Expert answer:You have been recently hired as a network security

Answer & Explanation:You have been recently hired as a network security analyst for a small accounting firm. The firm is realizing that they need help to secure their network and customer’s data. With your background and skills, they are looking to you to provide guidance. In addition to helping them secure their network, they require that you obtain your CompTIA Security+ certification within 60 days of being hired.In addition to the owner, who serves as the overall business manager, there are about 20 people on staff:➢ 10 accountants➢ 3 administrative support specialists➢ 1 vice president➢ 1 financial manager➢ 2 internsThere is also one IT support technician on staff, who has basic computer hardware and networking knowledge. He has requested that the firm create a website, hosted internally, so that new customers can get information about the firm. This will be important to remember as you complete your final project.The firm has a simple network. There are currently 20 computers and two multipurpose printers. All computers and printers are connected wirelessly to a NETGEAR MR814 device. This router is connected to a Motorola SB3100 cable modem. Staff e mail accounts are set up through the company’s Internet provider. Employees use a combination of Microsoft Outlook and standard web browsers to access their e-mail. The owner is known to use his personal iPad during work hours to check and respond to e mail messages.Prior to your hiring, they hired a network cabling contractor to run Cat 6 cables from the central wiring closet to all offices and cubicles. They want to move away from using wireless as the primary network connection, but want to keep wireless access for customers coming to the building. The technician who did the wiring mentioned to your supervisor that he should look into setting up a Windows Server domain to manage user access, instead of the current peer-to-peer network. He also recommended that the firm invest in a managed switch and a firewall, and look into having some backups. The internal IT support technician agreed with these recommendations but needs your help to implement them.You’ve been asked to assess the current vulnerabilities and provide a recommendation to the firm’s owner on how to better secure the network infrastructure. Now that you are aware of the firm’s history, your assessment and recommendation should provide specifics about the network security settings that must be implemented and the equipment that must be procured, installed, and configured. The firm’s owner has a basic understanding of computing, so it is important that you explain the technical issues in layman’s terms.You will provide a detailed vulnerabilities assessment document, along with some specific recommendations to implement to address the vulnerabilities you have described. This document should be based on the scenario provided. Use LabSim as a guide in your analysis and recommendations.Your proposal will be submitted in three major parts:Vulnerabilities AssessmentNetwork System Security RecommendationsApplication/End-User Security RecommendationsIt should be written using the IEEE citation style. To learn how you will be assessed on this assignment, please take a moment to review the rubric.Use this template as a guide while creating your Vulnerabilities Assessment and Recommendation Document (Parts 1-3).pART 1:Vulnerabilities AssessmentThis section should include areas where network security could pose security problems. Explain why these vulnerabilities could be exploited and what the implications are if they are not addressed. In this section, you do not need to provide specific recommendations on how to mitigate these issues.pART 2: Network Security Recommendations-This section should include specific recommendations based on the vulnerabilities identified in previous section. These would include procuring new equipment or systems, and you should explain why these systems or equipment are needed. Cognizant that the firm only has a NETGEAR wireless router, determine what else is needed. They have Cat 6 cable running from each work area to the central wiring closet. But those cables are just hanging from the ceiling right now. The technician has recommended implementing a managed switch, a firewall, and a Windows domain, as well as setting up some backups (note: this could mean many things). Research appropriate equipment and provide guidance on their setup as appropriate for the business.Include any configuration information for the equipment. For example, if you are getting a firewall, what setting(s) from a firewall should be in place for this firm?pART 3:Application/ END-USER SECURITY rECOMMENDATIONThis should include end-user specific recommendations such as the need for a specific application on the end-user’s computer or a specific training or best-practice that the user must employ. Again, explain why these are necessary and provide the specific configuration information as needed.cmit320rubric11_2015.pdf
cmit320rubric11_2015.pdf

Unformatted Attachment Preview

Vulnerabilities Assessment and Recommendation Document Part 1 Rubric
Competencies Section 1
Level 3: 90 – 100%
Level 2: 80
– 89%
Level 1: Minimally
Proficient 70 – 79%
Not Proficient
Level 2: 80
– 89%
Level 1: Minimally
Proficient 70 – 79%
Not Proficient
This includes:
Analyzing business
needs in regards to
network security
Develop a vulnerability assessment
based on the scenario provided
Identifying current
vulnerabilities
Providing scholarly
references to the
vulnerabilities
Articulating the
vulnerabilities
This includes:
Performing
vulnerability
assessment based
on the scenario
Follow proper procedures and
protocols in completing IT-related
tasks.
Competencies Overall
Demonstrating the
ability to make
network
administration or
Cybersecurity
decisions based on
best practices and/or
standard
procedures/protocols
Level 3: 90 – 100%
This includes:
Using IEEE citation
style
Satisfy standards of writing style and
grammatical correctness.
Using credible
reasoning,
appropriate research,
and supporting
evidence in
communication
Synthesizing sources
appropriately using
paraphrase,
summary, and
quotation
Satisfying standards
of writing style and
grammatical
correctness,
including the use of
industry-standard
terminology and
vocabulary
Overall Score
Level 3: 90-100%
Level 2: 8089%
Level 1: Minimally
Proficient 70 – 79%
Not Proficient
Vulnerabilities Assessment and Recommendation Document Part 2 Rubric
Competencies Section 2
Level 3: 90 – 100%
Level 2: 80
– 89%
Level 1: Minimally
Not Proficient
Proficient 70 – 79%
Level 2: 80
– 89%
Level 1: Minimally
Not Proficient
Proficient 70 – 79%
This includes:
Assess the need for network security
devices to support the business or
organization.
Selecting/identifying
the appropriate type
of network security
devices to use
Providing
justifications for the
selected devices
This includes:
Assess the need for network services to
support the business or organization.
Selecting/identifying
the network services
to implement
Providing
justifications for the
selected services
This includes:
Follow proper procedures and protocols
in completing IT-related tasks.
Competencies Overall
Demonstrating the
ability to make
network
administration or
Cybersecurity
decisions based on
best practices and/or
standard
procedures/protocols
Level 3: 90 – 100%
This includes:
Using IEEE citation
style
Satisfy standards of writing style and
grammatical correctness.
Using credible
reasoning,
appropriate research,
and supporting
evidence in
communication
Synthesizing sources
appropriately using
paraphrase,
summary, and
quotation
Satisfying standards
of writing style and
grammatical
correctness,
including the use of
industry-standard
terminology and
vocabulary
Overall Score
Level 3: 90-100%
Level 2:
80-89%
Level 1: Minimally
Not Proficient
Proficient 70 – 79%
Vulnerabilities Assessment and Recommendation Document Part 3 Rubric
Competencies Section 3
Level 3: 90 – 100%
This includes:
Apply and implement appropriate security
measures on a network to support the
business or organization.
Identifying network
security measures
needed (should
include preventative
and maintenance
measures)
Providing
justifications for the
measures
This includes:
Using appropriate
techniques and
procedures to secure
Apply proper ethical principles in dealing with sensitive customer
information
sensitive customer information.
Using proper
documentation to
track sensitive
activities
This includes:
Follow proper procedures and protocols in
completing IT-related tasks.
Identifying and
applying appropriate
software licensing
model(s) for the
software used in the
proposal
Level 2:
80 – 89%
Level 1: Minimally
Proficient 70 – 79%
Not
Proficient
Demonstrating the
ability to make
network
administration or
Cybersecurity
decisions based on
best practices and/or
standard
procedures/protocols
Competencies Overall
Level 3: 90 – 100%
Level 2:
80 – 89%
Level 1: Minimally
Proficient 70 – 79%
Not
Proficient
Level 2:
80-89%
Level 1: Minimally
Proficient 70 – 79%
Not
Proficient
This includes:
Using IEEE citation
style
Using credible
reasoning,
appropriate research,
and supporting
evidence in
communication
Satisfy standards of writing style and
grammatical correctness.
Synthesizing sources
appropriately using
paraphrase,
summary, and
quotation
Satisfying standards
of writing style and
grammatical
correctness,
including the use of
industry-standard
terminology and
vocabulary
Overall Score
Level 3: 90-100%

Purchase answer to see full
attachment

How it works

  1. Paste your instructions in the instructions box. You can also attach an instructions file
  2. Select the writer category, deadline, education level and review the instructions 
  3. Make a payment for the order to be assignment to a writer
  4.  Download the paper after the writer uploads it 

Will the writer plagiarize my essay?

You will get a plagiarism-free paper and you can get an originality report upon request.

Is this service safe?

All the personal information is confidential and we have 100% safe payment methods. We also guarantee good grades

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more

Order your essay today and save 20% with the discount code ESSAYHELP