.docxWang, Woo, Choon, Quek, Yang, and Liu (2012) found that using Facebo.docx
Wang, Woo, Choon, Quek, Yang, and Liu (2012) found that using Facebo.docx
 
W4 Assignment DeterrenceIntroduction to CriminologyCrime and C.docx
W4 Assignment DeterrenceIntroduction to CriminologyCrime and C.docxW4 Assignment DeterrenceIntroduction to CriminologyCrime and C.docx
W4 Assignment DeterrenceIntroduction to CriminologyCrime and C.docx
 
Vulnerable Population Summary and Proposed ProgramThe first of you.docx
Vulnerable Population Summary and Proposed ProgramThe first of you.docxVulnerable Population Summary and Proposed ProgramThe first of you.docx
Vulnerable Population Summary and Proposed ProgramThe first of you.docx
 
Voices of DemocracyThe documents created at the inception of Ameri.docx
Voices of DemocracyThe documents created at the inception of Ameri.docxVoices of DemocracyThe documents created at the inception of Ameri.docx
Voices of DemocracyThe documents created at the inception of Ameri.docx
 
Vital statistics collected by federal, state, & local governments ar.docx
Vital statistics collected by federal, state, & local governments ar.docxVital statistics collected by federal, state, & local governments ar.docx
Vital statistics collected by federal, state, & local governments ar.docx
 
Visual Representation and Analysis of DataStateTotal.docx
Visual Representation and Analysis of DataStateTotal.docxVisual Representation and Analysis of DataStateTotal.docx
Visual Representation and Analysis of DataStateTotal.docx
 
Vladimir Putin was recently reelected to another term as President o.docx
Vladimir Putin was recently reelected to another term as President o.docxVladimir Putin was recently reelected to another term as President o.docx
Vladimir Putin was recently reelected to another term as President o.docx
 
Vissing (2011) explains culture as an organized system of living an.docx
Vissing (2011) explains culture as an organized system of living an.docxVissing (2011) explains culture as an organized system of living an.docx
Vissing (2011) explains culture as an organized system of living an.docx
 
Visit the Endeavour Space Shuttle (I Already went there) at the .docx
Visit the Endeavour Space Shuttle (I Already went there) at the .docxVisit the Endeavour Space Shuttle (I Already went there) at the .docx
Visit the Endeavour Space Shuttle (I Already went there) at the .docx
 
Visit the Endeavour Space Shuttle (any day) at the Science Cente.docx
Visit the Endeavour Space Shuttle (any day) at the Science Cente.docxVisit the Endeavour Space Shuttle (any day) at the Science Cente.docx
Visit the Endeavour Space Shuttle (any day) at the Science Cente.docx
 
Visit Oracle.com. Click the Solutions tab to open the menu; then cli.docx
Visit Oracle.com. Click the Solutions tab to open the menu; then cli.docxVisit Oracle.com. Click the Solutions tab to open the menu; then cli.docx
Visit Oracle.com. Click the Solutions tab to open the menu; then cli.docx
 
Virtually all aspects of development are clearly influenced by both .docx
Virtually all aspects of development are clearly influenced by both .docxVirtually all aspects of development are clearly influenced by both .docx
Virtually all aspects of development are clearly influenced by both .docx
 
Visit a website you access frequently (excluding social networki.docx
Visit a website you access frequently (excluding social networki.docxVisit a website you access frequently (excluding social networki.docx
Visit a website you access frequently (excluding social networki.docx
 
Virtual Private NetworksThe successful operation of a VPN depends .docx
Virtual Private NetworksThe successful operation of a VPN depends .docxVirtual Private NetworksThe successful operation of a VPN depends .docx
Virtual Private NetworksThe successful operation of a VPN depends .docx
 
View the following Films on Demand videosDrug Control in Centra.docx
View the following Films on Demand videosDrug Control in Centra.docxView the following Films on Demand videosDrug Control in Centra.docx
View the following Films on Demand videosDrug Control in Centra.docx
 
Views on Diversity  January 13, 2016. Your response should be at.docx
Views on Diversity  January 13, 2016. Your response should be at.docxViews on Diversity  January 13, 2016. Your response should be at.docx
Views on Diversity  January 13, 2016. Your response should be at.docx
 
Vignette of AnnieAnnie is a 47-year-old Chinese-American woman w.docx
Vignette of AnnieAnnie is a 47-year-old Chinese-American woman w.docxVignette of AnnieAnnie is a 47-year-old Chinese-American woman w.docx
Vignette of AnnieAnnie is a 47-year-old Chinese-American woman w.docx
 
View the movieCrash, starring Sandra Bullock, Don Cheadle and .docx
View the movieCrash, starring Sandra Bullock, Don Cheadle and .docxView the movieCrash, starring Sandra Bullock, Don Cheadle and .docx
View the movieCrash, starring Sandra Bullock, Don Cheadle and .docx
 

TaskYour team task is to address two network security probl

  • 1. Task: Your team task is to address two network security problems that this organization’s network faces and use scholarly research to help document the findings. Preparing your paper: Your team makes up the nature of Southworth-DeSassure Enterprises’ business and will need to identify the type of business. Your team may assign additional configuration or networking policies to help the organization. Identifying a particular type of business or a particular network configuration may help your team identify problems. For example, if Southworth-DeSassure Enterprises is a social networking company, that may present a unique set of problems that are different from a printing company. Your team will need to identify and address though research what are some of the networking problems and provide supporting recommendations with source material. Half of your sources should be scholarly. Formatting All teams are required to use Microsoft Word to prepare their final paper for grading. Using APA
  • 2. Your paper should be formatted using APA guidelines and contain the following sections: · Title Page · Table of Contents (Use the auto-generation features in Microsoft Word for the TOC) · Abstract · Main Body o Introduction § Problem Statement · Research Question o Literature Review o Methodology o Findings o Conclusion · References