Information Systems

Please see attachment 

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Proposal for a Secure Network Architecture Scoring Guide

Due Date: End of Unit 2.
Percentage of Course Grade: 8%.

Proposal for a Secure Network Architecture Scoring Guide Grading Rubric

Criteria

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Non-performance

Basic

Proficient

Distinguished

Analyze the fundamental concepts, technologies, components, and issues related to communications and data networks.
23%

Does not analyze the fundamental concepts, technologies, components, and issues related to communications and data networks.

Analyzes partially or at a high level the fundamental concepts, technologies, components, and issues related to communications and data networks.

Analyzes the fundamental concepts, technologies, components, and issues related to communications and data networks.

Analyzes in a highly comprehensive manner the fundamental concepts, technologies, components, and issues related to communications and data networks.

Evaluate the variety of architectures and alternatives available to create a modern communications and data network.
22%

Does not evaluate the variety of architectures and alternatives available to create a modern communications and data network.

Evaluates partially or at a high level the variety of architectures and alternatives available to create a modern communications and data network.

Evaluates the variety of architectures and alternatives available to create a modern communications and data network.

Evaluates in a highly comprehensive manner the variety of architectures and alternatives available to create a modern communications and data network.

Evaluate the security implications of the variety of modern communications and data network alternatives.
23%

Does not evaluate the security implications of the variety of modern communications and data network alternatives.

Evaluates partially or at a high level the security implications of the variety of modern communications and data network alternatives.

Evaluates the security implications of the variety of modern communications and data network alternatives.

Evaluates in a highly comprehensive manner the security implications of the variety of modern communications and data network alternatives.

Explore the design alternatives for organizations that require both public and private wireless capability.
22%

Does not explore the design alternatives for organizations that require both public and private wireless capability.

Explores partially or at a high level the design alternatives for organizations that require both public and private wireless capability.

Explores the design alternatives for organizations that require both public and private wireless capability.

Explores in a highly comprehensive manner the design alternatives for organizations that require both public and private wireless capability.

Exhibit proficiency in writing, critical thinking, and research topic areas in IT security fundamentals.
10%

Does not exhibit proficiency in writing, critical thinking, and research topic areas in IT security fundamentals.

Exhibits a low level of proficiency in writing, critical thinking, and research topic areas in IT security fundamentals.

Exhibits proficiency in writing, critical thinking, and research topic areas in IT security fundamentals.

Exhibits a high level of proficiency in writing, critical thinking, and research topic areas in IT security fundamentals.

· Proposal for a Secure Network Architecture

You have been hired by an international coffee and tea retailer with hundreds of shops around the world. This organization, like most in the industry, is known for providing high-end coffees, teas, and snacks in a café setting frequented by neighbors and business people in search of an Internet connection. This organization has a corporate headquarters located in Seattle, Washington. Your task is to recommend a network architecture that will be optimal for the organization to implement in order to offer secure public wireless in each location in a consistent, cost-effective, and secure manner. Engage in research to explore the available alternatives that would fit these criteria as well as apply the information from the required study materials. Write a 2–3 page paper that covers the following topics:

· Describe the alternative architectures that would be appropriate to meet the objectives of the project.

· Analyze the pros and cons of each alternative architecture.

· Determine the security implications of each alternative architecture.

· Recommend an architecture that is optimal for implementation by this coffee and tea retailer

· Provide support for your recommendations.

Assignment Requirements

· Written communication: Written communication is free of errors that detract from the overall message.

· APA formatting: Resources and citations are formatted according to APA (6th edition) style and formatting.

· Length of paper: 2–3 pages, excluding the references page.

· Font and font size: Times New Roman, 12 point.

· Required Reading

The required reading covers design considerations for creating a secure network and will support completion of the unit assignment and discussion.

· Use

Systems Security Engineering: An Integrated Approach to Building Trustworthy Resilient Systems

to read Chapter 3, “The Processes,” pages 33–75.

· Web Resources

Videos

The objectives of these videos are to explore applications of network technology and security architectures currently in use and those proposed for the future as well as to provide some context for the required reading and inform the Unit 2 assignment and discussion.

·

Level(3) Sponsor Talk: Leveraging Network Intelligence for Data Security

(30 minutes).

·

Future Network Architectures, SDN, CNN at NetEvents Ethernet 40 Innovations Summit

(31 minutes).

Internet and Library Research

Engage in research using the following keywords to explore modern network architectures and the security implications that are associated with those architectures:

· Secure network architecture.

· Secure network design.

· Network architecture alternatives.

· Network design alternatives.

· Network design tools.

· Network architecture development tools.

Still stressed from student homework?
Get quality assistance from academic writers!

Order your essay today and save 25% with the discount code LAVENDER