20 May no cpy and paist pls all original
Throughout this course, you will be developing a framework to bring focus to areas of concern for the enterprise to take action toward implementing best practices for network security. The weekly Individual Project assignments will culminate in the final Key Assignment. Each weekly assignment will build upon the work and knowledge of previous weeks. You will create 1 single document that contains all of the weekly assignments in separate sections, culminating with the final submission. Additional information and the deliverables for each Individual Project will be provided in the assignment description for this project. You are responsible for adding each of these ongoing Individual Project assignments into your Key Assignment document.
The Network Architecture Security Plan Proposal will consist of the following deliverables:
· Week 1: Section 1: Introduction
· Week 1: Section 2: Network Architecture
· Week 2: Section 3: Managing and Protecting Data
· Week 3: Section 4: Risk Assessment
· Week 4: Section 5: Digital Evidence Controls, Computer Forensic Analysis, and Recovering Files
· Week 5: Section 6: Recommendations for Best Practices
The following is the outline for the document shell:
· Use Word
· Title Page
· Course number and name
· Project name
· Student name
· Date
· Table of Contents (TOC)
· Use an autogenerated TOC.
· This should be on a separate page.
· Be sure to update the fields of the TOC so it is up-to-date before submitting your project.
· Section Headings (create each heading on a new page with TBD as content except for sections listed under New Content below)
· Introduction
· Network Architecture
· Managing and Protecting Data
· Risk Assessment
· Digital Evidence Controls, Computer Forensic Analysis, and Recovering Files
· Disaster Recover and Business Continuity Policies
· Training Plan
· Recommendations for Best Practices
The project deliverables for Week 1 will include the completion of 2 sections.
Section 1: Introduction
You are a system administrator, and you have been selected to develop a Network Architecture Security Plan Proposal for an enterprise or organization with which you are familiar or for a fictitious enterprise.
The first step will be to select an enterprise or organization as the target for your Network Architecture Security Plan Proposal. This project will be used as the basis for each of the assignments throughout the course and should conform to the following guidelines:
· The selected enterprise should be large enough to reflect the need to consider the adoption of the Network Architecture Security Plan and best practices for network security.
· You should be familiar enough with the organization to allow focus on its network architecture.
· Select an enterprise that fits these requirements, and address the following:
· Describe the organization, including a company size, a company location, and a list of products or services.
· Include the rationale for your choice.
Section 2: Network Architecture
Complete the following:
· Describe the network architecture for this organization.
· Identify physical structures, major types of hardware used to connect computers and networks together, and the way data travels through the network.
· Include a diagram to help support your description of the network architecture.
Section 3: Managing and Protecting Data
Technology is not effective if people do not follow procedures. Policies designate how the technology can be used, by whom, and for what purpose. Through the policies, the technology can be appropriately applied to ensure business purposes and objectives are met. As the system administrator, you need to further develop your Network Architecture Security Plan Proposal for your organization.
In this section, describe how you will manage and protect your network. Describe policies for each of the following:
· User access to computer resources
· Security profiles
· Passwords
· Internet access
· Antivirus
· Backup
· System patches
· Remote access
· Intrusion detection
Key Assignment Draft
Section 5: Digital Evidence Controls, Computer Forensic Analysis, and Recovering Files
Digital evidence is digital information that may be used as evidence in a security investigation case. Computer forensic analysis involves searching, preserving, and reviewing information on a computer to find potential legal evidence. File recovery involves retrieving a damaged or deleted computer file.
As system administrator, you need to further develop your Network Architecture Security Plan Proposal for your organization with information regarding digital evidence controls, computer forensics, and file recovery.
In this section, perform the following:
· Describe how you will preserve information for forensic analysis.
· Identify digital evidence controls that are in place for your network.
· Research, analyze, and recommend at least 2 computer forensic tools for forensic analysis and file recovery to be used on your network.
· Describe each of the tools, and explain how each tool will help support forensic analysis and file recovery.
· Be sure to cite all sources using APA format.
Part 1: Final Key Assignment
Update your Network Architecture Security Plan Proposal for your Key Assignment. This will be a culmination of all of the documents that you have created in this course. Include any instructor and peer feedback that you received. Your final proposal should include the following:
· Updated table of contents
· Company background
· Network architecture
· Managing and protecting data
· Risk assessment
· Digital evidence controls
· Computer forensic analysis and recovering files
· Executive summary
Part 2: Section 6: Recommendations for Best Practices
Complete the following:
· Make recommendations for best practices that summarize the course concepts introduced in your Network Architecture Security Plan Proposal.
· Explain why the proposal should be accepted as best practices for the organization.
· Include all research completed during the build of your Key Assignment, such as corrective actions to mitigate the risks for threats that could affect the confidentiality, integrity, or availability of the system, security policies, and antiforensic techniques.
Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.
About Writedemy
We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.
How It Works
To make an Order you only need to click on “Order Now” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Are there Discounts?
All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.