Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Instructions: Design a network to show how users log in, the flow of data, protections, etc. Be specific. Additionally, show how all of the components

image text in transcribed

Instructions: Design a network to show how users log in, the flow of data, protections, etc. Be specific. Additionally, show how all of the components are used in the network. Pay close attention to the assignment as each component will build on the other. Keep in mind this is a conceptual/ hands-on project. 1. Define the following Network Components in detail: Routers Switches Application & Web Server Firewall File Server Workstation Domain Cloud User-Domain (employees, consultants, contractors) Service Domain 2. Using the same concepts above, design a simple network. 3. Apply the following Network Security concepts to the simple network above. In other words, how would the following apply? Show where and how confidentiality is applied in the network Explain what controls are in place to Protect the integrity of data Explain how availability controls are in use in your network. Look at your infrastructure show availability. Ensure the privacy of personally identifiable data Enforce access control Monitor the IT environment for violations of policy (what product could you use to monitor the network to ensure technical/ logical policies are in place. Using controls discussed in class, what would you use for authentication? Instructions: Design a network to show how users log in, the flow of data, protections, etc. Be specific. Additionally, show how all of the components are used in the network. Pay close attention to the assignment as each component will build on the other. Keep in mind this is a conceptual/ hands-on project. 1. Define the following Network Components in detail: Routers Switches Application & Web Server Firewall File Server Workstation Domain Cloud User-Domain (employees, consultants, contractors) Service Domain 2. Using the same concepts above, design a simple network. 3. Apply the following Network Security concepts to the simple network above. In other words, how would the following apply? Show where and how confidentiality is applied in the network Explain what controls are in place to Protect the integrity of data Explain how availability controls are in use in your network. Look at your infrastructure show availability. Ensure the privacy of personally identifiable data Enforce access control Monitor the IT environment for violations of policy (what product could you use to monitor the network to ensure technical/ logical policies are in place. Using controls discussed in class, what would you use for authentication

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Students also viewed these Databases questions

Question

=+/ Is this objective realistically attainable?

Answered: 1 week ago

Question

What are the need and importance of training ?

Answered: 1 week ago

Question

What is job rotation ?

Answered: 1 week ago