designing a secure network infrastructure

Would you like us to handle your paper? Use our company for better grades and meet your deadlines.


Order a Similar Paper Order a Different Paper

It has 5 Parts.

I do not require all of them at once. Each part has the date next to them for when I require them. If you get them all done beforehand, great! 🙂

PART 1(September 20, 2018)

Milestone 1 (Due Week 4): Your first milestone consists of two deliverables: a Visio diagram that depicts your interpretation of the current network and a written summary of network vulnerabilities that you uncover. Your network diagram doesn’t have to depict every object. Instead, you can summarize objects.

Good general guidelines for your diagram are as follows:

1. The diagram fits on one page.

2. Your name is on the diagram.

3. Your diagram has a title or heading that contains the assignment number.

4. It is formatted nicely to make it easy to understand.

5. The objects in the diagram are clearly identified.

6. When a single object is used to represent multiple objects, it is labeled to show the correct numbers.

7. Connections are labeled.

When creating your drawing, use Visio.

Your written summary is an explanation of the network, system, and server assets along with any vulnerabilities you may observe. This should be done in Microsoft Word and should follow standard academic formatting with proper attention to spelling, grammar, punctuation, etc. Make sure you include a brief introduction explaining your document.

PART 2 (October 4, 2018)

This encompasses everything that you have learned up to this point. This week you will design improvements to the network infrastructure that incorporate encryption. You will also design improvements to the wireless networks. Use the information from your studies and feedback from previous assignments, to help you with this process. Revise your original Visio diagram to depict any changes that you propose to make. Then, summarize your recommendations for change in a Microsoft Word document. You may use any appropriate sources for your requirements. Remember to cite your sources.

The following questions are useful to you while you are creating your design. You should think about them while you are revising your diagram and summarizing your recommendations. Please do not provide answers to them as part of your deliverables.

1. Have I uncovered additional vulnerabilities since Milestone 1?

2. How should I prioritize the known vulnerabilities?

3. Can vulnerabilities be addressed through reconfiguration, or will I need additional hardware and software?

4. How can encryption address known vulnerabilities?

5. What security features are not currently in use?

6. What is the impact of using every means to encrypt the network and secure wireless access?

Your document should be professionally formatted with a brief introduction and proper attention to spelling, grammar, punctuation, etc.

Your diagram should contain any revisions to the original network infrastructure that are required to improve security.

PART 3 (October 18, 2018)

For this milestone you will design improvements to the network infrastructure that improve security to electronic mail and protect against intruders and malicious software. Revise your original Visio diagram to depict any changes that you propose to make. Then, summarize your recommendations for change in a Microsoft Word document.

The following questions are useful to you while you are making additions to your design. You should think about them while you are revising your diagram and summarizing your recommendations. Please do not provide answers to them as part of your deliverables.

1. Have I uncovered additional vulnerabilities since Milestone 2?

2. Does the redesign provide defense in depth?

3. Will the new secure network architecture maximize accessibility for wireless devices while still providing an appropriate level of security for a payment processing system?

4. What types of encryption are most effective and where should they be utilized?

5. What is the impact of each change on authorized users?

Your diagram should contain any revisions to the original network infrastructure that are required to improve security.

PART 4 (November 1, 2018)

For this milestone you will be making your final design changes to the network infrastructure. Use everything that you have learned from this course to provide the appropriate level of security at each level of the network. Again, use the information from your studies and feedback from previous assignments, to help you with this process. Produce a final revision of your Visio diagram and a final set of recommendations for change in a Microsoft Word document. You should include any past Visio diagrams as tabs, so we can track changes and progress. Your written discussion should explain your recommendations in enough detail to be easily understood by the “customer.”

You should be thinking about these questions when creating this design.

1. Does the network redesign address vulnerabilities that have been discovered since Milestone 3?

2. Will the use of security appliances restrict performance? If so, where?

3. Are there any back doors or hidden paths that could be used to circumvent security that haven’t been addressed in the new infrastructure?

4. Is the new design technically feasible? Is it cost effective?

5. What capabilities, if any, are lost or restricted once it is implemented?

6. Would the new system appeal to you as a user?

PART 5 (November 10, 2018)

A brief PowerPoint presentation to be made to senior management explaining your recommendations. In your presentation, provide an overview of the present system, including any security vulnerabilities that you found. Outline the main points/diagrams/recommendations. Be sure to have a conclusion that offers to continue your duties as consultant – you want to be hired to implement your design!

A good PowerPoint presentation has the following characteristics:

1. An introductory slide.

2. Separate slides for each main point.

3. Short phrases and headlines. Do not use complete sentences and paragraphs!

4. A good, solid conclusion.

5. A closing slide that states what you want to happen next. (You want to implement this design! Tell them how to contact you).

Do you need help with this or a different assignment? We offer CONFIDENTIAL, ORIGINAL (Turnitin/LopesWrite/SafeAssign checks), and PRIVATE services using latest (within 5 years) peer-reviewed articles. Kindly click on ORDER NOW to receive an A++ paper from our masters- and PhD writers.

Get a 15% discount on your order using the following coupon code SAVE15


Order a Similar Paper Order a Different Paper