SlideShare a Scribd company logo
Assignment Instructions
Instructions:
Note:
A 15 % or less originality score is required to be uploaded with
the paper prior to any grading.
Scenario
:
You are a Security professional hired by NextGard
Technologies in Phoenix, AZ to provide a Windows security
implementation model for their organization. NextGard
specializes in network consulting services for US companies
and they want to upgrade and secure their current network.
NextGard has 250,000 employees in 5 countries. The Phoenix
office operates as the NextGard Corporate headquarters.
Currently there are five district offices:
• Atlanta, Georgia
• Bangalore, India
• Los Angeles, California
• Montreal, Canada
• New York City, New York
The district offices have satellite employees that have a
combination of desktops, mobile computers and wireless
devices. There is a mix of computers running Windows 2000,
XP, Windows Vista and Windows 7. There is a Windows Active
Directory forest with domains set up for each office and seven
file and print servers which are located in the Phoenix office.
The Phoenix office also contains two proxy servers, configured
as an array, that provide Web cache services and Internet access
control for the organization since the majority of applications
are web-based and hosted from the Phoenix office.
There are also several Microsoft applications that all employees
within a region use that are hosted in the regional offices.
All employees have Internet access so they can browse the web.
Tasks
(Paper Sections):
For the assigned project, you are to submit a proposal for the
management of NextGard.
In the proposal, you must address the following:
Research solutions and detail the appropriate Microsoft
Windows access controls including policies, standards and
procedures that define who users are, what they can do, which
resources they can access, and what operations they can perform
on a system.
Research and detail the cryptography methods to protect
organizational information using techniques that ensure its
integrity, confidentiality, authenticity and non-repudiation, and
the recovery of encrypted information in its original form.
Research and devise a plan to thwart malicious code and
activity by implementing countermeasures and prevention
techniques for dealing with viruses, worms, logic bombs, Trojan
horses and other related forms of intentionally created deviant
code.
Research and formulate a plan to implement monitoring and
analysis by determining system implementation and access as
well as an incident response plan for security breaches or
events.
Research and detail security guidelines for contains the two
proxy servers and Internet access control for the organization
Research and define best practices for the security of
NextGard’s organization.
Conclusion summarizing your findings and recommendations
for the reader.
The Network topology must include all of the sites and
the network infrastructure required to provide the services
described in the Final Project Scenario in the section above
Submission Instructions:
An in-depth submission that is free of spelling and grammar
errors in APA format.
A minimum of 8 pages documenting your research on the
subject and contain a drawing of your design.
Double-spaced format (APA) with a readable style and font and
submitted inside the electronic classroom (unless classroom
access is not possible and other arrangements have been
approved by the professor).
Arial 11 or 12-point font or Times New Roman styles.
Page margins Top, Bottom, Left Side and Right Side = 1 inch,
with reasonable accommodation being made for special
situations and online submission variances
Important:
Good academic writing requires writers to cite the sources of
all facts in text. If you state that the sky is blue then you must
cite who said it. A good rule of thumb is one citation per
paragraph; paragraphs 3-5 sentences (
This is how to avoid unintentional plagiarism
). Papers are always written in third person past tense as you
are writing about events in the past from the point of view of an
observer. The student or writer proposed; One must observe;
The leaders at APUS choose the following systems....for the
following reasons:

More Related Content

Similar to Assignment InstructionsInstructionsNote A 15 or less origi.docx

Designing Compliance within the LAN-to-WAN DomainNote Rev
Designing Compliance within the LAN-to-WAN DomainNote RevDesigning Compliance within the LAN-to-WAN DomainNote Rev
Designing Compliance within the LAN-to-WAN DomainNote Rev
emersonpearline
 
Assignment 4 Designing Compliance within the LAN-to-WAN DomainD.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainD.docxAssignment 4 Designing Compliance within the LAN-to-WAN DomainD.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainD.docx
astonrenna
 
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docxAssignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
eleanorabarrington
 
Assignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
Assignment 4 Designing Compliance within the LAN-to-WAN Domain.docxAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
Assignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
luearsome
 
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and woerm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
eleanorabarrington
 
Mister Network Engineer Due Week 8 and worth 70 points Using the.docx
Mister Network Engineer Due Week 8 and worth 70 points Using the.docxMister Network Engineer Due Week 8 and worth 70 points Using the.docx
Mister Network Engineer Due Week 8 and worth 70 points Using the.docx
jacmariek5
 
Write a 1-page summary for each topic listed below1. Scripting.docx
Write a 1-page summary for each topic listed below1. Scripting.docxWrite a 1-page summary for each topic listed below1. Scripting.docx
Write a 1-page summary for each topic listed below1. Scripting.docx
ambersalomon88660
 
CIS 341 Success Begins / snaptutorial.com
CIS 341 Success Begins / snaptutorial.comCIS 341 Success Begins / snaptutorial.com
CIS 341 Success Begins / snaptutorial.com
Robinson070
 
Cis 341 Enthusiastic Study - snaptutorial.com
Cis 341 Enthusiastic Study - snaptutorial.comCis 341 Enthusiastic Study - snaptutorial.com
Cis 341 Enthusiastic Study - snaptutorial.com
GeorgeDixon100
 
Cis 341 Technology levels--snaptutorial.com
Cis 341 Technology levels--snaptutorial.comCis 341 Technology levels--snaptutorial.com
Cis 341 Technology levels--snaptutorial.com
sholingarjosh56
 
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docxAssignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
astonrenna
 
Cis 534 Technology levels--snaptutorial.com
Cis 534 Technology levels--snaptutorial.comCis 534 Technology levels--snaptutorial.com
Cis 534 Technology levels--snaptutorial.com
sholingarjosh62
 
Cis 534 Enthusiastic Study / snaptutorial.com
Cis 534 Enthusiastic Study / snaptutorial.comCis 534 Enthusiastic Study / snaptutorial.com
Cis 534 Enthusiastic Study / snaptutorial.com
Stephenson05
 
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docxTerm Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
manningchassidy
 
1. Final Project - This project provides you an opportunity to sol
1. Final Project - This project provides you an opportunity to sol1. Final Project - This project provides you an opportunity to sol
1. Final Project - This project provides you an opportunity to sol
TatianaMajor22
 
Cis 436 Technology levels--snaptutorial.com
Cis 436 Technology levels--snaptutorial.comCis 436 Technology levels--snaptutorial.com
Cis 436 Technology levels--snaptutorial.com
sholingarjosh61
 
Cis 436 Enthusiastic Study / snaptutorial.com
Cis 436 Enthusiastic Study / snaptutorial.comCis 436 Enthusiastic Study / snaptutorial.com
Cis 436 Enthusiastic Study / snaptutorial.com
Stephenson03
 
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docxAssignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
carlibradley31429
 
Assignment mister network engineer.docx
Assignment mister network engineer.docxAssignment mister network engineer.docx
Assignment mister network engineer.docx
studywriters
 
Cis 175/tutorialoutlet
Cis 175/tutorialoutletCis 175/tutorialoutlet
Cis 175/tutorialoutlet
Patmorez
 

Similar to Assignment InstructionsInstructionsNote A 15 or less origi.docx (20)

Designing Compliance within the LAN-to-WAN DomainNote Rev
Designing Compliance within the LAN-to-WAN DomainNote RevDesigning Compliance within the LAN-to-WAN DomainNote Rev
Designing Compliance within the LAN-to-WAN DomainNote Rev
 
Assignment 4 Designing Compliance within the LAN-to-WAN DomainD.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainD.docxAssignment 4 Designing Compliance within the LAN-to-WAN DomainD.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainD.docx
 
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docxAssignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
 
Assignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
Assignment 4 Designing Compliance within the LAN-to-WAN Domain.docxAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
Assignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
 
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and woerm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
 
Mister Network Engineer Due Week 8 and worth 70 points Using the.docx
Mister Network Engineer Due Week 8 and worth 70 points Using the.docxMister Network Engineer Due Week 8 and worth 70 points Using the.docx
Mister Network Engineer Due Week 8 and worth 70 points Using the.docx
 
Write a 1-page summary for each topic listed below1. Scripting.docx
Write a 1-page summary for each topic listed below1. Scripting.docxWrite a 1-page summary for each topic listed below1. Scripting.docx
Write a 1-page summary for each topic listed below1. Scripting.docx
 
CIS 341 Success Begins / snaptutorial.com
CIS 341 Success Begins / snaptutorial.comCIS 341 Success Begins / snaptutorial.com
CIS 341 Success Begins / snaptutorial.com
 
Cis 341 Enthusiastic Study - snaptutorial.com
Cis 341 Enthusiastic Study - snaptutorial.comCis 341 Enthusiastic Study - snaptutorial.com
Cis 341 Enthusiastic Study - snaptutorial.com
 
Cis 341 Technology levels--snaptutorial.com
Cis 341 Technology levels--snaptutorial.comCis 341 Technology levels--snaptutorial.com
Cis 341 Technology levels--snaptutorial.com
 
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docxAssignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
 
Cis 534 Technology levels--snaptutorial.com
Cis 534 Technology levels--snaptutorial.comCis 534 Technology levels--snaptutorial.com
Cis 534 Technology levels--snaptutorial.com
 
Cis 534 Enthusiastic Study / snaptutorial.com
Cis 534 Enthusiastic Study / snaptutorial.comCis 534 Enthusiastic Study / snaptutorial.com
Cis 534 Enthusiastic Study / snaptutorial.com
 
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docxTerm Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
 
1. Final Project - This project provides you an opportunity to sol
1. Final Project - This project provides you an opportunity to sol1. Final Project - This project provides you an opportunity to sol
1. Final Project - This project provides you an opportunity to sol
 
Cis 436 Technology levels--snaptutorial.com
Cis 436 Technology levels--snaptutorial.comCis 436 Technology levels--snaptutorial.com
Cis 436 Technology levels--snaptutorial.com
 
Cis 436 Enthusiastic Study / snaptutorial.com
Cis 436 Enthusiastic Study / snaptutorial.comCis 436 Enthusiastic Study / snaptutorial.com
Cis 436 Enthusiastic Study / snaptutorial.com
 
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docxAssignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
 
Assignment mister network engineer.docx
Assignment mister network engineer.docxAssignment mister network engineer.docx
Assignment mister network engineer.docx
 
Cis 175/tutorialoutlet
Cis 175/tutorialoutletCis 175/tutorialoutlet
Cis 175/tutorialoutlet
 

More from AMMY30

After reviewing the Coleman (2016) article on executive compensation.docx
After reviewing the Coleman (2016) article on executive compensation.docxAfter reviewing the Coleman (2016) article on executive compensation.docx
After reviewing the Coleman (2016) article on executive compensation.docx
AMMY30
 
After reviewing the chapter on Recognizing Contributions, perform .docx
After reviewing the chapter on Recognizing Contributions, perform .docxAfter reviewing the chapter on Recognizing Contributions, perform .docx
After reviewing the chapter on Recognizing Contributions, perform .docx
AMMY30
 
After reviewing the chapter on Recognizing Contributions, perform a .docx
After reviewing the chapter on Recognizing Contributions, perform a .docxAfter reviewing the chapter on Recognizing Contributions, perform a .docx
After reviewing the chapter on Recognizing Contributions, perform a .docx
AMMY30
 
After reviewing the background materials and doing your own research.docx
After reviewing the background materials and doing your own research.docxAfter reviewing the background materials and doing your own research.docx
After reviewing the background materials and doing your own research.docx
AMMY30
 
After reviewing the articles and videos, please address the followin.docx
After reviewing the articles and videos, please address the followin.docxAfter reviewing the articles and videos, please address the followin.docx
After reviewing the articles and videos, please address the followin.docx
AMMY30
 
After reviewing Georgia v. Randolph and Fernandez v. Californi.docx
After reviewing Georgia v. Randolph and Fernandez v. Californi.docxAfter reviewing Georgia v. Randolph and Fernandez v. Californi.docx
After reviewing Georgia v. Randolph and Fernandez v. Californi.docx
AMMY30
 
After reviewing chapter 11 of the E-Text and the Required Resources .docx
After reviewing chapter 11 of the E-Text and the Required Resources .docxAfter reviewing chapter 11 of the E-Text and the Required Resources .docx
After reviewing chapter 11 of the E-Text and the Required Resources .docx
AMMY30
 
After reading Library ArticlesDevine, K., Kloppenborg, .docx
After reading Library ArticlesDevine, K., Kloppenborg, .docxAfter reading Library ArticlesDevine, K., Kloppenborg, .docx
After reading Library ArticlesDevine, K., Kloppenborg, .docx
AMMY30
 
After reading Trifles by Susan Glaspell complete the following works.docx
After reading Trifles by Susan Glaspell complete the following works.docxAfter reading Trifles by Susan Glaspell complete the following works.docx
After reading Trifles by Susan Glaspell complete the following works.docx
AMMY30
 
After reading through Chapter 1, the focus was on targeting the five.docx
After reading through Chapter 1, the focus was on targeting the five.docxAfter reading through Chapter 1, the focus was on targeting the five.docx
After reading through Chapter 1, the focus was on targeting the five.docx
AMMY30
 
After reading There Is No Unmarked Woman, by Deborah Tannen, a.docx
After reading There Is No Unmarked Woman, by Deborah Tannen, a.docxAfter reading There Is No Unmarked Woman, by Deborah Tannen, a.docx
After reading There Is No Unmarked Woman, by Deborah Tannen, a.docx
AMMY30
 
After reading the U.S. Constitution and the Amendments respond t.docx
After reading the U.S. Constitution and the Amendments respond t.docxAfter reading the U.S. Constitution and the Amendments respond t.docx
After reading the U.S. Constitution and the Amendments respond t.docx
AMMY30
 
After reading the two short primary source documents listed below, c.docx
After reading the two short primary source documents listed below, c.docxAfter reading the two short primary source documents listed below, c.docx
After reading the two short primary source documents listed below, c.docx
AMMY30
 
After reading the section titled Dominant Microprocessor Company In.docx
After reading the section titled Dominant Microprocessor Company In.docxAfter reading the section titled Dominant Microprocessor Company In.docx
After reading the section titled Dominant Microprocessor Company In.docx
AMMY30
 
After reading the section titled Dominant Microprocessor Compan.docx
After reading the section titled Dominant Microprocessor Compan.docxAfter reading the section titled Dominant Microprocessor Compan.docx
After reading the section titled Dominant Microprocessor Compan.docx
AMMY30
 
After reading the paper for this week, Steinfield C, LaRose R, C.docx
After reading the paper for this week, Steinfield C, LaRose R, C.docxAfter reading the paper for this week, Steinfield C, LaRose R, C.docx
After reading the paper for this week, Steinfield C, LaRose R, C.docx
AMMY30
 
After reading the Martin Luther King, Jr. speech in the attached lin.docx
After reading the Martin Luther King, Jr. speech in the attached lin.docxAfter reading the Martin Luther King, Jr. speech in the attached lin.docx
After reading the Martin Luther King, Jr. speech in the attached lin.docx
AMMY30
 
After reading the material from Shafer-Landau concerning the appeal .docx
After reading the material from Shafer-Landau concerning the appeal .docxAfter reading the material from Shafer-Landau concerning the appeal .docx
After reading the material from Shafer-Landau concerning the appeal .docx
AMMY30
 
After reading the IMAA article this week on Effective Manageme.docx
After reading the IMAA article this week on Effective Manageme.docxAfter reading the IMAA article this week on Effective Manageme.docx
After reading the IMAA article this week on Effective Manageme.docx
AMMY30
 
After reading the essay, Why Rational People Buy into Conspiracy Th.docx
After reading the essay, Why Rational People Buy into Conspiracy Th.docxAfter reading the essay, Why Rational People Buy into Conspiracy Th.docx
After reading the essay, Why Rational People Buy into Conspiracy Th.docx
AMMY30
 

More from AMMY30 (20)

After reviewing the Coleman (2016) article on executive compensation.docx
After reviewing the Coleman (2016) article on executive compensation.docxAfter reviewing the Coleman (2016) article on executive compensation.docx
After reviewing the Coleman (2016) article on executive compensation.docx
 
After reviewing the chapter on Recognizing Contributions, perform .docx
After reviewing the chapter on Recognizing Contributions, perform .docxAfter reviewing the chapter on Recognizing Contributions, perform .docx
After reviewing the chapter on Recognizing Contributions, perform .docx
 
After reviewing the chapter on Recognizing Contributions, perform a .docx
After reviewing the chapter on Recognizing Contributions, perform a .docxAfter reviewing the chapter on Recognizing Contributions, perform a .docx
After reviewing the chapter on Recognizing Contributions, perform a .docx
 
After reviewing the background materials and doing your own research.docx
After reviewing the background materials and doing your own research.docxAfter reviewing the background materials and doing your own research.docx
After reviewing the background materials and doing your own research.docx
 
After reviewing the articles and videos, please address the followin.docx
After reviewing the articles and videos, please address the followin.docxAfter reviewing the articles and videos, please address the followin.docx
After reviewing the articles and videos, please address the followin.docx
 
After reviewing Georgia v. Randolph and Fernandez v. Californi.docx
After reviewing Georgia v. Randolph and Fernandez v. Californi.docxAfter reviewing Georgia v. Randolph and Fernandez v. Californi.docx
After reviewing Georgia v. Randolph and Fernandez v. Californi.docx
 
After reviewing chapter 11 of the E-Text and the Required Resources .docx
After reviewing chapter 11 of the E-Text and the Required Resources .docxAfter reviewing chapter 11 of the E-Text and the Required Resources .docx
After reviewing chapter 11 of the E-Text and the Required Resources .docx
 
After reading Library ArticlesDevine, K., Kloppenborg, .docx
After reading Library ArticlesDevine, K., Kloppenborg, .docxAfter reading Library ArticlesDevine, K., Kloppenborg, .docx
After reading Library ArticlesDevine, K., Kloppenborg, .docx
 
After reading Trifles by Susan Glaspell complete the following works.docx
After reading Trifles by Susan Glaspell complete the following works.docxAfter reading Trifles by Susan Glaspell complete the following works.docx
After reading Trifles by Susan Glaspell complete the following works.docx
 
After reading through Chapter 1, the focus was on targeting the five.docx
After reading through Chapter 1, the focus was on targeting the five.docxAfter reading through Chapter 1, the focus was on targeting the five.docx
After reading through Chapter 1, the focus was on targeting the five.docx
 
After reading There Is No Unmarked Woman, by Deborah Tannen, a.docx
After reading There Is No Unmarked Woman, by Deborah Tannen, a.docxAfter reading There Is No Unmarked Woman, by Deborah Tannen, a.docx
After reading There Is No Unmarked Woman, by Deborah Tannen, a.docx
 
After reading the U.S. Constitution and the Amendments respond t.docx
After reading the U.S. Constitution and the Amendments respond t.docxAfter reading the U.S. Constitution and the Amendments respond t.docx
After reading the U.S. Constitution and the Amendments respond t.docx
 
After reading the two short primary source documents listed below, c.docx
After reading the two short primary source documents listed below, c.docxAfter reading the two short primary source documents listed below, c.docx
After reading the two short primary source documents listed below, c.docx
 
After reading the section titled Dominant Microprocessor Company In.docx
After reading the section titled Dominant Microprocessor Company In.docxAfter reading the section titled Dominant Microprocessor Company In.docx
After reading the section titled Dominant Microprocessor Company In.docx
 
After reading the section titled Dominant Microprocessor Compan.docx
After reading the section titled Dominant Microprocessor Compan.docxAfter reading the section titled Dominant Microprocessor Compan.docx
After reading the section titled Dominant Microprocessor Compan.docx
 
After reading the paper for this week, Steinfield C, LaRose R, C.docx
After reading the paper for this week, Steinfield C, LaRose R, C.docxAfter reading the paper for this week, Steinfield C, LaRose R, C.docx
After reading the paper for this week, Steinfield C, LaRose R, C.docx
 
After reading the Martin Luther King, Jr. speech in the attached lin.docx
After reading the Martin Luther King, Jr. speech in the attached lin.docxAfter reading the Martin Luther King, Jr. speech in the attached lin.docx
After reading the Martin Luther King, Jr. speech in the attached lin.docx
 
After reading the material from Shafer-Landau concerning the appeal .docx
After reading the material from Shafer-Landau concerning the appeal .docxAfter reading the material from Shafer-Landau concerning the appeal .docx
After reading the material from Shafer-Landau concerning the appeal .docx
 
After reading the IMAA article this week on Effective Manageme.docx
After reading the IMAA article this week on Effective Manageme.docxAfter reading the IMAA article this week on Effective Manageme.docx
After reading the IMAA article this week on Effective Manageme.docx
 
After reading the essay, Why Rational People Buy into Conspiracy Th.docx
After reading the essay, Why Rational People Buy into Conspiracy Th.docxAfter reading the essay, Why Rational People Buy into Conspiracy Th.docx
After reading the essay, Why Rational People Buy into Conspiracy Th.docx
 

Recently uploaded

How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 

Recently uploaded (20)

How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 

Assignment InstructionsInstructionsNote A 15 or less origi.docx

  • 1. Assignment Instructions Instructions: Note: A 15 % or less originality score is required to be uploaded with the paper prior to any grading. Scenario : You are a Security professional hired by NextGard Technologies in Phoenix, AZ to provide a Windows security implementation model for their organization. NextGard specializes in network consulting services for US companies and they want to upgrade and secure their current network. NextGard has 250,000 employees in 5 countries. The Phoenix office operates as the NextGard Corporate headquarters. Currently there are five district offices: • Atlanta, Georgia • Bangalore, India • Los Angeles, California • Montreal, Canada • New York City, New York The district offices have satellite employees that have a combination of desktops, mobile computers and wireless devices. There is a mix of computers running Windows 2000, XP, Windows Vista and Windows 7. There is a Windows Active Directory forest with domains set up for each office and seven file and print servers which are located in the Phoenix office. The Phoenix office also contains two proxy servers, configured as an array, that provide Web cache services and Internet access control for the organization since the majority of applications are web-based and hosted from the Phoenix office.
  • 2. There are also several Microsoft applications that all employees within a region use that are hosted in the regional offices. All employees have Internet access so they can browse the web. Tasks (Paper Sections): For the assigned project, you are to submit a proposal for the management of NextGard. In the proposal, you must address the following: Research solutions and detail the appropriate Microsoft Windows access controls including policies, standards and procedures that define who users are, what they can do, which resources they can access, and what operations they can perform on a system. Research and detail the cryptography methods to protect organizational information using techniques that ensure its integrity, confidentiality, authenticity and non-repudiation, and the recovery of encrypted information in its original form. Research and devise a plan to thwart malicious code and activity by implementing countermeasures and prevention techniques for dealing with viruses, worms, logic bombs, Trojan horses and other related forms of intentionally created deviant code. Research and formulate a plan to implement monitoring and analysis by determining system implementation and access as well as an incident response plan for security breaches or events. Research and detail security guidelines for contains the two proxy servers and Internet access control for the organization Research and define best practices for the security of NextGard’s organization. Conclusion summarizing your findings and recommendations for the reader. The Network topology must include all of the sites and the network infrastructure required to provide the services
  • 3. described in the Final Project Scenario in the section above Submission Instructions: An in-depth submission that is free of spelling and grammar errors in APA format. A minimum of 8 pages documenting your research on the subject and contain a drawing of your design. Double-spaced format (APA) with a readable style and font and submitted inside the electronic classroom (unless classroom access is not possible and other arrangements have been approved by the professor). Arial 11 or 12-point font or Times New Roman styles. Page margins Top, Bottom, Left Side and Right Side = 1 inch, with reasonable accommodation being made for special situations and online submission variances Important: Good academic writing requires writers to cite the sources of all facts in text. If you state that the sky is blue then you must cite who said it. A good rule of thumb is one citation per paragraph; paragraphs 3-5 sentences ( This is how to avoid unintentional plagiarism ). Papers are always written in third person past tense as you are writing about events in the past from the point of view of an observer. The student or writer proposed; One must observe; The leaders at APUS choose the following systems....for the following reasons: