Assessment project | Information Systems homework help


4027.1.4 : Network Characteristics

The  graduate determines network characteristics based on functionality  defined in the Open Systems Interconnection (OSI) reference model and  the TCP/IP protocol stack for designing and building highly secure  computer networks.

4027.1.5 : Network Device Security

The graduate securely configures network devices to maximize the security of a computer network.

4027.1.6 : Network Segmentation

The  graduate recommends network segmentation strategies to isolate network  segments based on business requirements and security concerns.

4027.1.7 : Troubleshooting Network Problems

The graduate performs root cause analysis to determine sources of network-related problems and propose solutions.

4027.1.8 : Secure Network Architecture

The graduate designs secure network architectures based on industry best practices and the principles of secure network design.

IntroductionSecure  network design is a critical component for protecting resources,  processes, and business continuity. Effective network design involves  evaluating existing network problems and potential threats, considering  secure architectures based on industry best practices and secure design  principles, and proposing secure network design solutions that address  the business needs of the organization.

For this task, you will  access the “Performance Assessment Lab Area” to run Zenmap and OpenVAS.  Screenshots saved for submission must include your name and student ID.  Your final network drawing should be saved in *.vsd format using  Microsoft Visio or a similar software tool.ScenarioCompany  A is a property and casualty insurer underwriting multiple types of  insurance. Company A is acquiring Company B, a financial services  organization, in order to diversify and increase market share. Company B  conducts business in the same geographical area as Company A and  delivers business and individual financial planning services. Both  companies provide services from their respective offices and at the  customer’s site. Both companies use broadband connectivity.

You  are the IT director for Company A and will be the chief information  officer (CIO) for the merged organization. You are tasked with  analyzing, designing, and presenting the proposed IT integration  project. Company A has clear IT infrastructure documentation, including a  logical diagram, an organizational chart, and a recent security risk  analysis. Company B does not have any IT infrastructure documentation,  and several security and integration issues are evident. Company B  outsources any IT-related needs to a consultant. Leadership for the  merged organization has allocated a limited budget of $35,000 for this  project and will expect justification for recommended expenditures.

Integration  project requirements include following secure network design  principles, selecting or repurposing secure network components, assuring  secure communication channels, addressing relevant regulatory  compliance, minimizing potential network problems and security threats,  delivering integration cost savings, and aligning IT to meet the  business needs of the post-merger organization. This post-merger  organization will reflect one corporate office and a branch office.Requirements

Your  submission must be your original work. No more than a combined total of  30% of the submission and no more than a 10% match to any one  individual source can be directly quoted or closely paraphrased from  sources, even if cited correctly. The originality report that is  provided when you submit your task can be used as a guide.

You  must use the rubric to direct the creation of your submission because it  provides detailed criteria that will be used to evaluate your work.  Each requirement below may be evaluated by more than one rubric aspect.  The rubric aspect titles may contain hyperlinks to relevant portions of  the course.

Tasks may not be submitted as  cloud links, such as links to Google Docs, Google Slides, OneDrive,  etc., unless specified in the task requirements. All other submissions  must be file types that are uploaded and submitted as attachments (e.g.,  .docx, .pdf, .ppt). 

A.  Describe  the problems Company A has with network security and infrastructure  using details from one or more of the “Company A Organizational Chart,”  “Company A Risk Analysis,” and “Company A Visio Diagram” supporting  documents.

B.  Run  Zenmap and OpenVAS on Company B’s network(s) using the “Performance  Assessment Lab Area” web link. Your submission should include the  following documents:

•  a  screenshot of the completed Zenmap scan—should be taken within the lab  environment and should include your name and student ID

•  a  screenshot of the OpenVAS report result—should be taken within the lab  environment and should include your name and student ID

•  the completed Zenmap PDF file(s)

•  the completed OpenVAS PDF file—should include your name in the summary of the report

Note:  This assessment requires you to submit pictures, graphics, and/or  diagrams. Each file must be a supporting document no larger than 30 MB  in size. Diagrams must be original and may be hand-drawn or drawn using a  graphics program. Do not use CAD programs because the file will be too  large. Your final network drawing should be saved in *.vsd format using  Microsoft Visio or a similar software tool.

C.  Describe the potential impact of two  network security or infrastructure problems of Company B using details  from the outputs of Zenmap and OpenVas (see supporting documents below),  including rationale for each problem.

1.  Explain how correcting each of these problems will improve the functioning of the merged network.

D.  Provide  a network topology diagram using Microsoft Visio or a similar software  tool that represents the proposed merging requirements from the scenario  of Company A and Company B, including remediation of all existing infrastructure problems described in part A and part C.

Please follow the web link listed below to download a free student version of Visio Professional 2019.

E.  Identify which layer of the OSI model and layer of the TCP/IP protocol stack apply to each component in the merged network topology diagram.

F.  Justify the retention or deletion of four  existing components as suggested in your proposed network topology  diagram. Include how each component’s retention or deletion and any  newly required additions to the network address both security concerns and budgetary restrictions found in the scenario.

G.  Explain how two secure network design principles are included in your proposed merged network topology diagram.

H.  Describe two secure hardware and/or software components integrated into the proposed network topology and how each component will address the security needs of the merged organization.

I.  Explain  how the proposed network topology diagram for the merged organization  addresses security safeguards based on a regulatory compliance  requirement.

J.  Explain  a security threat and one potential network problem that would become a  risk as part of the implementation of the proposed network topology  diagram, including why each would become a risk.

1.  Explain how the security threat and potential network problem should each be managed or mitigated as part of the implementation of the proposed topology diagram.

K.  Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.

L.  Demonstrate professional communication in the content and presentation of your submission.

File RestrictionsFile name may contain only letters, numbers, spaces, and these symbols: ! – _ . * ‘ ( )
File size limit: 200 MB
File  types allowed: doc, docx, rtf, xls, xlsx, ppt, pptx, odt, pdf, txt, qt,  mov, mpg, avi, mp3, wav, mp4, wma, flv, asf, mpeg, wmv, m4v, svg, tif,  tiff, jpeg, jpg, gif, png, zip, rar, tar, 7z – performance lab link

You can use for the network diagram

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
The price is based on these factors:
Academic level
Number of pages
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more