Answered step by step
Verified Expert Solution
Link Copied!

Question

00
1 Approved Answer

Assignment 5: Remote Access Security Plan and Documentation Learning Objectives and Outcomes You will learn how setting up a defense-in-depth plan can be complicated

image text in transcribedimage text in transcribed

Assignment 5: Remote Access Security Plan and Documentation Learning Objectives and Outcomes You will learn how setting up a defense-in-depth plan can be complicated and involve several technologies and layers. You will learn about potential conflicts in real-world requirements. Assignment Requirements You have been working as a technology associate in the information systems department at Corporation Techs for more than two months now. Corporation Techs' information technology (IT) department is setting up a new network in a remote office for an engineering firm. The network requires several groups: Project Management, Engineering, Drafting, and Architecture. The office is being set up near the project site and therefore, is separate from the main office. Further, several key employees will need access to | the main office and remote office computer services. A network security and Virtual Private Network (VPN) plan is needed to connect it all together. The network should segment for the four major groups with VPN access allowed by specific remote workers into each group. Tasks Develop a network security plan, basic topology, and VPN plan for this remote office. The security plan should keep the main office and its digital assets safe in case of a failure at the remote office. Remote Office Project Management Engineering Drafting Architecture Submission Requirements Format: Microsoft Word Font: Arial, 12-point, Double-Space Citation Style: APA Style where needed Length: 3-4 pages Self-Assessment Checklist I identified at least four different ways to protect digital assets with a defense-in-depth approach. I explained at least three methods to protect corporate digital assets from the potential threats the host-to-gateway VPN would introduce. I explained the overall network topology.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access with AI-Powered Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Research Methods for Business A Skill Building Approach

Authors: Uma Sekaran, Roger Bougie

6th edition

978-1119942252

Students also viewed these Computer Network questions