Assessment Description It is essential to have a basic understanding of network defense topologies in order to properly comprehend the defensive strategies deployed by companies to protect their infor

Our papers are 100% unique and written following academic standards and provided requirements. Get perfect grades by consistently using our writing services. Place your order and get a quality paper today. Rely on us and be on schedule! With our help, you'll never have to worry about deadlines again. Take advantage of our current 20% discount by using the coupon code GET20


Order a Similar Paper Order a Different Paper

Assessment Description

It is essential to have a basic understanding of network defense topologies in order to properly comprehend the defensive strategies deployed by companies to protect their information assets.

Use the Cisco Packet Tracer application to create a network diagram that makes use of the following devices listed below, which belong to Company X. The diagram should illustrate your knowledge of network defense by placing network assets in their proper location, so as to ensure their protection. Include, within the diagram, any small office/home office (SOHO) solutions that will be used to protect either the infrastructure or end-user devices.

Within the diagram make sure to include at a minimum:

  1. 10 mobile devices (phones/laptops/tablets)
  2. Five desktop/stationary computers
  3. Two servers (file/email)
  4. One printer
  5. One router/firewall
  6. One WAN/gateway connection
  7. One switch
  8. One corresponding backup/replication asset for disaster recovery (local or remote storage/server)

Note: Any IP addresses used should be labeled next to the corresponding device.

Then, create a report outlining the abilities of the network topology in reference to securing network devices and other information assets used by Company X. Make sure to address the following within the report:

  1. A detailed explanation of the topology design addressing the “why” and “how” of the topology defenses solution and design, specifically threat models, motivations (such as insider threat), and ideologies
  2. Network defense solution list (i.e., software/hardware used to protect information assets)
  3. Encryption policies used by the network and end-users
  4. Disaster plan recovery, including restoration plans

When completing the report for this assignment, refer to the “Report Template.”

APA style is not required, but solid academic writing is expected.

This assignment uses a basic scoring guide, provided by your instructor. Please review the scoring guide prior to beginning the assignment to become familiar with the expectations for successful completion.

You are not required to submit this assignment to LopeWrite.

Attachments

Assessment Description It is essential to have a basic understanding of network defense topologies in order to properly comprehend the defensive strategies deployed by companies to protect their infor
CYB-610 Network Defense System Scoring Guide Performance Level Ratings Meets Expectations Performance consistently met expectations in all essential areas of the assignment criteria, at times possibly exceeding expectations, and the quality of work overall was very good. The most critical goals were met. Near Expectations Performance did not consistently meet expectations. Performance failed to meet expectations in one or more essential areas of the assignment criteria, one or more of the most critical goals were not met. Below Expectations Performance was consistently below expectations in most essential areas of the assignment criteria, reasonable progress toward critical goals was not made. Significant improvement is needed in one or more important areas. Criteria Below Expectations Near Expectations Meets Expectations Earned The student successfully creates a diagram that illustrates network defense by placing network assets in their proper location to ensure their protection. 0 pts – 6 pts 7 pts – 9 pts 10 pts The student clearly presents the following: 10 mobile devices (1pt) (phones/laptops/tablets) Five desktop/stationary computers (1pt) Two servers (file/email) (1pt) One printer (1pt) One router/firewall (1pt) One WAN/gateway connection (1pt) One switch (1pt) One corresponding backup/replication asset for disaster recovery (local or remote storage/server (1pt) Small office/home office (SOHO) solutions that will be used to protect either the infrastructure or end-user devices (2pts) 0 pts – 6 pts 7 pts – 9 pts 10 pts The student uses appropriate graphic elements to make visual connections that contribute to the understanding of concepts and relationships. 0 pts – 2 pts 3 pts – 4 pts 5 pts The student develops a comprehensive report that outlines the abilities of the network topology in reference to securing network devices and other information assets used. The documentation is well presented. The required components are present (5 pts ea): A detailed explanation of the topology design (the why, how, threat models, motivations and ideologies) Network defense solution list (i.e., software/hardware used to protect information assets) Encryption policies used by the network and end-users Disaster plan recover, including restoration plans 0 pts – 13 pts 14 pts – 19 pts 20 pts The student correctly utilizes industry standard technical writing throughout. 0 pts – 2 pts 3 pts – 4 pts 5 pts TOTAL /50 Instructor Feedback © 2018. Grand Canyon University. All Rights Reserved.
Assessment Description It is essential to have a basic understanding of network defense topologies in order to properly comprehend the defensive strategies deployed by companies to protect their infor
CYB-610 Report Template Overview Use this section to provide a brief description for the purpose of the assignment. Details Use this section to provide the details of each step of the assignment. Provide proof of completion of each step using screen captures. Summary Use this section to provide a brief explanation of the results of the assignment. Describe why you obtained the successful or unsuccessful results for this assignment. © 2018. Grand Canyon University. All Rights Reserved.

Writerbay.net

We offer the best essay writing services to students who value great quality at a fair price. Let us exceed your expectations if you need help with this or a different assignment. Get your paper completed by a writing expert today. Nice to meet you! Want 15% OFF your first order? Use Promo Code: FIRST15. Place your order in a few easy steps. It will take you less than 5 minutes. Click one of the buttons below.


Order a Similar Paper Order a Different Paper