Explain the use of virtual private networks vpns and their


In this assignment, you will write a paper in which you create a network security plan for a small business.

Tasks:

You are an IT manager for a small business. You are being asked to create a network security plan both for internal IT workers and for the company in general.

You are to put together a network security plan that addresses each of the following components:

  • Create a standard procedure for adding new users to a network.
  • Explain the use of virtual private networks (VPNs) and their security benefits and drawbacks.
  • Create a summary of a network plan, including the use of a firewall, written for a business person with limited knowledge of IT.
  • Document the uses of an intrusion detection system.
  • Identify and explain whether workers should be required to report potential security violations and create a policy based on your viewpoints.
  • Determine the best e-mail policy for an organization and document it for a business owner.
  • Create a password-change policy for a networking group.
  • Provide an executive summary briefing for a non-IT manager to review the business implications for the IT policies that you are recommending.

Submission Details:

  • By Monday, March 14, 2016, prepare a 7- to 9-page report. Write in a clear, concise, and organized manner; demonstrate ethical scholarship in accurate representation and attribution of sources (i.e., use APA format); and display accurate spelling, grammar, and punctuation.
  • Save your document in a Microsoft Word document with the name M5_A1_LastName_FirstIinitial.doc, and upload it to the M5 Assignment 1 LASA 2 Dropbox.

LASA 2 Grading Criteria and Rubric

All LASAs in this course will be graded using a rubric. This assignment is worth 300 points. Download the rubric and carefully read it to understand the expectations.

Assignment 1 Grading Criteria Maximum Points
Explained the use of VPNs and their security benefits and drawbacks. 32
Created a standard procedure for adding new users to a network. 36
Created a summary of a network plan, including the use of a firewall, written for a business person with limited knowledge of IT. 36
Documented the uses of an intrusion detection system. 40
Identified and explained whether workers should be required to report potential security violations and created a policy based on your viewpoints. 36
Determined the best e-mail policy for an organization and document it for a business owner. 28
Created a password-change policy for a networking group. 28
Writing Components:
  • Organization (16)
  • Usage and Mechanics (16)
  • APA Elements (24)
  • Style (8)
64
Total: 300

Request for Solution File

Ask an Expert for Answer!!
Basic Computer Science: Explain the use of virtual private networks vpns and their
Reference No:- TGS01302455

Expected delivery within 24 Hours