Provide an equipment list of network security devices


Assignment: Implementing Network And Personnel Security Measures

Implementing Network and Personnel Security Measures

1. Create an information flow diagram, using Visio or Dia, which:

a. Illustrates how remote users will securely connect to the government agency's network.

b. Illustrates the patch of network devices that data packets must travel to get from server to remote user's device and back to
server.

Note: The graphically depicted solution is not included in the required page length.

2. Provide an equipment list of network security devices that would be needed to ensure the integrity and sensitivity of private information. In this list:

a. Propose at least two vendor brands per each device and the associate costs required to procure these items.

b. Identify the functionality each device serves and the expected benefits the government agency should experience upon the successful installation of this equipment.

3. Develop a maintenance plan that should be recommended to the government agency to ensure having the latest security measures available within the network in which you:

a. Describe the risks associated with not fulfilling the activities outlined within your maintenance plan.

b. Indicate specific activities, personnel / resources required, and frequency of execution.

4. Recommend at least four physical security measures that could be developed to ensure the electronic perimeter of electronic assets.

5. Recommend at least two physical security vendors that could achieve the four security measures you identified. Justify your
recommendations with your response.

6. Evaluate and consider activities that the Human Resources Department could perform in order to complement and instill security from within the organization. Provide a rationale with your response.

7. Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Format your assignment according to the following formatting requirements:

1. The answer should be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.

2. The response also include a cover page containing the title of the assignment, the student's name, the course title, and the date. The cover page is not included in the required page length.

3. Also Include a reference page. The Citations and references should follow APA format. The reference page is not included in the required page length.

The specific course learning outcomes associated with this assignment are:

• Describe and apply the 14 areas of common practice in the Department of Homeland Security (DHS) Essential Body of Knowledge.

• Describe best practices in cybersecurity.

• Describe system, application, network, and telecommunications security policies and response.

• Evaluate the ethical concerns inherent in cybersecurity and how these concerns affect organizational policies.

• Use technology and information resources to research issues in cybersecurity.

• Write clearly and concisely about topics associated with cybersecurity using proper writing mechanics and technical style conventions.

Solution Preview :

Prepared by a verified Expert
Management Information Sys: Provide an equipment list of network security devices
Reference No:- TGS02951056

Now Priced at $40 (50% Discount)

Recommended (94%)

Rated (4.6/5)