SlideShare a Scribd company logo
1 of 37
1/28/19, 11(01 PMRubric Detail –
2019_SPR_IG_Telecommunications Network ...
Page 1 of
2https://ucumberlands.blackboard.com/webapps/rubric/do/cours
e/grade…wOnly=true&displayGrades=false&type=grading&rubr
icAssoId=_32893_1
Rubric DetailRubric Detail
A rubric lists grading criteria that instructors use to evaluate
student work. Your instructor
linked a rubric to this item and made it available to you. Select
Grid View or List View to
change the rubric's layout.
Novice Competent Proficient
Writing Skills,
Grammar, and APA
Formatting
1 (2.00%) - 4
(8.00%)
Assignment does
not demonstrate
graduate-level
proficiency in
organization,
grammar, and style.
Assignment is
poorly written and
confusing. Ideas
are not
communicated
effectively. Student
paid no attention to
spelling and
punctuation.
Demonstrates poor
writing skills. The
assignment lacks
the use of APA
formatting and does
not provide proper
citations or includes
no citations.
4 (8.00%) - 8
(16.00%)
Assignment
demonstrates
graduate-level
proficiency in
organization,
grammar, and style.
Assignment is
effectively
communicated, but
some sections
lacking clarity.
Student paid some
attention to spelling
and punctuation,
but there are errors
within the writing.
Needs attention to
proper writing skills.
Use of APA
formatting and
citations of outside
resources, but has
a few instances in
which proper
citations are
missing.
9 (18.00%) - 12.5
(25.00%)
Assignment
strongly
demonstrates
graduate-level
proficiency in
organization,
grammar, and style.
Assignment is well
written, and ideas
are well developed
and explained.
Demonstrates
strong writing skills.
Student paid close
attention to spelling
and punctuation.
Sentences and
paragraphs are
grammatically
correct. Proper use
of APA formatting.
Properly and
explicitly cited
outside resources.
Reference list
matches citations.
Maintains
purpose/focus
1 (2.00%) - 4
(8.00%)
Submission lacks
focus or contains
4 (8.00%) - 8
(16.00%)
Submissions has
an organizational
9 (18.00%) - 12.5
(25.00%)
Submission is well
organized and has
Name: Practical Connection Assignment Rubric
ExitExit
Grid View List View
https://ucumberlands.blackboard.com/webapps/rubric/do/course/
gradeRubric?mode=grid&isPopup=true&rubricCount=1&prefix=
_642421_1&course_id=_108133_1&maxValue=50.0&rubricId=
_18735_1&viewOnly=true&displayGrades=false&type=grading
&rubricAssoId=_32893_1#
https://ucumberlands.blackboard.com/webapps/rubric/do/course/
gradeRubric?mode=grid&isPopup=true&rubricCount=1&prefix=
_642421_1&course_id=_108133_1&maxValue=50.0&rubricId=
_18735_1&viewOnly=true&displayGrades=false&type=grading
&rubricAssoId=_32893_1#
1/28/19, 11(01 PMRubric Detail –
2019_SPR_IG_Telecommunications Network ...
Page 2 of
2https://ucumberlands.blackboard.com/webapps/rubric/do/cours
e/grade…wOnly=true&displayGrades=false&type=grading&rubr
icAssoId=_32893_1
focus or contains
major drifts in focus
an organizational
structure and the
focus is clear
throughout.
organized and has
a tight and cohesive
focus that is
integrated
throughout the
document
Understanding of
Course Content
1 (2.00%) - 4
(8.00%)
Student does not
demonstrate
understanding of
course content and
knowledge
4 (8.00%) - 8
(16.00%)
Student
demonstrates some
understanding of
course content and
knowledge.
9 (18.00%) - 12.5
(25.00%)
Student
demonstrates
understand of
course content and
knowledge.
Work Environment
Application
0 (0.00%) - 4
(8.00%)
Student does not
demonstrate the
practical
application, or
ability to apply, of
course objectives
within a work
environment.
4 (8.00%) - 8
(16.00%)
Student
demonstrates some
practical
application, or
ability to apply, of
course objectives
within a work
environment.
9 (18.00%) - 12.5
(25.00%)
Student strongly
demonstrates the
practical
application, or
ability to apply, of
course objectives
within a work
environment.
Name:Practical Connection Assignment Rubric
ExitExit
Executive Program Practical Connection Assignment
At UC, it is a priority that students are provided with strong
educational programs and courses that
allow them to be servant-leaders in their disciplines and
communities, linking research with practice and
knowledge with ethical decision-making. This assignment is a
written assignment where students will
demonstrate how this course research has connected and put
into practice within their own career.
Assignment:
Provide a reflection of at least 500 words (or 2 pages double
spaced) of how the knowledge, skills, or
theories of this course have been applied, or could be applied,
in a practical manner to your current
work environment. If you are not currently working, share times
when you have or could observe these
theories and knowledge could be applied to an employment
opportunity in your field of study.
Requirements:
Provide a 500 word (or 2 pages double spaced) minimum
reflection.
Use of proper APA formatting and citations. If supporting
evidence from outside resources is used those
must be properly cited.
Share a personal connection that identifies specific knowledge
and theories from this course.
Demonstrate a connection to your current work environment. If
you are not employed, demonstrate a
connection to your desired work environment.
You should NOT, provide an overview of the assignments
assigned in the course. The assignment
asks that you reflect how the knowledge and skills obtained
through meeting course objectives
were applied or could be applied in the workplace.
Note: A grading rubric for this assignment is attached
Network Security, Firewalls,
and VPNs
Lesson 4
Network Security Implementation and Management
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Page ‹#›
Network Security, Firewalls, and VPNs
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
1
Virtual Lab
Using Social Engineering Techniques to Plan an Attack
Chapters 3, 11, 12
Required Reading
From Last Week…
Page ‹#›
Network Security, Firewalls, and VPNs
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
8/20/2017
2
Learning Objective
Describe network security implementation strategies and the
roles each can play within the security life cycle
Identify network security management best practices and
strategies for responding when security measures fail
Page ‹#›
Network Security, Firewalls, and VPNs
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Key Concepts
Why layered security strategies help mitigate risks, threats, and
vulnerabilities
Layering security to provide enhanced security for enterprise
network resources
Practices for hardening systems and networks against an attack
Security is a process or life cycle that requires constant
attention
Identifying security concerns of local, remote, and mobile
employees
Page ‹#›
Network Security, Firewalls, and VPNs
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Layered Security
Security Policy
Firewall
IDS/IPS
Vulnerability Assessments
Antivirus
Network
Page ‹#›
Network Security, Firewalls, and VPNs
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
8/20/2017
5
Layered Security in Action
Known Exploit Targets Your Web Server
Firewall—configured to allow Web traffic
IDS—detects the exploit
Vulnerability assessment—informs no action is needed because
server is not vulnerable
A Zero-Day Virus E-mailed to a User
Firewall—configured to allow E-mail
IDS—does not have signature for new virus
Antivirus—Heuristic engine identifies possible virus-like
activity
Page ‹#›
Network Security, Firewalls, and VPNs
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Concentric Castles
Superior defense
Two or more perimeter walls
Outer wall
Inner wall
Collapsible defense
Secure the keep
Focus on perimeter security
Page ‹#›
Network Security, Firewalls, and VPNs
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
8/20/2017
7
Network Security Application
Page ‹#›
Network Security, Firewalls, and VPNs
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
8/20/2017
8
Network Security Application
Similar to a DMZ
Two or more firewalls
External firewall
Internal firewall
Secure the internal network
Layers of perimeter defense
Page ‹#›
Network Security, Firewalls, and VPNs
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
8/20/2017
9
Improving Concentric Castles
Relied upon walls as barriers to entry
Add additional barriers
Moats
Add additional defenses
Ranged defense
Archers
Vats of hot oil
Melee defense
Knights
Swordsmen
Page ‹#›
Network Security, Firewalls, and VPNs
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
8/20/2017
10
Building Upon Layered Security
Layered only provides breadth
Depth=overlapping countermeasures at each layer
Can be from multiple vendors
If one is good two must be better
Different AV patterns=higher chance for detection
Page ‹#›
Network Security, Firewalls, and VPNs
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
8/20/2017
11
Desktop Antivirus from Vendor A
E-mail Antivirus
from Vendor B
Antivirus Defense in Depth
The Bigger Picture
Page ‹#›
Network Security, Firewalls, and VPNs
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
8/20/2017
12
Firewall
External Firewall from Vendor A
Internal Firewall from Vendor B
Antivirus
Server AV
Desktop AV
IDS/IPS
Network IDS
Host IPS
Public Addresses
Finite number of addresses available
Issued by Internet Assigned Numbers Authority (IANA)
Controlled at the regional level by Regional Registry Entry
Direct communication with the Internet
Required for Internet-facing applications
Page ‹#›
Network Security, Firewalls, and VPNs
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
8/20/2017
13
Private Addresses
Reserved IP space
Class A: 10.0.0.1-10.255.255.255
Class B: 172.16.0.0-172.31.255.255
Class C: 192.168.0.0-192.168.255.255
Can be reused on internal networks
Isolated from Internet
Need to use network address translation (NAT) to communicate
with Internet
Page ‹#›
Network Security, Firewalls, and VPNs
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
8/20/2017
14
Static Addressing
Each system is configured with an address
IP addresses managed at the device level
Each system is guaranteed the same address
Making changes can be cumbersome
Page ‹#›
Network Security, Firewalls, and VPNs
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
8/20/2017
15
Dynamic Addressing
Dynamic Host Control Protocol (DHCP)
Requests IP address from centralized system
Addresses leased for a set period of time
Systems may acquire different address.
Reservations for the same address can be made
Addressing centrally controlled
An attacker may be able to “borrow” an address
Page ‹#›
Network Security, Firewalls, and VPNs
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
8/20/2017
16
Best Practices: Strategy
Create written plans
Security policy
Incident response plan
Business continuity plan (BCP)
Disaster recovery plan (DRP)
Security checklists
Perform regular maintenance
Back up regularly and test restores frequently
Monitor and review collected log files frequently
Constantly identify the weakest architectural link
Page ‹#›
Network Security, Firewalls, and VPNs
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Best Practices: Strategy (cont.)
Perform diligent testing of new systems before deploying in
production
Implement the principle of least privilege
Deploy layered defenses
Page ‹#›
Network Security, Firewalls, and VPNs
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Best Practices: Devices
Maintain physical security over users and equipment
Install and maintain virus and malware protection at all layers
in the environment
Harden both internal and perimeter devices
Develop and follow a patch management strategy
Enforce hard drive or file encryption
Page ‹#›
Network Security, Firewalls, and VPNs
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Best Practices: Connectivity
Restrict Internet connections to required activity
Limit remote access to required connectivity
Encrypt all internal network traffic
Require multi-factor authentication
Use default-deny over default-permit whenever possible
Page ‹#›
Network Security, Firewalls, and VPNs
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
User Training
Q: What is user training?
A: Educational information presented through various
mechanisms that clearly defines security policies, their
boundaries and imposed limitations
Q: Why is user training important?
A: Training drives user accountability, understanding, and
acceptance of obligatory security policies
It is imperative that regular renewal of security awareness
training occurs
Page ‹#›
Network Security, Firewalls, and VPNs
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Security Awareness
Page ‹#›
Network Security, Firewalls, and VPNs
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
8/20/2017
22
Security Awareness
Defines
Informs
Explains
Teaches
Network Security Assessments
Q: What is a network security assessment?
A: The process of judging, testing, and evaluating a deployed
security solution
Page ‹#›
Network Security, Firewalls, and VPNs
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Conducting Network Security Assessments
Perform a risk assessment
Execute the security assessment:
Perform configuration scanning
Perform vulnerability scanning
Execute penetration testing
Perform a post-mortem assessment review
Page ‹#›
Network Security, Firewalls, and VPNs
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Security Information and Event Monitoring (SIEM)
A SIEM is a tool that allows for automation of log and event
centralization and analysis
Functions of a SIEM
Log centralization
Log management
Log monitoring
Purposes of a SIEM
Incident detection
Incident response and alerting
Page ‹#›
Network Security, Firewalls, and VPNs
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Commonly Available SIEM Tools
Page ‹#›
Network Security, Firewalls, and VPNs
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
enVision
Qradar
Eventia
Security Manager
nDepth
Endpoint/Node Security
Node is any device on the network; Endpoint is a device with an
IP address
Different types of nodes require different types of security
Security of individual devices creates greater network security
Roles involved in node security
End-Users: acceptable use, security awareness
System Admin: responsible for implementation
Network Admin: responsible for networking devices
Physical Security Staff: responsible for physical controls
Page ‹#›
Network Security, Firewalls, and VPNs
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Endpoint/Node Security Concerns
Clients
Antivirus scanner
Firewall
Screen lockout
Physical lock
Server
Redundancy
Strong authentication
Physical isolation
Page ‹#›
Network Security, Firewalls, and VPNs
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Endpoint/Node Security Concerns (cont.)
Networking devices (routers and switches)
Strong authentication
Accounting
Physical isolation
Page ‹#›
Network Security, Firewalls, and VPNs
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Network Security
Addressing
Private/Public
Static/Dynamic
Topology
Ring, Bus, Star, Line, Tree, Full Mesh, Partial Mesh
Protocols
Communication
Outbound
Inbound
Redundancy
Page ‹#›
Network Security, Firewalls, and VPNs
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Physical Security
Physical access bypasses many other controls.
Critical devices should de stored is an isolated data center.
Multifactor physical authentication
Limit staff with access
Fire suppression
CCTV cameras where appropriate
Compensating controls for mobile devices
Encryption
Anti-theft tracking software
Page ‹#›
Network Security, Firewalls, and VPNs
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Administrative Controls
Corporate objectives
Policies
Procedures
Standards
Guidelines
Training
Awareness
Page ‹#›
Network Security, Firewalls, and VPNs
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Network Security: Key Components
Primary objectives: confidentiality, integrity, availability
Security policy
Layered security + defense-in-depth
Network design: protocols, topologies, addressing, and
communication
Equipment selection
Page ‹#›
Network Security, Firewalls, and VPNs
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Network Security: Key Components
System hardening
Authentication, authorization, and accounting
Encryption
Redundancy
Endpoint security
Page ‹#›
Network Security, Firewalls, and VPNs
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Incident Response Team (IRT)
Page ‹#›
Network Security, Firewalls, and VPNs
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
8/20/2017
35
Team Leader
IS Members
Network Admins
Physical Sec Personnel
Legal
HR
PR
Incident Response
Page ‹#›
Network Security, Firewalls, and VPNs
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Preparation
Detection
Containment
Eradication
Recovery
Follow-up
Authentication
Verification of identity
Drivers license
User name/password
Most common
Weakness of passwords
Multifactor
Something you know (password/pin)
Something you have (security token/ATM card)
Something you are/do (biometrics/behavioral based)
Page ‹#›
Network Security, Firewalls, and VPNs
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
8/20/2017
37
Authorization
Concerned with what one has access to do
Least privileges
Access to what one needs to complete job
Typically occurs after authentication
Example: purchasing beer
Clerk checks ID verifies picture match (authentication)
Checks DOB to see if > 21 (authorization)
Page ‹#›
Network Security, Firewalls, and VPNs
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Accounting
Logging
All attempts failed and successful
Who, what, when
Auditing
Checking for compliance to ensure appropriate access
Monitoring
Looking for violations
Checking for unauthorized access
Page ‹#›
Network Security, Firewalls, and VPNs
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Encryption
Data at rest
File encryption
Database encryption
Disk encryption
Data in transit
Ensures integrity, confidentiality, and privacy
Nonrepudiation
Encrypted tunnel: IPSec and SSL/TLS
Page ‹#›
Network Security, Firewalls, and VPNs
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Compartmentalization and Containment
Compartmentalization is an element of infrastructure design
Creates small collectives of systems that support work tasks
while minimizing risk
Containment should interrupt or interfere with the continued
spread or operation of the unwanted event
Page ‹#›
Network Security, Firewalls, and VPNs
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
8/20/2017
41
Honeypots, Honeynets, and Padded Cells
Honeypot traps intruders, detects new attacks, serves as a decoy
Honeynet is a network of honeypots
Padded cell is a form of a honeypot, turned on when an intruder
is detected, acts as a lure
Page ‹#›
Network Security, Firewalls, and VPNs
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
8/20/2017
42
Summary
Why layered security strategies help mitigate risks, threats, and
vulnerabilities
Layering security to provide enhanced security for enterprise
network resources
Practices for hardening systems and networks against an attack
Security as a process rather than as a goal
Security is a process or life cycle that requires constant
attention
Page ‹#›
Network Security, Firewalls, and VPNs
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
Summary
Best practices for network security management
Strategies for integrating network security strategies with
firewall defenses and VPN remote access
Value of incident response planning, testing and practice
Page ‹#›
Network Security, Firewalls, and VPNs
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.
8/20/2017
44
Virtual Lab
No labs this week
Chapters 5 & 6
NIST SP 800-61: Computer Security Incident Handling Guide
MUST BE completed by Sunday, September, 24th by 11:59 PM!
Required Reading
Midterm Exam
Page ‹#›
Network Security, Firewalls, and VPNs
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning
Company
www.jblearning.com
All rights reserved.

More Related Content

Similar to 12819, 11(01 PMRubric Detail – 2019_SPR_IG_Telecommunication.docx

Page 1 of 6 [377] COM7005D Info.docx
Page 1 of 6 [377] COM7005D    Info.docxPage 1 of 6 [377] COM7005D    Info.docx
Page 1 of 6 [377] COM7005D Info.docx
honey690131
 
Chapter 7 Beyond Competence Developing.docx
Chapter 7                   Beyond Competence Developing.docxChapter 7                   Beyond Competence Developing.docx
Chapter 7 Beyond Competence Developing.docx
robertad6
 
HND Assignment Brief Session Sept.docx
              HND Assignment Brief               Session Sept.docx              HND Assignment Brief               Session Sept.docx
HND Assignment Brief Session Sept.docx
joyjonna282
 
Running Header LEARNING RESOURCE1 NETFLIX4LEARNING RESO.docx
Running Header LEARNING RESOURCE1 NETFLIX4LEARNING RESO.docxRunning Header LEARNING RESOURCE1 NETFLIX4LEARNING RESO.docx
Running Header LEARNING RESOURCE1 NETFLIX4LEARNING RESO.docx
anhlodge
 
write 400–600 words that respond to the following questions with .docx
write 400–600 words that respond to the following questions with .docxwrite 400–600 words that respond to the following questions with .docx
write 400–600 words that respond to the following questions with .docx
sleeperfindley
 
Coursework2 2013 distributed systems(1)
Coursework2 2013 distributed systems(1)Coursework2 2013 distributed systems(1)
Coursework2 2013 distributed systems(1)
randomP786
 
Follow all directions below using original work with full detail. .docx
Follow all directions below using original work with full detail. .docxFollow all directions below using original work with full detail. .docx
Follow all directions below using original work with full detail. .docx
bryanwest16882
 
Follow all directions below using original work with full detail. .docx
Follow all directions below using original work with full detail. .docxFollow all directions below using original work with full detail. .docx
Follow all directions below using original work with full detail. .docx
keugene1
 
CAA 2012 Closing Address
CAA 2012 Closing Address CAA 2012 Closing Address
CAA 2012 Closing Address
jisc-elearning
 
Technical Paper Risk AssessmentGlobal Finance, Inc. Netwo.docx
Technical Paper Risk AssessmentGlobal Finance, Inc. Netwo.docxTechnical Paper Risk AssessmentGlobal Finance, Inc. Netwo.docx
Technical Paper Risk AssessmentGlobal Finance, Inc. Netwo.docx
mattinsonjanel
 
PurposeThis course project is intended to assess your abilit
PurposeThis course project is intended to assess your abilitPurposeThis course project is intended to assess your abilit
PurposeThis course project is intended to assess your abilit
TakishaPeck109
 
142.8 Digital and Tech solutions PRF3
142.8 Digital and Tech solutions PRF3142.8 Digital and Tech solutions PRF3
142.8 Digital and Tech solutions PRF3
Jordan Cooper
 

Similar to 12819, 11(01 PMRubric Detail – 2019_SPR_IG_Telecommunication.docx (20)

Page 1 of 6 [377] COM7005D Info.docx
Page 1 of 6 [377] COM7005D    Info.docxPage 1 of 6 [377] COM7005D    Info.docx
Page 1 of 6 [377] COM7005D Info.docx
 
3.6 Resume
3.6 Resume3.6 Resume
3.6 Resume
 
Chapter 7 Beyond Competence Developing.docx
Chapter 7                   Beyond Competence Developing.docxChapter 7                   Beyond Competence Developing.docx
Chapter 7 Beyond Competence Developing.docx
 
Micro Instructional Design for Problem-Based and Game-Based Learning
Micro Instructional Design for Problem-Based and Game-Based LearningMicro Instructional Design for Problem-Based and Game-Based Learning
Micro Instructional Design for Problem-Based and Game-Based Learning
 
HND Assignment Brief Session Sept.docx
              HND Assignment Brief               Session Sept.docx              HND Assignment Brief               Session Sept.docx
HND Assignment Brief Session Sept.docx
 
Running Header LEARNING RESOURCE1 NETFLIX4LEARNING RESO.docx
Running Header LEARNING RESOURCE1 NETFLIX4LEARNING RESO.docxRunning Header LEARNING RESOURCE1 NETFLIX4LEARNING RESO.docx
Running Header LEARNING RESOURCE1 NETFLIX4LEARNING RESO.docx
 
5 Killer Examples : How to Use Microlearning Based Training Effectively - EI ...
5 Killer Examples : How to Use Microlearning Based Training Effectively - EI ...5 Killer Examples : How to Use Microlearning Based Training Effectively - EI ...
5 Killer Examples : How to Use Microlearning Based Training Effectively - EI ...
 
Ngs Hsm 700bl Module 5 01062009
Ngs Hsm 700bl  Module 5 01062009Ngs Hsm 700bl  Module 5 01062009
Ngs Hsm 700bl Module 5 01062009
 
write 400–600 words that respond to the following questions with .docx
write 400–600 words that respond to the following questions with .docxwrite 400–600 words that respond to the following questions with .docx
write 400–600 words that respond to the following questions with .docx
 
Coursework2 2013 distributed systems(1)
Coursework2 2013 distributed systems(1)Coursework2 2013 distributed systems(1)
Coursework2 2013 distributed systems(1)
 
Follow all directions below using original work with full detail. .docx
Follow all directions below using original work with full detail. .docxFollow all directions below using original work with full detail. .docx
Follow all directions below using original work with full detail. .docx
 
Follow all directions below using original work with full detail. .docx
Follow all directions below using original work with full detail. .docxFollow all directions below using original work with full detail. .docx
Follow all directions below using original work with full detail. .docx
 
How to Create a Sticky Learning Experience in Compliance Training - EI Design
How to Create a Sticky Learning Experience in Compliance Training - EI DesignHow to Create a Sticky Learning Experience in Compliance Training - EI Design
How to Create a Sticky Learning Experience in Compliance Training - EI Design
 
CAA 2012 Closing Address
CAA 2012 Closing Address CAA 2012 Closing Address
CAA 2012 Closing Address
 
Technical Paper Risk AssessmentGlobal Finance, Inc. Netwo.docx
Technical Paper Risk AssessmentGlobal Finance, Inc. Netwo.docxTechnical Paper Risk AssessmentGlobal Finance, Inc. Netwo.docx
Technical Paper Risk AssessmentGlobal Finance, Inc. Netwo.docx
 
Nidhi_Suneja
Nidhi_SunejaNidhi_Suneja
Nidhi_Suneja
 
PurposeThis course project is intended to assess your abilit
PurposeThis course project is intended to assess your abilitPurposeThis course project is intended to assess your abilit
PurposeThis course project is intended to assess your abilit
 
Strategic Management 4th Edition Frank-Rothaermel Solutions Manual
Strategic Management 4th Edition Frank-Rothaermel Solutions ManualStrategic Management 4th Edition Frank-Rothaermel Solutions Manual
Strategic Management 4th Edition Frank-Rothaermel Solutions Manual
 
142.8 Digital and Tech solutions PRF3
142.8 Digital and Tech solutions PRF3142.8 Digital and Tech solutions PRF3
142.8 Digital and Tech solutions PRF3
 
A Win-Win Situation Benefits Of Industry-Based Group Projects
A Win-Win Situation  Benefits Of Industry-Based Group ProjectsA Win-Win Situation  Benefits Of Industry-Based Group Projects
A Win-Win Situation Benefits Of Industry-Based Group Projects
 

More from drennanmicah

Case Study RubricCriterionStrongAverageWeakInt.docx
Case Study RubricCriterionStrongAverageWeakInt.docxCase Study RubricCriterionStrongAverageWeakInt.docx
Case Study RubricCriterionStrongAverageWeakInt.docx
drennanmicah
 
Case Study Rubric  Directly respond to each questi.docx
Case Study Rubric   Directly respond to each questi.docxCase Study Rubric   Directly respond to each questi.docx
Case Study Rubric  Directly respond to each questi.docx
drennanmicah
 
Case Study Scenario Part 3IntroductionThis media piece exp.docx
Case Study Scenario Part 3IntroductionThis media piece exp.docxCase Study Scenario Part 3IntroductionThis media piece exp.docx
Case Study Scenario Part 3IntroductionThis media piece exp.docx
drennanmicah
 
Case Study RubricYour case study will be assessed as follows•.docx
Case Study RubricYour case study will be assessed as follows•.docxCase Study RubricYour case study will be assessed as follows•.docx
Case Study RubricYour case study will be assessed as follows•.docx
drennanmicah
 
Case study RubricCriterionOutstanding 3.75Very Good 3 .docx
Case study RubricCriterionOutstanding  3.75Very Good  3 .docxCase study RubricCriterionOutstanding  3.75Very Good  3 .docx
Case study RubricCriterionOutstanding 3.75Very Good 3 .docx
drennanmicah
 
CASE STUDY RUBRIC MICROBIOLOGY For the Case Study assig.docx
CASE STUDY RUBRIC MICROBIOLOGY  For the Case Study assig.docxCASE STUDY RUBRIC MICROBIOLOGY  For the Case Study assig.docx
CASE STUDY RUBRIC MICROBIOLOGY For the Case Study assig.docx
drennanmicah
 
Case Study Rubric .docx
Case Study Rubric                                                 .docxCase Study Rubric                                                 .docx
Case Study Rubric .docx
drennanmicah
 
Case Study ReflectionWrite a 4-5 page paper. Your written assi.docx
Case Study ReflectionWrite a 4-5 page paper. Your written assi.docxCase Study ReflectionWrite a 4-5 page paper. Your written assi.docx
Case Study ReflectionWrite a 4-5 page paper. Your written assi.docx
drennanmicah
 
Case Study Report Rubric CriterionWeakAverageStrongIdent.docx
Case Study Report Rubric CriterionWeakAverageStrongIdent.docxCase Study Report Rubric CriterionWeakAverageStrongIdent.docx
Case Study Report Rubric CriterionWeakAverageStrongIdent.docx
drennanmicah
 
Case Study Project (A) Hefty Hardware - Be sure to address each .docx
Case Study Project (A) Hefty Hardware - Be sure to address each .docxCase Study Project (A) Hefty Hardware - Be sure to address each .docx
Case Study Project (A) Hefty Hardware - Be sure to address each .docx
drennanmicah
 
Case Study Project Part I Declared JurisdictionTemplate Sta.docx
Case Study Project Part I   Declared JurisdictionTemplate Sta.docxCase Study Project Part I   Declared JurisdictionTemplate Sta.docx
Case Study Project Part I Declared JurisdictionTemplate Sta.docx
drennanmicah
 
Case Study Peer Comments In each case study, you are expected.docx
Case Study Peer Comments In each case study, you are expected.docxCase Study Peer Comments In each case study, you are expected.docx
Case Study Peer Comments In each case study, you are expected.docx
drennanmicah
 
Case Study Planning for GrowthKelly’s Sandwich Stop is one of t.docx
Case Study Planning for GrowthKelly’s Sandwich Stop is one of t.docxCase Study Planning for GrowthKelly’s Sandwich Stop is one of t.docx
Case Study Planning for GrowthKelly’s Sandwich Stop is one of t.docx
drennanmicah
 
Case Study OneBMGT 464 Portfolio Activity TwoPurposeIn thi.docx
Case Study OneBMGT 464 Portfolio Activity TwoPurposeIn thi.docxCase Study OneBMGT 464 Portfolio Activity TwoPurposeIn thi.docx
Case Study OneBMGT 464 Portfolio Activity TwoPurposeIn thi.docx
drennanmicah
 

More from drennanmicah (20)

Case Study RubricCriterionStrongAverageWeakInt.docx
Case Study RubricCriterionStrongAverageWeakInt.docxCase Study RubricCriterionStrongAverageWeakInt.docx
Case Study RubricCriterionStrongAverageWeakInt.docx
 
Case Study Rubric  Directly respond to each questi.docx
Case Study Rubric   Directly respond to each questi.docxCase Study Rubric   Directly respond to each questi.docx
Case Study Rubric  Directly respond to each questi.docx
 
Case Study Scenario Part 3IntroductionThis media piece exp.docx
Case Study Scenario Part 3IntroductionThis media piece exp.docxCase Study Scenario Part 3IntroductionThis media piece exp.docx
Case Study Scenario Part 3IntroductionThis media piece exp.docx
 
Case Study RubricYour case study will be assessed as follows•.docx
Case Study RubricYour case study will be assessed as follows•.docxCase Study RubricYour case study will be assessed as follows•.docx
Case Study RubricYour case study will be assessed as follows•.docx
 
Case study RubricCriterionOutstanding 3.75Very Good 3 .docx
Case study RubricCriterionOutstanding  3.75Very Good  3 .docxCase study RubricCriterionOutstanding  3.75Very Good  3 .docx
Case study RubricCriterionOutstanding 3.75Very Good 3 .docx
 
CASE STUDY RUBRIC MICROBIOLOGY For the Case Study assig.docx
CASE STUDY RUBRIC MICROBIOLOGY  For the Case Study assig.docxCASE STUDY RUBRIC MICROBIOLOGY  For the Case Study assig.docx
CASE STUDY RUBRIC MICROBIOLOGY For the Case Study assig.docx
 
Case Study Rubric .docx
Case Study Rubric                                                 .docxCase Study Rubric                                                 .docx
Case Study Rubric .docx
 
Case Study ReflectionWrite a 4-5 page paper. Your written assi.docx
Case Study ReflectionWrite a 4-5 page paper. Your written assi.docxCase Study ReflectionWrite a 4-5 page paper. Your written assi.docx
Case Study ReflectionWrite a 4-5 page paper. Your written assi.docx
 
Case Study Questions (Each question is worth 6 marks)1. Defi.docx
Case Study Questions (Each question is worth 6 marks)1. Defi.docxCase Study Questions (Each question is worth 6 marks)1. Defi.docx
Case Study Questions (Each question is worth 6 marks)1. Defi.docx
 
Case Study Reorganizing Human Resources at ASP SoftwareRead the.docx
Case Study Reorganizing Human Resources at ASP SoftwareRead the.docxCase Study Reorganizing Human Resources at ASP SoftwareRead the.docx
Case Study Reorganizing Human Resources at ASP SoftwareRead the.docx
 
Case Study Report Rubric CriterionWeakAverageStrongIdent.docx
Case Study Report Rubric CriterionWeakAverageStrongIdent.docxCase Study Report Rubric CriterionWeakAverageStrongIdent.docx
Case Study Report Rubric CriterionWeakAverageStrongIdent.docx
 
Case Study Project (A) Hefty Hardware - Be sure to address each .docx
Case Study Project (A) Hefty Hardware - Be sure to address each .docxCase Study Project (A) Hefty Hardware - Be sure to address each .docx
Case Study Project (A) Hefty Hardware - Be sure to address each .docx
 
Case Study Proposing a Data Gathering Approach at TLG Solutions (.docx
Case Study Proposing a Data Gathering Approach at TLG Solutions (.docxCase Study Proposing a Data Gathering Approach at TLG Solutions (.docx
Case Study Proposing a Data Gathering Approach at TLG Solutions (.docx
 
Case Study Project Part I Declared JurisdictionTemplate Sta.docx
Case Study Project Part I   Declared JurisdictionTemplate Sta.docxCase Study Project Part I   Declared JurisdictionTemplate Sta.docx
Case Study Project Part I Declared JurisdictionTemplate Sta.docx
 
Case Study Proposing a Data Gathering Approach at TLG Solutions.docx
Case Study Proposing a Data Gathering Approach at TLG Solutions.docxCase Study Proposing a Data Gathering Approach at TLG Solutions.docx
Case Study Proposing a Data Gathering Approach at TLG Solutions.docx
 
Case Study Peer Comments In each case study, you are expected.docx
Case Study Peer Comments In each case study, you are expected.docxCase Study Peer Comments In each case study, you are expected.docx
Case Study Peer Comments In each case study, you are expected.docx
 
Case Study ProblemLeadership appears as a popular agenda it.docx
Case Study ProblemLeadership appears as a popular agenda it.docxCase Study ProblemLeadership appears as a popular agenda it.docx
Case Study ProblemLeadership appears as a popular agenda it.docx
 
Case Study Planning for GrowthKelly’s Sandwich Stop is one of t.docx
Case Study Planning for GrowthKelly’s Sandwich Stop is one of t.docxCase Study Planning for GrowthKelly’s Sandwich Stop is one of t.docx
Case Study Planning for GrowthKelly’s Sandwich Stop is one of t.docx
 
Case Study People v. Smith, 470 NW2d 70, Michigan Supreme Court (19.docx
Case Study People v. Smith, 470 NW2d 70, Michigan Supreme Court (19.docxCase Study People v. Smith, 470 NW2d 70, Michigan Supreme Court (19.docx
Case Study People v. Smith, 470 NW2d 70, Michigan Supreme Court (19.docx
 
Case Study OneBMGT 464 Portfolio Activity TwoPurposeIn thi.docx
Case Study OneBMGT 464 Portfolio Activity TwoPurposeIn thi.docxCase Study OneBMGT 464 Portfolio Activity TwoPurposeIn thi.docx
Case Study OneBMGT 464 Portfolio Activity TwoPurposeIn thi.docx
 

Recently uploaded

Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
EADTU
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
CaitlinCummins3
 

Recently uploaded (20)

Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio App
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptx
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in Hinduism
 
e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopal
 
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
ANTI PARKISON DRUGS.pptx
ANTI         PARKISON          DRUGS.pptxANTI         PARKISON          DRUGS.pptx
ANTI PARKISON DRUGS.pptx
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
male presentation...pdf.................
male presentation...pdf.................male presentation...pdf.................
male presentation...pdf.................
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management
 
MOOD STABLIZERS DRUGS.pptx
MOOD     STABLIZERS           DRUGS.pptxMOOD     STABLIZERS           DRUGS.pptx
MOOD STABLIZERS DRUGS.pptx
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical Principles
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 

12819, 11(01 PMRubric Detail – 2019_SPR_IG_Telecommunication.docx

  • 1. 1/28/19, 11(01 PMRubric Detail – 2019_SPR_IG_Telecommunications Network ... Page 1 of 2https://ucumberlands.blackboard.com/webapps/rubric/do/cours e/grade…wOnly=true&displayGrades=false&type=grading&rubr icAssoId=_32893_1 Rubric DetailRubric Detail A rubric lists grading criteria that instructors use to evaluate student work. Your instructor linked a rubric to this item and made it available to you. Select Grid View or List View to change the rubric's layout. Novice Competent Proficient Writing Skills, Grammar, and APA Formatting 1 (2.00%) - 4 (8.00%) Assignment does not demonstrate graduate-level proficiency in organization, grammar, and style. Assignment is poorly written and
  • 2. confusing. Ideas are not communicated effectively. Student paid no attention to spelling and punctuation. Demonstrates poor writing skills. The assignment lacks the use of APA formatting and does not provide proper citations or includes no citations. 4 (8.00%) - 8 (16.00%) Assignment demonstrates graduate-level proficiency in organization, grammar, and style. Assignment is effectively communicated, but some sections lacking clarity. Student paid some attention to spelling and punctuation, but there are errors within the writing. Needs attention to
  • 3. proper writing skills. Use of APA formatting and citations of outside resources, but has a few instances in which proper citations are missing. 9 (18.00%) - 12.5 (25.00%) Assignment strongly demonstrates graduate-level proficiency in organization, grammar, and style. Assignment is well written, and ideas are well developed and explained. Demonstrates strong writing skills. Student paid close attention to spelling and punctuation. Sentences and paragraphs are grammatically correct. Proper use of APA formatting. Properly and explicitly cited
  • 4. outside resources. Reference list matches citations. Maintains purpose/focus 1 (2.00%) - 4 (8.00%) Submission lacks focus or contains 4 (8.00%) - 8 (16.00%) Submissions has an organizational 9 (18.00%) - 12.5 (25.00%) Submission is well organized and has Name: Practical Connection Assignment Rubric ExitExit Grid View List View https://ucumberlands.blackboard.com/webapps/rubric/do/course/ gradeRubric?mode=grid&isPopup=true&rubricCount=1&prefix= _642421_1&course_id=_108133_1&maxValue=50.0&rubricId= _18735_1&viewOnly=true&displayGrades=false&type=grading &rubricAssoId=_32893_1# https://ucumberlands.blackboard.com/webapps/rubric/do/course/
  • 5. gradeRubric?mode=grid&isPopup=true&rubricCount=1&prefix= _642421_1&course_id=_108133_1&maxValue=50.0&rubricId= _18735_1&viewOnly=true&displayGrades=false&type=grading &rubricAssoId=_32893_1# 1/28/19, 11(01 PMRubric Detail – 2019_SPR_IG_Telecommunications Network ... Page 2 of 2https://ucumberlands.blackboard.com/webapps/rubric/do/cours e/grade…wOnly=true&displayGrades=false&type=grading&rubr icAssoId=_32893_1 focus or contains major drifts in focus an organizational structure and the focus is clear throughout. organized and has a tight and cohesive focus that is integrated throughout the document Understanding of Course Content 1 (2.00%) - 4 (8.00%) Student does not
  • 6. demonstrate understanding of course content and knowledge 4 (8.00%) - 8 (16.00%) Student demonstrates some understanding of course content and knowledge. 9 (18.00%) - 12.5 (25.00%) Student demonstrates understand of course content and knowledge. Work Environment Application 0 (0.00%) - 4 (8.00%) Student does not demonstrate the practical application, or ability to apply, of course objectives within a work
  • 7. environment. 4 (8.00%) - 8 (16.00%) Student demonstrates some practical application, or ability to apply, of course objectives within a work environment. 9 (18.00%) - 12.5 (25.00%) Student strongly demonstrates the practical application, or ability to apply, of course objectives within a work environment. Name:Practical Connection Assignment Rubric ExitExit Executive Program Practical Connection Assignment At UC, it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and
  • 8. communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career. Assignment: Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. Requirements: Provide a 500 word (or 2 pages double spaced) minimum reflection. Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. Share a personal connection that identifies specific knowledge and theories from this course. Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained
  • 9. through meeting course objectives were applied or could be applied in the workplace. Note: A grading rubric for this assignment is attached Network Security, Firewalls, and VPNs Lesson 4 Network Security Implementation and Management © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Page ‹#› Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. 1 Virtual Lab Using Social Engineering Techniques to Plan an Attack Chapters 3, 11, 12
  • 10. Required Reading From Last Week… Page ‹#› Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. 8/20/2017 2 Learning Objective Describe network security implementation strategies and the roles each can play within the security life cycle Identify network security management best practices and strategies for responding when security measures fail Page ‹#› Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Key Concepts Why layered security strategies help mitigate risks, threats, and vulnerabilities Layering security to provide enhanced security for enterprise network resources Practices for hardening systems and networks against an attack
  • 11. Security is a process or life cycle that requires constant attention Identifying security concerns of local, remote, and mobile employees Page ‹#› Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Layered Security Security Policy Firewall IDS/IPS Vulnerability Assessments Antivirus Network Page ‹#› Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved.
  • 12. 8/20/2017 5 Layered Security in Action Known Exploit Targets Your Web Server Firewall—configured to allow Web traffic IDS—detects the exploit Vulnerability assessment—informs no action is needed because server is not vulnerable A Zero-Day Virus E-mailed to a User Firewall—configured to allow E-mail IDS—does not have signature for new virus Antivirus—Heuristic engine identifies possible virus-like activity Page ‹#› Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Concentric Castles Superior defense Two or more perimeter walls Outer wall Inner wall Collapsible defense Secure the keep Focus on perimeter security
  • 13. Page ‹#› Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. 8/20/2017 7 Network Security Application Page ‹#› Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. 8/20/2017 8 Network Security Application Similar to a DMZ Two or more firewalls External firewall Internal firewall Secure the internal network
  • 14. Layers of perimeter defense Page ‹#› Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. 8/20/2017 9 Improving Concentric Castles Relied upon walls as barriers to entry Add additional barriers Moats Add additional defenses Ranged defense Archers Vats of hot oil Melee defense Knights Swordsmen Page ‹#› Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. 8/20/2017 10
  • 15. Building Upon Layered Security Layered only provides breadth Depth=overlapping countermeasures at each layer Can be from multiple vendors If one is good two must be better Different AV patterns=higher chance for detection Page ‹#› Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. 8/20/2017 11 Desktop Antivirus from Vendor A E-mail Antivirus from Vendor B Antivirus Defense in Depth
  • 16. The Bigger Picture Page ‹#› Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. 8/20/2017 12 Firewall External Firewall from Vendor A Internal Firewall from Vendor B Antivirus Server AV Desktop AV IDS/IPS
  • 17. Network IDS Host IPS Public Addresses Finite number of addresses available Issued by Internet Assigned Numbers Authority (IANA) Controlled at the regional level by Regional Registry Entry Direct communication with the Internet Required for Internet-facing applications Page ‹#› Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. 8/20/2017 13 Private Addresses
  • 18. Reserved IP space Class A: 10.0.0.1-10.255.255.255 Class B: 172.16.0.0-172.31.255.255 Class C: 192.168.0.0-192.168.255.255 Can be reused on internal networks Isolated from Internet Need to use network address translation (NAT) to communicate with Internet Page ‹#› Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. 8/20/2017 14 Static Addressing Each system is configured with an address IP addresses managed at the device level Each system is guaranteed the same address Making changes can be cumbersome Page ‹#› Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. 8/20/2017
  • 19. 15 Dynamic Addressing Dynamic Host Control Protocol (DHCP) Requests IP address from centralized system Addresses leased for a set period of time Systems may acquire different address. Reservations for the same address can be made Addressing centrally controlled An attacker may be able to “borrow” an address Page ‹#› Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. 8/20/2017 16 Best Practices: Strategy Create written plans Security policy Incident response plan Business continuity plan (BCP) Disaster recovery plan (DRP) Security checklists Perform regular maintenance Back up regularly and test restores frequently Monitor and review collected log files frequently Constantly identify the weakest architectural link Page ‹#› Network Security, Firewalls, and VPNs
  • 20. © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Best Practices: Strategy (cont.) Perform diligent testing of new systems before deploying in production Implement the principle of least privilege Deploy layered defenses Page ‹#› Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Best Practices: Devices Maintain physical security over users and equipment Install and maintain virus and malware protection at all layers in the environment Harden both internal and perimeter devices Develop and follow a patch management strategy Enforce hard drive or file encryption Page ‹#› Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
  • 21. www.jblearning.com All rights reserved. Best Practices: Connectivity Restrict Internet connections to required activity Limit remote access to required connectivity Encrypt all internal network traffic Require multi-factor authentication Use default-deny over default-permit whenever possible Page ‹#› Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. User Training Q: What is user training? A: Educational information presented through various mechanisms that clearly defines security policies, their boundaries and imposed limitations Q: Why is user training important? A: Training drives user accountability, understanding, and acceptance of obligatory security policies It is imperative that regular renewal of security awareness training occurs Page ‹#› Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com
  • 22. All rights reserved. Security Awareness Page ‹#› Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. 8/20/2017 22 Security Awareness Defines Informs Explains Teaches
  • 23. Network Security Assessments Q: What is a network security assessment? A: The process of judging, testing, and evaluating a deployed security solution Page ‹#› Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Conducting Network Security Assessments Perform a risk assessment Execute the security assessment: Perform configuration scanning Perform vulnerability scanning Execute penetration testing Perform a post-mortem assessment review Page ‹#› Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Security Information and Event Monitoring (SIEM) A SIEM is a tool that allows for automation of log and event centralization and analysis Functions of a SIEM
  • 24. Log centralization Log management Log monitoring Purposes of a SIEM Incident detection Incident response and alerting Page ‹#› Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Commonly Available SIEM Tools Page ‹#› Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. enVision Qradar Eventia Security Manager
  • 25. nDepth Endpoint/Node Security Node is any device on the network; Endpoint is a device with an IP address Different types of nodes require different types of security Security of individual devices creates greater network security Roles involved in node security End-Users: acceptable use, security awareness System Admin: responsible for implementation Network Admin: responsible for networking devices Physical Security Staff: responsible for physical controls Page ‹#› Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Endpoint/Node Security Concerns Clients Antivirus scanner
  • 26. Firewall Screen lockout Physical lock Server Redundancy Strong authentication Physical isolation Page ‹#› Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Endpoint/Node Security Concerns (cont.) Networking devices (routers and switches) Strong authentication Accounting Physical isolation Page ‹#› Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Network Security Addressing
  • 27. Private/Public Static/Dynamic Topology Ring, Bus, Star, Line, Tree, Full Mesh, Partial Mesh Protocols Communication Outbound Inbound Redundancy Page ‹#› Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Physical Security Physical access bypasses many other controls. Critical devices should de stored is an isolated data center. Multifactor physical authentication Limit staff with access Fire suppression CCTV cameras where appropriate Compensating controls for mobile devices Encryption Anti-theft tracking software Page ‹#›
  • 28. Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Administrative Controls Corporate objectives Policies Procedures Standards Guidelines Training Awareness Page ‹#› Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Network Security: Key Components Primary objectives: confidentiality, integrity, availability Security policy Layered security + defense-in-depth Network design: protocols, topologies, addressing, and communication Equipment selection
  • 29. Page ‹#› Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Network Security: Key Components System hardening Authentication, authorization, and accounting Encryption Redundancy Endpoint security Page ‹#› Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Incident Response Team (IRT) Page ‹#› Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. 8/20/2017
  • 30. 35 Team Leader IS Members Network Admins Physical Sec Personnel Legal HR PR
  • 31. Incident Response Page ‹#› Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Preparation Detection Containment Eradication Recovery Follow-up
  • 32. Authentication Verification of identity Drivers license User name/password Most common Weakness of passwords Multifactor Something you know (password/pin) Something you have (security token/ATM card) Something you are/do (biometrics/behavioral based) Page ‹#› Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. 8/20/2017 37 Authorization Concerned with what one has access to do Least privileges Access to what one needs to complete job Typically occurs after authentication Example: purchasing beer Clerk checks ID verifies picture match (authentication) Checks DOB to see if > 21 (authorization) Page ‹#› Network Security, Firewalls, and VPNs
  • 33. © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Accounting Logging All attempts failed and successful Who, what, when Auditing Checking for compliance to ensure appropriate access Monitoring Looking for violations Checking for unauthorized access Page ‹#› Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Encryption Data at rest File encryption Database encryption Disk encryption Data in transit Ensures integrity, confidentiality, and privacy Nonrepudiation Encrypted tunnel: IPSec and SSL/TLS
  • 34. Page ‹#› Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. Compartmentalization and Containment Compartmentalization is an element of infrastructure design Creates small collectives of systems that support work tasks while minimizing risk Containment should interrupt or interfere with the continued spread or operation of the unwanted event Page ‹#› Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. 8/20/2017 41 Honeypots, Honeynets, and Padded Cells Honeypot traps intruders, detects new attacks, serves as a decoy
  • 35. Honeynet is a network of honeypots Padded cell is a form of a honeypot, turned on when an intruder is detected, acts as a lure Page ‹#› Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. 8/20/2017 42 Summary Why layered security strategies help mitigate risks, threats, and vulnerabilities Layering security to provide enhanced security for enterprise network resources Practices for hardening systems and networks against an attack Security as a process rather than as a goal Security is a process or life cycle that requires constant attention Page ‹#› Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com
  • 36. All rights reserved. Summary Best practices for network security management Strategies for integrating network security strategies with firewall defenses and VPN remote access Value of incident response planning, testing and practice Page ‹#› Network Security, Firewalls, and VPNs © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved. 8/20/2017 44 Virtual Lab No labs this week Chapters 5 & 6 NIST SP 800-61: Computer Security Incident Handling Guide MUST BE completed by Sunday, September, 24th by 11:59 PM! Required Reading Midterm Exam Page ‹#› Network Security, Firewalls, and VPNs
  • 37. © 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company www.jblearning.com All rights reserved.