Evaluate a current system’s network security

Evaluate a current system’s network security
Learning outcomes (Awarding body Specification)
Understand the impact on the social and commercial environment of network security design.
Be able to design network security solutions.
Be able to implement network security solutions.
Be able to manage network security solutions.
Assessment Criteria (Awarding body Specification)
Evaluate a current system’s network security
Discuss the potential impact of a proposed network design
Discuss current and common threats and their impact
Design a network security solution to meet a given specification
Evaluate design and analyse feedback
Using a design, implement a complex network security solution
Systematically test the complex network security solution
Document and analyse test results
Manage a network security solution
Analyse ongoing network security policies and practices
Recommend potential change management
Assignment Scenario
In today’s world of the internet and ecommerce, many companies lack the expertise and training to secure their critical network infrastructure and data. Because of this fallacy, many companies’ infrastructures are subject to being compromised. With extortion, cyber theft, malicious attacks and internal theft occurring at an unprecedented pace, many companies are just becoming aware of the aforesaid problems. While a few companies and corporations awaken to a new world of problems, many continue to sleep, totally oblivious to what is happening as they go about their daily work.
Video and Audio Components Ltd (VAC) is a small company which specialises in the sourcing and distribution of high-end video and audio components for audiophiles and organisations which have large-scale, and sometimes complex, requirements for the components that they stock or can procure, including large flat panel TVs, surround sound systems of varying scale and complexity, and a huge range of accessories which can be connected to these.
Currently, VAC has an internal chain of supply that is networked using a local area network (LAN). So far, this has helped the company reduce costs and respond to customer orders quickly. Company communications and data relating to component stock planning, distribution, and support are increasingly being undertaken using this network, which the company is constantly upgrading to increase sales performance.
Although VAC’s supply chain data and company communications have been secure so far in accordance with its current size as a local area network, the company plans to significantly increase the size of its supply chain to include outside suppliers and customers, with whom it wishes to communicate using its current network and the new Wide Area Network (WAN) which will give it connectivity nationally.
Assignment Tasks
Task 1 –
This task concerns you understanding the impact on the social and commercial environment of managing a complex network security solution.
The general manager has requested that you discuss the impact on social and commercial environment of network security on VAC Ltd. (about 1500 words).
Section A: Your answer should include the discussion of the following:
Threats: Management of threats eg awareness, current threats, access policies
Social impact: Organisation trust eg data credibility, corporate trust, financial trust; social engineering; law enforcement involvement
Security policy: Review and management eg access to systems, forensic analysis of systems
Impact on productivity: Loss e.g., systems recovery, data recovery, loss of services; legal proceedings
Estimating risk: Penetration testing; audits eg internal and external; procedures eg contingency planning
Further compare and contrast 5 of the above elements
Material should be of appropriate levels and presented in a logical and accurate manner matching the stated requirements for each task. Some use of referencing is made.
Make 3 recommendations for the importance of the Network Security
Independent research, outside that provided in course materials, has been utilised to prepare the work and appropriate assumptions are made and justified where detailed scenario information is not available
Task 2 –
This task concerns you being able to design complex network security solutions.
The general manager has requested that you use the following principles to design a network solution for VAC Ltd using CISCO Packet Tracer. (About 1500 words).
Section B: Your answer should include the discussion and design and implementation of the following:
LAN design: Technical response eg, MAC control, VLAN (Virtual Local Area Network) security, ARP (Address Resolution Protocol) poisoning, VLAN design; trunk design
WAN design: Technical response eg, access control lists, traffic filters, DMZ (Demilitarised Zone) management
Server deployment: Security needs according to server specification eg printer access, file management, data management, email
Border systems: Intrusion Detection Systems (IDS) eg firewalls filters and rules, application and packet monitoring, trust
User access: User group e.g., group membership, user group allocation, attribution of rights; rights eg file, server, service, data, hardware, printer, email
Physical security: Power resilience and supply; physical access control eg lock and key, electronic access control, biometrics; backup eg data, configuration, imaging; recovery policies
Implement IP Addressing on all your Devices
Material should be of appropriate levels and presented in a logical and accurate manner matching the stated requirements for each task. Some use of referencing is made. Using annotated screen shots.
Implement Router Security and Wireless security on your devices
Independent research, outside that provided in course materials, has been utilised to prepare the work and appropriate assumptions are made and justified where detailed scenario information is not available using annotated screenshots.
Task 3 –
This task concerns using a given design to implement and manage a complex network security solution.
The general manager has requested some aspects of the network security applied to devices and troubleshooting process to be documented as a guidance for their technician. In this task you are given a copy of VAC’s current network on a USB (see below the diagram). This is fully set up and configured in Cisco Packet Tracer virtual tool. All branches are operational but configurations alone do not completely secure a network. You are required to secure some critical areas of this network and its devices as listed below under section A. After applying these security solutions, the outcome needs to be checked, reviewed and fully documented (about 1500 words).
Section C:
Device hardening
Apply encrypted passwords to all routers and switches in VAC’s network. List commands used and produce screen shots of configuration files and enable access mode to show the outcome.
Configure Packet filtering
Currently everyone in Branch 1 has access to the FTP server in the server farm. This needs to be limited to only Branch1 admin Laptop. Use an ACL to allow access only from the Admin laptop while denying everyone else in that subnet. List the commands used and take screenshots to show the process involved in both access and fail connections to the FTP server.
Setup a remote secure tunnel
Use SSH to establish a secure remote access to one of the routers. List the commands used and take screenshots to show the process involved while attempting secure connection.
Section D: Configure a packet inspection security
The company has recently purchased a Cisco’s Adaptive Security Appliance (ASA5505) as a firewall and the general manager would like you to provide them with information, showing how to set it up with a packet inspection security between 2 VLANS. Use the following diagram to set it up in Packet Tracer, configure and document the results and any troubleshooting aspects.
• Provide some guidance on Software Restriction Policy
Research and list some potential vulnerabilities that could be exploited in a network environment.
Section E:
Evaluate one specific policy on the periodic review of user access (physical and system level).
Evaluate 2 commercial security audits e.g. source code analysers, password and encryption crackers, proxy tools.
Evaluate 2 changes in infrastructure/procedural management e.g. network device removal/addition and/or service/user group addition/removal.
Use a segment of your network security solution in Section B to deploy an IP management tool to monitor traffic, peak flow and user access patterns. Troubleshoot the process and produce relevant documentation.
Present and Communicate Findings
Material should be of appropriate levels and presented in a logical and accurate manner matching the stated requirements for each task. Some use of referencing is made.
Take responsibility for managing and organising activities.
Independent research, outside that provided in course materials, has been utilised to prepare the work and appropriate assumptions are made and justified where detailed scenario information is not available.
3000 words
10 references
The post Evaluate a current system’s network security

CLICK HERE TO ORDER NOW!!

Image result for Order Now images

Assessment paper- Video and Audio Components

Assessment paper- Video and Audio Components
Video and Audio Components Ltd
Learning outcomes (Awarding body Specification)
Understand the impact on the social and commercial environment of network security design.
Be able to design network security solutions.
Be able to implement network security solutions.
Be able to manage network security solutions.
Assessment Criteria (Awarding body Specification)
Evaluate a current system’s network security
Discuss the potential impact of a proposed network design
Discuss current and common threats and their impact
Design a network security solution to meet a given specification
Evaluate design and analyse feedback
Using a design, implement a complex network security solution
Systematically test the complex network security solution
Document and analyse test results
Manage a network security solution
Analyse ongoing network security policies and practices
Recommend potential change management
Assignment Scenario
In today’s world of the internet and ecommerce, many companies lack the expertise and training to secure their critical network infrastructure and data. Because of this fallacy, many companies’ infrastructures are subject to being compromised. With extortion, cyber theft, malicious attacks and internal theft occurring at an unprecedented pace, many companies are just becoming aware of the aforesaid problems. While a few companies and corporations awaken to a new world of problems, many continue to sleep, totally oblivious to what is happening as they go about their daily work.
Video and Audio Components Ltd (VAC) is a small company which specialises in the sourcing and distribution of high-end video and audio components for audiophiles and organisations which have large-scale, and sometimes complex, requirements for the components that they stock or can procure, including large flat panel TVs, surround sound systems of varying scale and complexity, and a huge range of accessories which can be connected to these.
Currently, VAC has an internal chain of supply that is networked using a local area network (LAN). So far, this has helped the company reduce costs and respond to customer orders quickly. Company communications and data relating to component stock planning, distribution, and support are increasingly being undertaken using this network, which the company is constantly upgrading to increase sales performance.
Although VAC’s supply chain data and company communications have been secure so far in accordance with its current size as a local area network, the company plans to significantly increase the size of its supply chain to include outside suppliers and customers, with whom it wishes to communicate using its current network and the new Wide Area Network (WAN) which will give it connectivity nationally.
Assignment Tasks
Task 1 –
This task concerns you understanding the impact on the social and commercial environment of managing a complex network security solution.
The general manager has requested that you discuss the impact on social and commercial environment of network security on VAC Ltd. (about 1500 words).
Section A: Your answer should include the discussion of the following:
Threats: Management of threats eg awareness, current threats, access policies
Social impact: Organisation trust eg data credibility, corporate trust, financial trust; social engineering; law enforcement involvement
Security policy: Review and management eg access to systems, forensic analysis of systems
Impact on productivity: Loss e.g., systems recovery, data recovery, loss of services; legal proceedings
Estimating risk: Penetration testing; audits eg internal and external; procedures eg contingency planning
Further compare and contrast 5 of the above elements
Material should be of appropriate levels and presented in a logical and accurate manner matching the stated requirements for each task. Some use of referencing is made.
Make 3 recommendations for the importance of the Network Security
Independent research, outside that provided in course materials, has been utilised to prepare the work and appropriate assumptions are made and justified where detailed scenario information is not available
Task 2 –
This task concerns you being able to design complex network security solutions.
The general manager has requested that you use the following principles to design a network solution for VAC Ltd using CISCO Packet Tracer. (About 1500 words).
Section B: Your answer should include the discussion and design and implementation of the following:
LAN design: Technical response eg, MAC control, VLAN (Virtual Local Area Network) security, ARP (Address Resolution Protocol) poisoning, VLAN design; trunk design
WAN design: Technical response eg, access control lists, traffic filters, DMZ (Demilitarised Zone) management
Server deployment: Security needs according to server specification eg printer access, file management, data management, email
Border systems: Intrusion Detection Systems (IDS) eg firewalls filters and rules, application and packet monitoring, trust
User access: User group e.g., group membership, user group allocation, attribution of rights; rights eg file, server, service, data, hardware, printer, email
Physical security: Power resilience and supply; physical access control eg lock and key, electronic access control, biometrics; backup eg data, configuration, imaging; recovery policies
Implement IP Addressing on all your Devices
Material should be of appropriate levels and presented in a logical and accurate manner matching the stated requirements for each task. Some use of referencing is made. Using annotated screen shots.
Implement Router Security and Wireless security on your devices
Independent research, outside that provided in course materials, has been utilised to prepare the work and appropriate assumptions are made and justified where detailed scenario information is not available using annotated screenshots.
Task 3 –
This task concerns using a given design to implement and manage a complex network security solution.
The general manager has requested some aspects of the network security applied to devices and troubleshooting process to be documented as a guidance for their technician. In this task you are given a copy of VAC’s current network on a USB (see below the diagram). This is fully set up and configured in Cisco Packet Tracer virtual tool. All branches are operational but configurations alone do not completely secure a network. You are required to secure some critical areas of this network and its devices as listed below under section A. After applying these security solutions, the outcome needs to be checked, reviewed and fully documented (about 1500 words).
Section C:
Device hardening
Apply encrypted passwords to all routers and switches in VAC’s network. List commands used and produce screen shots of configuration files and enable access mode to show the outcome.
Configure Packet filtering
Currently everyone in Branch 1 has access to the FTP server in the server farm. This needs to be limited to only Branch1 admin Laptop. Use an ACL to allow access only from the Admin laptop while denying everyone else in that subnet. List the commands used and take screenshots to show the process involved in both access and fail connections to the FTP server.
Setup a remote secure tunnel
Use SSH to establish a secure remote access to one of the routers. List the commands used and take screenshots to show the process involved while attempting secure connection.
Section D: Configure a packet inspection security
The company has recently purchased a Cisco’s Adaptive Security Appliance (ASA5505) as a firewall and the general manager would like you to provide them with information, showing how to set it up with a packet inspection security between 2 VLANS. Use the following diagram to set it up in Packet Tracer, configure and document the results and any troubleshooting aspects.
• Provide some guidance on Software Restriction Policy
Research and list some potential vulnerabilities that could be exploited in a network environment.
Section E:
Evaluate one specific policy on the periodic review of user access (physical and system level).
Evaluate 2 commercial security audits e.g. source code analysers, password and encryption crackers, proxy tools.
Evaluate 2 changes in infrastructure/procedural management e.g. network device removal/addition and/or service/user group addition/removal.
Use a segment of your network security solution in Section B to deploy an IP management tool to monitor traffic, peak flow and user access patterns. Troubleshoot the process and produce relevant documentation.
Present and Communicate Findings
Material should be of appropriate levels and presented in a logical and accurate manner matching the stated requirements for each task. Some use of referencing is made.
Take responsibility for managing and organising activities.
Independent research, outside that provided in course materials, has been utilised to prepare the work and appropriate assumptions are made and justified where detailed scenario information is not available.
3000 words
10 references
The post Assessment paper- Video and Audio Components

CLICK HERE TO ORDER NOW!!

Image result for Order Now images

Determine the operational and enterprise systems that support wireless and mobile technologies

Determine the operational and enterprise systems that support wireless and mobile technologies
Review this Article titled “Delta Named Top Tech-Friendly U.S. Airline”, located here.
Use Internet or Strayer Library to search articles on wireless and mobile technologies as well as the application in business. Select one company other than Delta which uses mobile and wireless technology.
Write a four page paper in which you:
1. Define wireless technologies and mobile technologies. Next, determine at least three ways which companies or organizations utilize such technologies to improve business efficiency.
2. Determine the wireless technologies and mobile technologies that Delta has implemented. Next, evaluate the level of efficiency of the technology implementation. Provide a rationale for your response.
3. Specify the overall manner in which the company that you selected from your research implements organizational systems, wireless technologies, and mobile technologies. Next, evaluate the level of efficiency of such implementation within the selected company. Provide rationale for your response.
4. Give your opinion as to which company (i.e., Delta or the selected company from your research) is using the mobile and wireless technologies more strategically. Justify your response.
5. Determine the operational and enterprise systems that support wireless and mobile technologies for each company. Provide a rationale for your response.
6. Use at least three quality references. Note: Wikipedia and other Websites do not qualify as academic resources.
The post Determine the operational and enterprise systems that support wireless and mobile technologies

CLICK HERE TO ORDER NOW!!

Image result for Order Now images

Case Study: Wireless and Mobile Technologies

Case Study: Wireless and Mobile Technologies
In this very competitive climate, many companies are seeking ways to connect with customers in ways that add value. Mobile and wireless computing have become key focal points to attract and retain customers.
Review this Article titled “Delta Named Top Tech-Friendly U.S. Airline”, located here.
Use Internet or Strayer Library to search articles on wireless and mobile technologies as well as the application in business. Select one company other than Delta which uses mobile and wireless technology.
Write a four page paper in which you:
1. Define wireless technologies and mobile technologies. Next, determine at least three ways which companies or organizations utilize such technologies to improve business efficiency.
2. Determine the wireless technologies and mobile technologies that Delta has implemented. Next, evaluate the level of efficiency of the technology implementation. Provide a rationale for your response.
3. Specify the overall manner in which the company that you selected from your research implements organizational systems, wireless technologies, and mobile technologies. Next, evaluate the level of efficiency of such implementation within the selected company. Provide rationale for your response.
4. Give your opinion as to which company (i.e., Delta or the selected company from your research) is using the mobile and wireless technologies more strategically. Justify your response.
5. Determine the operational and enterprise systems that support wireless and mobile technologies for each company. Provide a rationale for your response.
6. Use at least three quality references. Note: Wikipedia and other Websites do not qualify as academic resources.
The post Case Study: Wireless and Mobile Technologies

CLICK HERE TO ORDER NOW!!

Image result for Order Now images

Create a security matrix spreadsheet and security strategy

Create a security matrix spreadsheet and security strategy
: Systems Scenario
This assignment is a continuation from the Week Four assignment.
In order to provide for the new services at the Akron, Ohio facility, the site must be added to the existing domain and configured.
Create a security matrix spreadsheet and security strategy summary. Include the user roles and matching security rights that would be expected to be created for the Akron site. Be sure to include the following user roles, as well as any others that may be deemed necessary:
• Administrative
• Accounting
• HR
• Warehouse Manager
• Warehouse Supervisor
• Janitorial User
Your strategy will be a 1-page summary of your matrix discussing the security strategy and how it will be applied to your matrix.
The post Create a security matrix spreadsheet and security strategy

CLICK HERE TO ORDER NOW!!

Image result for Order Now images

Explain the relationship between business intelligence and big data,

Explain the relationship between business intelligence and big data,
1. How can organizations create value by implementing an advanced information system solution paired with the appropriate business model? (minimmum 200 words)
2. What is social CRM? Why are some organizations hesitant to implement this advanced information system technology? (minimum 75 words)
3. Recall the e-commerce Internet business model discussed in the unit readings. Identify three different businesses that use this model and their successful descriptions for solutions to information systems.
(minimum 75 words)
4. Choose and explain one type of knowledge management system (KMS). How can your chosen KMS provide value to an organization? (minimum 75 words)
5. What is a balanced scorecard, and how are information systems used to support it? (minimum 75 words)
6. Explain the relationship between business intelligence and big data, including how they can be used when making decisions.(minimum 75 words)
Project does not have any attached files
The post Explain the relationship between business intelligence and big data,

CLICK HERE TO ORDER NOW!!

Image result for Order Now images

Describe the portrayal of African Americans in crime coverage on network news

Describe the portrayal of African Americans in crime coverage on network news
lesson is required to be 1,000-1,500-words and clearly demonstrate your understanding of the prompt. Essays should be 5 or more paragraphs with a clear introduction, thesis statement and conclusion, written in APA format (APAstyle.org). When you have completed the assignment, save a copy for yourself in an easily accessible location and submit a copy to your instructor below using the Submit Paper link. You may select from one of the following prompts:
Discuss gender stereotyping, with references to portrayals of gender in the media.
Analyze some of the origins of prejudice and discuss how the media can contribute to ingrained prejudice. Use examples from film, television, Internet media, print media, or advertising.
Examine racial stereotyping and prejudice, with references to specific portrayals in the media. Include specific examples from materials you covered in this lesson.
Analyze the messages conveyed in the media to young girls (from kindergarten through adolescence) about weight, body image, food, and beauty and their effect. Use examples from film, television, Internet media, print media, or advertising.
Alternative prompts may be proposed, but require lesson faculty approval
Project does not have any attached files
The post Describe the portrayal of African Americans in crime coverage on network news

CLICK HERE TO ORDER NOW!!

Image result for Order Now images

Examine racial stereotyping and prejudice, with references to specific portrayals in the media.

Examine racial stereotyping and prejudice, with references to specific portrayals in the media.
Essay
The essay for this lesson is required to be 1,000-1,500-words and clearly demonstrate your understanding of the prompt. Essays should be 5 or more paragraphs with a clear introduction, thesis statement and conclusion, written in APA format (APAstyle.org). When you have completed the assignment, save a copy for yourself in an easily accessible location and submit a copy to your instructor below using the Submit Paper link. You may select from one of the following prompts:
Discuss gender stereotyping, with references to portrayals of gender in the media.
Analyze some of the origins of prejudice and discuss how the media can contribute to ingrained prejudice. Use examples from film, television, Internet media, print media, or advertising.
Examine racial stereotyping and prejudice, with references to specific portrayals in the media. Include specific examples from materials you covered in this lesson.
Analyze the messages conveyed in the media to young girls (from kindergarten through adolescence) about weight, body image, food, and beauty and their effect. Use examples from film, television, Internet media, print media, or advertising.
Alternative prompts may be proposed, but require lesson faculty approval
Project does not have any attached files
The post Examine racial stereotyping and prejudice, with references to specific portrayals in the media.

CLICK HERE TO ORDER NOW!!

Image result for Order Now images

Analyze some of the origins of prejudice and discuss how the media can contribute to ingrained prejudice

Analyze some of the origins of prejudice and discuss how the media can contribute to ingrained prejudice
Please cite answers with APA
#1
Explain these two terms: the glass ceiling and the glass cliff.
#2
Explain Ziegler and White’s (1990) findings on racism in use of sources on network news.
#3
Explain the concept known as the distinctiveness postulate as it relates to the media.
#4
How does cultivation analysis relate to television viewing and young girls’ beliefs about beauty?
#5
How do children acquire prejudice?
#6
Describe the portrayal of African Americans in crime coverage on network news. How does is contrast to portrayal of whites?
#7
What were the results of the “Racial Minorities as Sources” study. Explain the role of incognizant racism in your answer.
#8
Explain the concept of social identity theory.
#9
Give an example from the film Sexual Stereotypes of how television programming has become more accepting of gay people.
#10
Discuss female rappers use of misogynistic language.
#11
What are your experiences with media stereotypes? Do your experiences align or contradict the information presented in the lesson?
#12
What did Blevins & Biddings’ conclude in their study of female rapper lyrics?
#13
Essay
The essay for this lesson is required to be 1,000-1,500-words and clearly demonstrate your understanding of the prompt. Essays should be 5 or more paragraphs with a clear introduction, thesis statement and conclusion, written in APA format (APAstyle.org). When you have completed the assignment, save a copy for yourself in an easily accessible location and submit a copy to your instructor below using the Submit Paper link. You may select from one of the following prompts:
Discuss gender stereotyping, with references to portrayals of gender in the media.
Analyze some of the origins of prejudice and discuss how the media can contribute to ingrained prejudice. Use examples from film, television, Internet media, print media, or advertising.
Examine racial stereotyping and prejudice, with references to specific portrayals in the media. Include specific examples from materials you covered in this lesson.
Analyze the messages conveyed in the media to young girls (from kindergarten through adolescence) about weight, body image, food, and beauty and their effect. Use examples from film, television, Internet media, print media, or advertising.
Alternative prompts may be proposed, but require lesson faculty approval
Project does not have any attached files
The post Analyze some of the origins of prejudice and discuss how the media can contribute to ingrained prejudice

CLICK HERE TO ORDER NOW!!

Image result for Order Now images

Develop an intervention plan for the child based on developmentally appropriate assessments.

Develop an intervention plan for the child based on developmentally appropriate assessments.
case study.
Guidelines
Use the anonymous child’s data provided. (Danny)
Do not use the child’s real name.
Discuss the child’s background (family, race, culture, socioeconomic status, strengths, weaknesses, and interests).
Write a behavioral objective(s) to align with Common Core standards to address the child’s area of difficulty. Make a clear connection between learning goals and assessments.
Develop an intervention plan for the child based on developmentally appropriate assessments.
Use developmentally appropriate assessments to show where the child was when tested. Use several including observation, authentic and performance –based. Use formal and informal assessments.
Interpret the assessment results and make a recommendation for future interventions/referrals, etc.
Include an in-depth reflection of what you learned and how it will help you.
Assistive technology should be used and demonstrate its use in assessment and/or record keeping.
*must be completed by the due date!!!**
In eassy form just aswer the above questions from the attached document.
The post Develop an intervention plan for the child based on developmentally appropriate assessments.

CLICK HERE TO ORDER NOW!!

Image result for Order Now images