Information Systems

Please see attachments 

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

· Create a Network Diagram

In Unit 2 you were asked to recommend an architecture for a secure network that will support a global retail organization. For this assignment, you are asked to create a network diagram that would document those recommendations. Insert the diagram into an MS Word document along with your justification for why you believe this particular architecture is the optimal design to support this organization. Be sure to include the following items in your submission:

· Your detailed diagram of the proposed secure network architecture.

· Your justification for your design choices.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Assignment Requirements

· Written communication: Written communication is free of errors that detract from the overall message.

· APA formatting: Resources and citations are formatted according to APA (6th edition) style and formatting.

· Length of paper: No more than 3 pages, excluding the references page.

· Font and font size: Times New Roman, 12 point.

Resources

This goes along with homework #18712425

Unit 4

Top of Form

Bottom of Form

Content

·

Unit 4

· Network Design and Management Roles and Responsibilities

Introduction

Unit 4 focuses on secure network design and effective management of installed networks. The network that supports each organization is unique and requires careful assessment of the specific characteristics unique to that particular implementation. The factors considered go beyond those that impact the initial selection and installation. The future plans of the organization and the ongoing impacts of that design on the ability to effectively manage the network are also of critical importance. The size of the organization, the number of locations, the number of transactions, and the level of sensitivity of the data that will be streaming across the network are all examples of critical factors to consider when designing a secure network.

Objectives

To successfully complete this learning unit, you will be expected to:

1. Identify the strategies IT and information security professionals can follow to mitigate any potential risk to the network.

2. Create a diagram for a basic modern network architecture for a specific scenario.

3. Compare and contrast the roles of network and security administrators specific to design, architecture, configuration, and monitoring.

4. Exhibit proficiency in writing, critical thinking, and research topic areas in IT security fundamentals.

· Accordion Toolbar

·
·

· Required Reading

Use

Cloud Security: A Comprehensive Guide to Secure Cloud Computing

to read the following:

1. Chapter 1, “Cloud Computing Fundamentals,” pages 1–32.

2. Chapter 2, “Cloud Computing Architecture,” pages 33–60.

3. Chapter 6, “Cloud Computing Security Architecture,” pages 177–216.

Use the Internet to read the following:

4. “

A Risk-Driven Approach to Security, From Check Boxes to Risk Management Frameworks

.”

Optional Skillsoft Resource

5. Skillsoft. (n.d.). 

CISSP: Risk management [Tutorial]

.

·

Toggle Drawer

false

Still stressed from student homework?
Get quality assistance from academic writers!

Order your essay today and save 25% with the discount code LAVENDER