Please see attachments
read carefully
Assignment 3
·
· Required Reading
The required reading provides foundational information on networking components, security features within those components, and alternatives for placement on the network, which will inform the Unit 3 assignment and discussion.
· Use
Networking for Dummies
to read Part V, “Managing and Protecting Your Network,” pages 321–358.
· Use
Pervasive Computing and Networking
to read Part 2, “Pervasive Networking Security,” pages 159–218.
· Web Resources
Video
The objective of this video is to demonstrate security features that exist within a modern network and the components that make up that network.
·
Communications and Network Security | CISSP Training Videos
|
Transcript
(125 minutes).
Internet and Library Research
Engage in research using the following keywords related to network components, their placement on the network, and the security features they contain. This research will inform the Unit 3 assignment and discussion.
· Computer network devices.
· Computer network components.
· Computer network security features.
· Computer network security components.
· Secure computer network device resources.
· Secure computer network device information.
· Computer network secure configuration.
Please follow the scoring guide
How to Build a Secure Network Scoring Guide
Due Date: End of Unit 3.
Percentage of Course Grade: 8%.
How to Build a Secure Network Scoring Guide Grading Rubric
Criteria
Non-performance
Basic
Proficient
Distinguished
Describe the hardware components of modern computing environments and their individual functions.
23%
Does not describe the hardware components of modern computing environments and their individual functions.
Describes partially or at a high level the hardware components of modern computing environments and their individual functions.
Describes the hardware components of modern computing environments and their individual functions.
Describes in a highly comprehensive manner the hardware components of modern computing environments and their individual functions.
Analyze the security functionality that exists within hardware components of a modern network.
22%
Does not analyze the security functionality that exists within hardware components of a modern network.
Analyzes partially or at a high level the security functionality that exists within hardware components of a modern network.
Analyzes the security functionality that exists within hardware components of a modern network.
Analyzes in a highly comprehensive manner the security functionality that exists within hardware components of a modern network.
Examine the alternatives for placement of security functions in a system and the strengths and weaknesses created by that design.
23%
Does not examine the alternatives for placement of security functions in a system and the strengths and weaknesses created by that design.
Examines partially or at a high level the alternatives for placement of security functions in a system and the strengths and weaknesses created by that design.
Examines the alternatives for placement of security functions in a system and the strengths and weaknesses created by that design.
Examines in a highly comprehensive manner the alternatives for placement of security functions in a system and the strengths and weaknesses created by that design.
Explore the resources available to IT and information security professionals charged with installing and maintaining a secure modern network.
22%
Does not explore the resources available to IT and information security professionals charged with installing and maintaining a secure modern network.
Explores partially or at a high level the resources available to IT and information security professionals charged with installing and maintaining a secure modern network.
Explores the resources available to IT and information security professionals charged with installing and maintaining a secure modern network.
Explores in a highly comprehensive manner the resources available to IT and information security professionals charged with installing and maintaining a secure modern network.
Exhibit proficiency in writing, critical thinking, and research topic areas in IT security fundamentals.
10%
Does not exhibit proficiency in writing, critical thinking, and research topic areas in IT security fundamentals.
Exhibits a low level of proficiency in writing, critical thinking, and research topic areas in IT security fundamentals.
Exhibits proficiency in writing, critical thinking, and research topic areas in IT security fundamentals.
Exhibits a high level of proficiency in writing, critical thinking, and research topic areas in IT security fundamentals.
· How to Build a Secure Network
The local county health department has outgrown the current space and has recently purchased a new building that will house clinicians and supporting structures. You have been hired as a consultant to advise the county resource manager as to what components she needs to purchase in order to build a HIPAA compliant network that will be used to collect and store data that supports the health department’s daily operations. It is anticipated that the clinics run by the health department collect in the range of 2 gigs of information monthly including text data, imaging data, and data that is generated by medical devices such as electronic EKG machines.
You are a new consultant and are eager to do a good job in your first assignment. Research the resources that are available to you that you need to provide accurate recommendations for the resource manager. Write a 3–5 page paper that includes the following topics:
· Steps involved in identifying the network device requirements necessary to support this network.
· Resources that are available to identify the device alternatives that are available.
· Resources that are available to determine cost effectiveness of those alternatives.
· Resources that are available to determine the security features available in those alternatives.
· Selection of network devices that you recommend.
· Support for your recommendations.
Assignment Requirements
· Written communication: Written communication is free of errors that detract from the overall message.
· APA formatting: Resources and citations are formatted according to APA (6th edition) style and formatting.
·
Length of paper: 3–5 pages, excluding the references page.
· Font and font size: Times New Roman, 12 point.