SlideShare a Scribd company logo
1 of 6
Oftentimes, the process of implementing security opens one’s
eyes to other forms of security they hadn’t thought of
previously. Well, in this assignment you should experience just
that. This assignment focuses on a model of implementing
security in layers which in many cases requires a network that is
designed accordingly. In this assignment, you are to design a
network to incorporate the following:
Corporate Site (Chicago)
All servers exist here (Web server, file server, print server, mail
server, ftp server)
Connection to the Internet (50mbps)
300 employees who only need access to local corporate
resources and the Internet
1 Remote Site (8 miles away)
20 employees who need access to all resources at corporate
plus the Internet
Connection to the Internet (3mbps)
Write a four to five (4-5) page paper in which you:
Using Microsoft Visio or its open source alternative, design a
network diagram, particularly with defense in depth in mind
which depicts:
All network devices used (routers, switches, hubs, firewalls,
VPNs, proxies, and / or others)
The interconnections between network devices
The end user (client) devices (desktops, laptops)
The Internet cloud, generically, to represent your network’s
interface to the Internet
Note: The graphically depicted solution is not included in the
required page length.
Describe the flow of data through your network, and explain
how your network design provides multiple layers of security.
Use at least three (3) quality resources in this assignment. Note:
Wikipedia and similar Websites do not qualify as quality
resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size
12), with one-inch margins on all sides; citations and references
must follow APA or school-specific format. Check with your
professor for any additional instructions.
Include a cover page containing the title of the assignment, the
student’s name, the professor’s name, the course title, and the
date. The cover page and the reference page are not included in
the required assignment page length.
Include charts or diagrams created in Visio or an equivalent
such as Dia. The completed diagrams / charts must be imported
into the Word document before the paper is submitted.
The specific course learning outcomes associated with this
assignment are:
Explain the essentials of Transmission Control Protocol /
Internet Protocol (TCP / IP) behavior and applications used in
IP networking.
Identify network security tools and discuss techniques for
network protection.
Use technology and information resources to research issues in
network security design.
Write clearly and concisely about Advanced Network Security
Design topics using proper writing mechanics and technical
style conventions.
Points: 70
Assignment 1: Defense in Depth
Criteria
Unacceptable
Below 70% F
Fair
70-79% C
Proficient
80-89% B
Exemplary
90-100% A
1a. Using Microsoft Visio or its open source alternative, design
a network diagram, particularly with defense in depth in mind
which depicts all network devices used (routers, switches, hubs,
firewalls, VPNs, proxies, and / or others).
Weight: 30%
Did not submit or incompletely used Microsoft Visio or its open
source alternative, to design a network diagram, particularly
with defense in depth in mind which depicts all network devices
used (routers, switches, hubs, firewalls, VPNs, proxies, and / or
others).
Partially used Microsoft Visio or its open source alternative, to
design a network diagram, particularly with defense in depth in
mind which depicts all network devices used (routers, switches,
hubs, firewalls, VPNs, proxies, and / or others).
Satisfactorily used Microsoft Visio or its open source
alternative, to design a network diagram, particularly with
defense in depth in mind which depicts all network devices used
(routers, switches, hubs, firewalls, VPNs, proxies, and / or
others).
Thoroughly used Microsoft Visio or its open source alternative,
to design a network diagram, particularly with defense in depth
in mind which depicts all network devices used (routers,
switches, hubs, firewalls, VPNs, proxies, and / or others).
1b. Using Microsoft Visio or its open source alternative, design
a network diagram, particularly with defense in depth in mind
which depicts the interconnections between network devices.
Weight: 10%
Did not submit or incompletely used Microsoft Visio or its open
source alternative, to design a network diagram, particularly
with defense in depth in mind which depicts the
interconnections between network devices.
Partially used Microsoft Visio or its open source alternative, to
design a network diagram, particularly with defense in depth in
mind which depicts the interconnections between network
devices.
Satisfactorily used Microsoft Visio or its open source
alternative, to design a network diagram, particularly with
defense in depth in mind which depicts the interconnections
between network devices.
Thoroughly used Microsoft Visio or its open source alternative,
to design a network diagram, particularly with defense in depth
in mind which depicts the interconnections between network
devices.
1c. Using Microsoft Visio or its open source alternative, design
a network diagram, particularly with defense in depth in mind
which depicts the end user (client) devices (desktops, laptops).
Weight: 5%
Did not submit or incompletely used Microsoft Visio or its open
source alternative, to design a network diagram, particularly
with defense in depth in mind which depicts the end user
(client) devices (desktops, laptops).
Partially used Microsoft Visio or its open source alternative, to
design a network diagram, particularly with defense in depth in
mind which depicts the end user (client) devices (desktops,
laptops).
Satisfactorily used Microsoft Visio or its open source
alternative, to design a network diagram, particularly with
defense in depth in mind which depicts the end user (client)
devices (desktops, laptops).
Thoroughly used Microsoft Visio or its open source alternative,
to design a network diagram, particularly with defense in depth
in mind which depicts the end user (client) devices (desktops,
laptops).
1d. Using Microsoft Visio or its open source alternative, design
a network diagram, particularly with defense in depth in mind
which depicts the Internet cloud, generically, to represent your
network’s interface to the Internet.
Weight: 5%
Did not submit or incompletely used Microsoft Visio or its open
source alternative, to design a network diagram, particularly
with defense in depth in mind which depicts the Internet cloud,
generically, to represent your network’s interface to the
Internet.
Partially used Microsoft Visio or its open source alternative, to
design a network diagram, particularly with defense in depth in
mind which depicts the Internet cloud, generically, to represent
your network’s interface to the Internet.
Satisfactorily used Microsoft Visio or its open source
alternative, to design a network diagram, particularly with
defense in depth in mind which depicts the Internet cloud,
generically, to represent your network’s interface to the
Internet.
Thoroughly used Microsoft Visio or its open source alternative,
to design a network diagram, particularly with defense in depth
in mind which depicts the Internet cloud, generically, to
represent your network’s interface to the Internet.
2. Describe the flow of data through your network, and explain
how your network design provides multiple layers of security.
Weight: 35%
Did not submit or incompletely described the flow of data
through your network. Did not submit or incompletely explained
how your network design provides multiple layers of security.
Partially described the flow of data through your network.
Partially explained how your network design provides multiple
layers of security.
Satisfactorily described the flow of data through your network.
Satisfactorily explained how your network design provides
multiple layers of security.
Thoroughly described the flow of data through your network.
Thoroughly explained how your network design provides
multiple layers of security.
3. 3 references
Weight: 5%
No references provided
Does not meet the required number of references; some or all
references poor quality choices.
Meets number of required references; all references high quality
choices.
Exceeds number of required references; all references high
quality choices.
4. Clarity, writing mechanics, and formatting requirements
Weight: 10%
More than 6 errors present
5-6 errors present
3-4 errors present
0-2 errors present

More Related Content

Similar to Oftentimes, the process of implementing security opens one’s eyes to.docx

Cyb 360 cyb360 cyb 360 best tutorials guide uopstudy.com
Cyb 360 cyb360 cyb 360 best tutorials guide  uopstudy.comCyb 360 cyb360 cyb 360 best tutorials guide  uopstudy.com
Cyb 360 cyb360 cyb 360 best tutorials guide uopstudy.comUOPCourseHelp
 
Cyb 360 cyb360 cyb 360 education for service uopstudy.com
Cyb 360 cyb360 cyb 360 education for service   uopstudy.comCyb 360 cyb360 cyb 360 education for service   uopstudy.com
Cyb 360 cyb360 cyb 360 education for service uopstudy.comUOPCourseHelp
 
Project Deliverable 5 Infrastructure and SecurityThis assignm.docx
Project Deliverable 5 Infrastructure and SecurityThis assignm.docxProject Deliverable 5 Infrastructure and SecurityThis assignm.docx
Project Deliverable 5 Infrastructure and SecurityThis assignm.docxwoodruffeloisa
 
CIS 534 Life of the Mind/newtonhelp.com   
CIS 534 Life of the Mind/newtonhelp.com   CIS 534 Life of the Mind/newtonhelp.com   
CIS 534 Life of the Mind/newtonhelp.com   bellflower9
 
Need help writing term paper.  Posted previously with different due .docx
Need help writing term paper.  Posted previously with different due .docxNeed help writing term paper.  Posted previously with different due .docx
Need help writing term paper.  Posted previously with different due .docxdarwinming1
 
This term paper involves putting together the various concepts l
This term paper involves putting together the various concepts lThis term paper involves putting together the various concepts l
This term paper involves putting together the various concepts lrochellwa9f
 
Stayer cis 513 week 10 term paper wireless deployment plan new
Stayer cis 513 week 10 term paper wireless deployment plan newStayer cis 513 week 10 term paper wireless deployment plan new
Stayer cis 513 week 10 term paper wireless deployment plan newshyaminfo30
 
Stayer cis-513-week-10-term-paper-wireless-deployment-plan-new
Stayer cis-513-week-10-term-paper-wireless-deployment-plan-newStayer cis-513-week-10-term-paper-wireless-deployment-plan-new
Stayer cis-513-week-10-term-paper-wireless-deployment-plan-newavengersendgame208
 
This term paper involves putting together the various concepts learn.docx
This term paper involves putting together the various concepts learn.docxThis term paper involves putting together the various concepts learn.docx
This term paper involves putting together the various concepts learn.docxdivinapavey
 
Cis 513 week 10 term paper – strayer new
Cis 513 week 10 term paper – strayer newCis 513 week 10 term paper – strayer new
Cis 513 week 10 term paper – strayer newCarolMurray2018
 
Cis 513 week 10 term paper – strayer new
Cis 513 week 10 term paper – strayer newCis 513 week 10 term paper – strayer new
Cis 513 week 10 term paper – strayer newmariajackson2018
 
Cis 513 week 10 term paper – strayer new
Cis 513 week 10 term paper – strayer newCis 513 week 10 term paper – strayer new
Cis 513 week 10 term paper – strayer newEmeliaJackson2017
 
Cis 513 week 10 term paper – strayer new
Cis 513 week 10 term paper – strayer newCis 513 week 10 term paper – strayer new
Cis 513 week 10 term paper – strayer newAmyBell2017
 
Term Paper Project Designing a Secure NetworkDue Week 10 and wo.docx
Term Paper Project Designing a Secure NetworkDue Week 10 and wo.docxTerm Paper Project Designing a Secure NetworkDue Week 10 and wo.docx
Term Paper Project Designing a Secure NetworkDue Week 10 and wo.docxmanningchassidy
 
Strayer cis 513 week 10 term paper wireless deployment plan new
Strayer cis 513 week 10 term paper wireless deployment plan newStrayer cis 513 week 10 term paper wireless deployment plan new
Strayer cis 513 week 10 term paper wireless deployment plan newHaashimm
 
Stayer cis 513 week 10 term paper wireless deployment plan new
Stayer cis 513 week 10 term paper wireless deployment plan newStayer cis 513 week 10 term paper wireless deployment plan new
Stayer cis 513 week 10 term paper wireless deployment plan newaaronabrahhaam
 
Cis 436 Technology levels--snaptutorial.com
Cis 436 Technology levels--snaptutorial.comCis 436 Technology levels--snaptutorial.com
Cis 436 Technology levels--snaptutorial.comsholingarjosh61
 
Cis 436 Enthusiastic Study / snaptutorial.com
Cis 436 Enthusiastic Study / snaptutorial.comCis 436 Enthusiastic Study / snaptutorial.com
Cis 436 Enthusiastic Study / snaptutorial.comStephenson03
 
Using the network diagram located in attachment,  incorporate into t
Using the network diagram located in attachment,  incorporate into tUsing the network diagram located in attachment,  incorporate into t
Using the network diagram located in attachment,  incorporate into theiditownend
 
Strayer cis 513 week 10 term paper wireless deployment plan new
Strayer cis 513 week 10 term paper wireless deployment plan newStrayer cis 513 week 10 term paper wireless deployment plan new
Strayer cis 513 week 10 term paper wireless deployment plan newIsabeedd
 

Similar to Oftentimes, the process of implementing security opens one’s eyes to.docx (20)

Cyb 360 cyb360 cyb 360 best tutorials guide uopstudy.com
Cyb 360 cyb360 cyb 360 best tutorials guide  uopstudy.comCyb 360 cyb360 cyb 360 best tutorials guide  uopstudy.com
Cyb 360 cyb360 cyb 360 best tutorials guide uopstudy.com
 
Cyb 360 cyb360 cyb 360 education for service uopstudy.com
Cyb 360 cyb360 cyb 360 education for service   uopstudy.comCyb 360 cyb360 cyb 360 education for service   uopstudy.com
Cyb 360 cyb360 cyb 360 education for service uopstudy.com
 
Project Deliverable 5 Infrastructure and SecurityThis assignm.docx
Project Deliverable 5 Infrastructure and SecurityThis assignm.docxProject Deliverable 5 Infrastructure and SecurityThis assignm.docx
Project Deliverable 5 Infrastructure and SecurityThis assignm.docx
 
CIS 534 Life of the Mind/newtonhelp.com   
CIS 534 Life of the Mind/newtonhelp.com   CIS 534 Life of the Mind/newtonhelp.com   
CIS 534 Life of the Mind/newtonhelp.com   
 
Need help writing term paper.  Posted previously with different due .docx
Need help writing term paper.  Posted previously with different due .docxNeed help writing term paper.  Posted previously with different due .docx
Need help writing term paper.  Posted previously with different due .docx
 
This term paper involves putting together the various concepts l
This term paper involves putting together the various concepts lThis term paper involves putting together the various concepts l
This term paper involves putting together the various concepts l
 
Stayer cis 513 week 10 term paper wireless deployment plan new
Stayer cis 513 week 10 term paper wireless deployment plan newStayer cis 513 week 10 term paper wireless deployment plan new
Stayer cis 513 week 10 term paper wireless deployment plan new
 
Stayer cis-513-week-10-term-paper-wireless-deployment-plan-new
Stayer cis-513-week-10-term-paper-wireless-deployment-plan-newStayer cis-513-week-10-term-paper-wireless-deployment-plan-new
Stayer cis-513-week-10-term-paper-wireless-deployment-plan-new
 
This term paper involves putting together the various concepts learn.docx
This term paper involves putting together the various concepts learn.docxThis term paper involves putting together the various concepts learn.docx
This term paper involves putting together the various concepts learn.docx
 
Cis 513 week 10 term paper – strayer new
Cis 513 week 10 term paper – strayer newCis 513 week 10 term paper – strayer new
Cis 513 week 10 term paper – strayer new
 
Cis 513 week 10 term paper – strayer new
Cis 513 week 10 term paper – strayer newCis 513 week 10 term paper – strayer new
Cis 513 week 10 term paper – strayer new
 
Cis 513 week 10 term paper – strayer new
Cis 513 week 10 term paper – strayer newCis 513 week 10 term paper – strayer new
Cis 513 week 10 term paper – strayer new
 
Cis 513 week 10 term paper – strayer new
Cis 513 week 10 term paper – strayer newCis 513 week 10 term paper – strayer new
Cis 513 week 10 term paper – strayer new
 
Term Paper Project Designing a Secure NetworkDue Week 10 and wo.docx
Term Paper Project Designing a Secure NetworkDue Week 10 and wo.docxTerm Paper Project Designing a Secure NetworkDue Week 10 and wo.docx
Term Paper Project Designing a Secure NetworkDue Week 10 and wo.docx
 
Strayer cis 513 week 10 term paper wireless deployment plan new
Strayer cis 513 week 10 term paper wireless deployment plan newStrayer cis 513 week 10 term paper wireless deployment plan new
Strayer cis 513 week 10 term paper wireless deployment plan new
 
Stayer cis 513 week 10 term paper wireless deployment plan new
Stayer cis 513 week 10 term paper wireless deployment plan newStayer cis 513 week 10 term paper wireless deployment plan new
Stayer cis 513 week 10 term paper wireless deployment plan new
 
Cis 436 Technology levels--snaptutorial.com
Cis 436 Technology levels--snaptutorial.comCis 436 Technology levels--snaptutorial.com
Cis 436 Technology levels--snaptutorial.com
 
Cis 436 Enthusiastic Study / snaptutorial.com
Cis 436 Enthusiastic Study / snaptutorial.comCis 436 Enthusiastic Study / snaptutorial.com
Cis 436 Enthusiastic Study / snaptutorial.com
 
Using the network diagram located in attachment,  incorporate into t
Using the network diagram located in attachment,  incorporate into tUsing the network diagram located in attachment,  incorporate into t
Using the network diagram located in attachment,  incorporate into t
 
Strayer cis 513 week 10 term paper wireless deployment plan new
Strayer cis 513 week 10 term paper wireless deployment plan newStrayer cis 513 week 10 term paper wireless deployment plan new
Strayer cis 513 week 10 term paper wireless deployment plan new
 

More from carlibradley31429

Assignment 1 Discussion—Integration of TechnologyTechnology has c.docx
Assignment 1 Discussion—Integration of TechnologyTechnology has c.docxAssignment 1 Discussion—Integration of TechnologyTechnology has c.docx
Assignment 1 Discussion—Integration of TechnologyTechnology has c.docxcarlibradley31429
 
Assignment 1 Discussion—Critical Leadership Competencies Needed in .docx
Assignment 1 Discussion—Critical Leadership Competencies Needed in .docxAssignment 1 Discussion—Critical Leadership Competencies Needed in .docx
Assignment 1 Discussion—Critical Leadership Competencies Needed in .docxcarlibradley31429
 
Assignment 1 Discussion—Cultural Influences on Work and Leisure Tim.docx
Assignment 1 Discussion—Cultural Influences on Work and Leisure Tim.docxAssignment 1 Discussion—Cultural Influences on Work and Leisure Tim.docx
Assignment 1 Discussion—Cultural Influences on Work and Leisure Tim.docxcarlibradley31429
 
Assignment 1 Discussion—Communicating Negative InformationAs you .docx
Assignment 1 Discussion—Communicating Negative InformationAs you .docxAssignment 1 Discussion—Communicating Negative InformationAs you .docx
Assignment 1 Discussion—Communicating Negative InformationAs you .docxcarlibradley31429
 
Assignment 1 Discussion—Biomes, Development, Pollution, and YouEa.docx
Assignment 1 Discussion—Biomes, Development, Pollution, and YouEa.docxAssignment 1 Discussion—Biomes, Development, Pollution, and YouEa.docx
Assignment 1 Discussion—Biomes, Development, Pollution, and YouEa.docxcarlibradley31429
 
Assignment 1 Discussion—An Official LanguageCurrently the United .docx
Assignment 1 Discussion—An Official LanguageCurrently the United .docxAssignment 1 Discussion—An Official LanguageCurrently the United .docx
Assignment 1 Discussion—An Official LanguageCurrently the United .docxcarlibradley31429
 
Assignment 1 Discussion—A Life in ReviewIn late adulthood, most p.docx
Assignment 1 Discussion—A Life in ReviewIn late adulthood, most p.docxAssignment 1 Discussion—A Life in ReviewIn late adulthood, most p.docx
Assignment 1 Discussion—A Life in ReviewIn late adulthood, most p.docxcarlibradley31429
 
Assignment 1 DiscussionThere are two parts to this assignme.docx
Assignment 1 DiscussionThere are two parts to this assignme.docxAssignment 1 DiscussionThere are two parts to this assignme.docx
Assignment 1 DiscussionThere are two parts to this assignme.docxcarlibradley31429
 
Assignment 1 Discussion—Employee Impact on the Plan An organizati.docx
Assignment 1 Discussion—Employee Impact on the Plan An organizati.docxAssignment 1 Discussion—Employee Impact on the Plan An organizati.docx
Assignment 1 Discussion—Employee Impact on the Plan An organizati.docxcarlibradley31429
 
Assignment 1 Discussion QuestionWhy should an organization be c.docx
Assignment 1 Discussion QuestionWhy should an organization be c.docxAssignment 1 Discussion QuestionWhy should an organization be c.docx
Assignment 1 Discussion QuestionWhy should an organization be c.docxcarlibradley31429
 
Assignment 1 Discussion QuestionTo extend its international prese.docx
Assignment 1 Discussion QuestionTo extend its international prese.docxAssignment 1 Discussion QuestionTo extend its international prese.docx
Assignment 1 Discussion QuestionTo extend its international prese.docxcarlibradley31429
 
Assignment 1 Discussion QuestionThe Mexican ceramics folk-art f.docx
Assignment 1 Discussion QuestionThe Mexican ceramics folk-art f.docxAssignment 1 Discussion QuestionThe Mexican ceramics folk-art f.docx
Assignment 1 Discussion QuestionThe Mexican ceramics folk-art f.docxcarlibradley31429
 
Assignment 1 Discussion QuestionThe Mexican ceramics folk-art fir.docx
Assignment 1 Discussion QuestionThe Mexican ceramics folk-art fir.docxAssignment 1 Discussion QuestionThe Mexican ceramics folk-art fir.docx
Assignment 1 Discussion QuestionThe Mexican ceramics folk-art fir.docxcarlibradley31429
 
Assignment 1 Discussion QuestionsCase study Shaking up Oxf.docx
Assignment 1 Discussion QuestionsCase study Shaking up Oxf.docxAssignment 1 Discussion QuestionsCase study Shaking up Oxf.docx
Assignment 1 Discussion QuestionsCase study Shaking up Oxf.docxcarlibradley31429
 
Assignment 1 Discussion QuestionsCase Study Inside Intel. For y.docx
Assignment 1 Discussion QuestionsCase Study Inside Intel. For y.docxAssignment 1 Discussion QuestionsCase Study Inside Intel. For y.docx
Assignment 1 Discussion QuestionsCase Study Inside Intel. For y.docxcarlibradley31429
 
Assignment 1 Discussion QuestionsCase Study How Failure Breeds S.docx
Assignment 1 Discussion QuestionsCase Study How Failure Breeds S.docxAssignment 1 Discussion QuestionsCase Study How Failure Breeds S.docx
Assignment 1 Discussion QuestionsCase Study How Failure Breeds S.docxcarlibradley31429
 
Assignment 1 Discussion QuestionConsider a team that you have bee.docx
Assignment 1 Discussion QuestionConsider a team that you have bee.docxAssignment 1 Discussion QuestionConsider a team that you have bee.docx
Assignment 1 Discussion QuestionConsider a team that you have bee.docxcarlibradley31429
 
Assignment 1 Discussion Question Prosocial Behavior and Altruism.docx
Assignment 1 Discussion Question Prosocial Behavior and Altruism.docxAssignment 1 Discussion Question Prosocial Behavior and Altruism.docx
Assignment 1 Discussion Question Prosocial Behavior and Altruism.docxcarlibradley31429
 
Assignment 1 Discussion Questions Read the Bloomberg Bu.docx
Assignment 1 Discussion Questions Read the Bloomberg Bu.docxAssignment 1 Discussion Questions Read the Bloomberg Bu.docx
Assignment 1 Discussion Questions Read the Bloomberg Bu.docxcarlibradley31429
 
Assignment 1 Difficulties of Defining TerrorismDue Week 2 a.docx
Assignment 1 Difficulties of Defining TerrorismDue Week 2 a.docxAssignment 1 Difficulties of Defining TerrorismDue Week 2 a.docx
Assignment 1 Difficulties of Defining TerrorismDue Week 2 a.docxcarlibradley31429
 

More from carlibradley31429 (20)

Assignment 1 Discussion—Integration of TechnologyTechnology has c.docx
Assignment 1 Discussion—Integration of TechnologyTechnology has c.docxAssignment 1 Discussion—Integration of TechnologyTechnology has c.docx
Assignment 1 Discussion—Integration of TechnologyTechnology has c.docx
 
Assignment 1 Discussion—Critical Leadership Competencies Needed in .docx
Assignment 1 Discussion—Critical Leadership Competencies Needed in .docxAssignment 1 Discussion—Critical Leadership Competencies Needed in .docx
Assignment 1 Discussion—Critical Leadership Competencies Needed in .docx
 
Assignment 1 Discussion—Cultural Influences on Work and Leisure Tim.docx
Assignment 1 Discussion—Cultural Influences on Work and Leisure Tim.docxAssignment 1 Discussion—Cultural Influences on Work and Leisure Tim.docx
Assignment 1 Discussion—Cultural Influences on Work and Leisure Tim.docx
 
Assignment 1 Discussion—Communicating Negative InformationAs you .docx
Assignment 1 Discussion—Communicating Negative InformationAs you .docxAssignment 1 Discussion—Communicating Negative InformationAs you .docx
Assignment 1 Discussion—Communicating Negative InformationAs you .docx
 
Assignment 1 Discussion—Biomes, Development, Pollution, and YouEa.docx
Assignment 1 Discussion—Biomes, Development, Pollution, and YouEa.docxAssignment 1 Discussion—Biomes, Development, Pollution, and YouEa.docx
Assignment 1 Discussion—Biomes, Development, Pollution, and YouEa.docx
 
Assignment 1 Discussion—An Official LanguageCurrently the United .docx
Assignment 1 Discussion—An Official LanguageCurrently the United .docxAssignment 1 Discussion—An Official LanguageCurrently the United .docx
Assignment 1 Discussion—An Official LanguageCurrently the United .docx
 
Assignment 1 Discussion—A Life in ReviewIn late adulthood, most p.docx
Assignment 1 Discussion—A Life in ReviewIn late adulthood, most p.docxAssignment 1 Discussion—A Life in ReviewIn late adulthood, most p.docx
Assignment 1 Discussion—A Life in ReviewIn late adulthood, most p.docx
 
Assignment 1 DiscussionThere are two parts to this assignme.docx
Assignment 1 DiscussionThere are two parts to this assignme.docxAssignment 1 DiscussionThere are two parts to this assignme.docx
Assignment 1 DiscussionThere are two parts to this assignme.docx
 
Assignment 1 Discussion—Employee Impact on the Plan An organizati.docx
Assignment 1 Discussion—Employee Impact on the Plan An organizati.docxAssignment 1 Discussion—Employee Impact on the Plan An organizati.docx
Assignment 1 Discussion—Employee Impact on the Plan An organizati.docx
 
Assignment 1 Discussion QuestionWhy should an organization be c.docx
Assignment 1 Discussion QuestionWhy should an organization be c.docxAssignment 1 Discussion QuestionWhy should an organization be c.docx
Assignment 1 Discussion QuestionWhy should an organization be c.docx
 
Assignment 1 Discussion QuestionTo extend its international prese.docx
Assignment 1 Discussion QuestionTo extend its international prese.docxAssignment 1 Discussion QuestionTo extend its international prese.docx
Assignment 1 Discussion QuestionTo extend its international prese.docx
 
Assignment 1 Discussion QuestionThe Mexican ceramics folk-art f.docx
Assignment 1 Discussion QuestionThe Mexican ceramics folk-art f.docxAssignment 1 Discussion QuestionThe Mexican ceramics folk-art f.docx
Assignment 1 Discussion QuestionThe Mexican ceramics folk-art f.docx
 
Assignment 1 Discussion QuestionThe Mexican ceramics folk-art fir.docx
Assignment 1 Discussion QuestionThe Mexican ceramics folk-art fir.docxAssignment 1 Discussion QuestionThe Mexican ceramics folk-art fir.docx
Assignment 1 Discussion QuestionThe Mexican ceramics folk-art fir.docx
 
Assignment 1 Discussion QuestionsCase study Shaking up Oxf.docx
Assignment 1 Discussion QuestionsCase study Shaking up Oxf.docxAssignment 1 Discussion QuestionsCase study Shaking up Oxf.docx
Assignment 1 Discussion QuestionsCase study Shaking up Oxf.docx
 
Assignment 1 Discussion QuestionsCase Study Inside Intel. For y.docx
Assignment 1 Discussion QuestionsCase Study Inside Intel. For y.docxAssignment 1 Discussion QuestionsCase Study Inside Intel. For y.docx
Assignment 1 Discussion QuestionsCase Study Inside Intel. For y.docx
 
Assignment 1 Discussion QuestionsCase Study How Failure Breeds S.docx
Assignment 1 Discussion QuestionsCase Study How Failure Breeds S.docxAssignment 1 Discussion QuestionsCase Study How Failure Breeds S.docx
Assignment 1 Discussion QuestionsCase Study How Failure Breeds S.docx
 
Assignment 1 Discussion QuestionConsider a team that you have bee.docx
Assignment 1 Discussion QuestionConsider a team that you have bee.docxAssignment 1 Discussion QuestionConsider a team that you have bee.docx
Assignment 1 Discussion QuestionConsider a team that you have bee.docx
 
Assignment 1 Discussion Question Prosocial Behavior and Altruism.docx
Assignment 1 Discussion Question Prosocial Behavior and Altruism.docxAssignment 1 Discussion Question Prosocial Behavior and Altruism.docx
Assignment 1 Discussion Question Prosocial Behavior and Altruism.docx
 
Assignment 1 Discussion Questions Read the Bloomberg Bu.docx
Assignment 1 Discussion Questions Read the Bloomberg Bu.docxAssignment 1 Discussion Questions Read the Bloomberg Bu.docx
Assignment 1 Discussion Questions Read the Bloomberg Bu.docx
 
Assignment 1 Difficulties of Defining TerrorismDue Week 2 a.docx
Assignment 1 Difficulties of Defining TerrorismDue Week 2 a.docxAssignment 1 Difficulties of Defining TerrorismDue Week 2 a.docx
Assignment 1 Difficulties of Defining TerrorismDue Week 2 a.docx
 

Recently uploaded

History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 

Recently uploaded (20)

History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 

Oftentimes, the process of implementing security opens one’s eyes to.docx

  • 1. Oftentimes, the process of implementing security opens one’s eyes to other forms of security they hadn’t thought of previously. Well, in this assignment you should experience just that. This assignment focuses on a model of implementing security in layers which in many cases requires a network that is designed accordingly. In this assignment, you are to design a network to incorporate the following: Corporate Site (Chicago) All servers exist here (Web server, file server, print server, mail server, ftp server) Connection to the Internet (50mbps) 300 employees who only need access to local corporate resources and the Internet 1 Remote Site (8 miles away) 20 employees who need access to all resources at corporate plus the Internet Connection to the Internet (3mbps) Write a four to five (4-5) page paper in which you: Using Microsoft Visio or its open source alternative, design a network diagram, particularly with defense in depth in mind which depicts: All network devices used (routers, switches, hubs, firewalls, VPNs, proxies, and / or others) The interconnections between network devices The end user (client) devices (desktops, laptops) The Internet cloud, generically, to represent your network’s interface to the Internet Note: The graphically depicted solution is not included in the required page length. Describe the flow of data through your network, and explain how your network design provides multiple layers of security. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements:
  • 2. Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. Include charts or diagrams created in Visio or an equivalent such as Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted. The specific course learning outcomes associated with this assignment are: Explain the essentials of Transmission Control Protocol / Internet Protocol (TCP / IP) behavior and applications used in IP networking. Identify network security tools and discuss techniques for network protection. Use technology and information resources to research issues in network security design. Write clearly and concisely about Advanced Network Security Design topics using proper writing mechanics and technical style conventions. Points: 70 Assignment 1: Defense in Depth Criteria Unacceptable Below 70% F Fair 70-79% C Proficient 80-89% B Exemplary 90-100% A 1a. Using Microsoft Visio or its open source alternative, design a network diagram, particularly with defense in depth in mind
  • 3. which depicts all network devices used (routers, switches, hubs, firewalls, VPNs, proxies, and / or others). Weight: 30% Did not submit or incompletely used Microsoft Visio or its open source alternative, to design a network diagram, particularly with defense in depth in mind which depicts all network devices used (routers, switches, hubs, firewalls, VPNs, proxies, and / or others). Partially used Microsoft Visio or its open source alternative, to design a network diagram, particularly with defense in depth in mind which depicts all network devices used (routers, switches, hubs, firewalls, VPNs, proxies, and / or others). Satisfactorily used Microsoft Visio or its open source alternative, to design a network diagram, particularly with defense in depth in mind which depicts all network devices used (routers, switches, hubs, firewalls, VPNs, proxies, and / or others). Thoroughly used Microsoft Visio or its open source alternative, to design a network diagram, particularly with defense in depth in mind which depicts all network devices used (routers, switches, hubs, firewalls, VPNs, proxies, and / or others). 1b. Using Microsoft Visio or its open source alternative, design a network diagram, particularly with defense in depth in mind which depicts the interconnections between network devices. Weight: 10% Did not submit or incompletely used Microsoft Visio or its open source alternative, to design a network diagram, particularly with defense in depth in mind which depicts the interconnections between network devices. Partially used Microsoft Visio or its open source alternative, to design a network diagram, particularly with defense in depth in mind which depicts the interconnections between network devices. Satisfactorily used Microsoft Visio or its open source alternative, to design a network diagram, particularly with defense in depth in mind which depicts the interconnections
  • 4. between network devices. Thoroughly used Microsoft Visio or its open source alternative, to design a network diagram, particularly with defense in depth in mind which depicts the interconnections between network devices. 1c. Using Microsoft Visio or its open source alternative, design a network diagram, particularly with defense in depth in mind which depicts the end user (client) devices (desktops, laptops). Weight: 5% Did not submit or incompletely used Microsoft Visio or its open source alternative, to design a network diagram, particularly with defense in depth in mind which depicts the end user (client) devices (desktops, laptops). Partially used Microsoft Visio or its open source alternative, to design a network diagram, particularly with defense in depth in mind which depicts the end user (client) devices (desktops, laptops). Satisfactorily used Microsoft Visio or its open source alternative, to design a network diagram, particularly with defense in depth in mind which depicts the end user (client) devices (desktops, laptops). Thoroughly used Microsoft Visio or its open source alternative, to design a network diagram, particularly with defense in depth in mind which depicts the end user (client) devices (desktops, laptops). 1d. Using Microsoft Visio or its open source alternative, design a network diagram, particularly with defense in depth in mind which depicts the Internet cloud, generically, to represent your network’s interface to the Internet. Weight: 5% Did not submit or incompletely used Microsoft Visio or its open source alternative, to design a network diagram, particularly with defense in depth in mind which depicts the Internet cloud, generically, to represent your network’s interface to the Internet. Partially used Microsoft Visio or its open source alternative, to
  • 5. design a network diagram, particularly with defense in depth in mind which depicts the Internet cloud, generically, to represent your network’s interface to the Internet. Satisfactorily used Microsoft Visio or its open source alternative, to design a network diagram, particularly with defense in depth in mind which depicts the Internet cloud, generically, to represent your network’s interface to the Internet. Thoroughly used Microsoft Visio or its open source alternative, to design a network diagram, particularly with defense in depth in mind which depicts the Internet cloud, generically, to represent your network’s interface to the Internet. 2. Describe the flow of data through your network, and explain how your network design provides multiple layers of security. Weight: 35% Did not submit or incompletely described the flow of data through your network. Did not submit or incompletely explained how your network design provides multiple layers of security. Partially described the flow of data through your network. Partially explained how your network design provides multiple layers of security. Satisfactorily described the flow of data through your network. Satisfactorily explained how your network design provides multiple layers of security. Thoroughly described the flow of data through your network. Thoroughly explained how your network design provides multiple layers of security. 3. 3 references Weight: 5% No references provided Does not meet the required number of references; some or all references poor quality choices. Meets number of required references; all references high quality choices. Exceeds number of required references; all references high quality choices.
  • 6. 4. Clarity, writing mechanics, and formatting requirements Weight: 10% More than 6 errors present 5-6 errors present 3-4 errors present 0-2 errors present