Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Instructions: Design a network to show how users log in, the flow of data, protections, etc. Be specific. Additionally, show how all of the components
Instructions: Design a network to show how users log in, the flow of data, protections, etc. Be specific. Additionally, show how all of the components are used in the network. Pay close attention to the assignment as each component will build on the other. Keep in mind this is a conceptual/ hands-on project. 1. Define the following Network Components in detail: Routers Switches Application & Web Server Firewall File Server Workstation Domain Cloud User-Domain (employees, consultants, contractors) Service Domain 2. Using the same concepts above, design a simple network. 3. Apply the following Network Security concepts to the simple network above. In other words, how would the following apply? Show where and how confidentiality is applied in the network Explain what controls are in place to Protect the integrity of data Explain how availability controls are in use in your network. Look at your infrastructure show availability. Ensure the privacy of personally identifiable data Enforce access control Monitor the IT environment for violations of policy (what product could you use to monitor the network to ensure technical/ logical policies are in place. Using controls discussed in class, what would you use for authentication? Instructions: Design a network to show how users log in, the flow of data, protections, etc. Be specific. Additionally, show how all of the components are used in the network. Pay close attention to the assignment as each component will build on the other. Keep in mind this is a conceptual/ hands-on project. 1. Define the following Network Components in detail: Routers Switches Application & Web Server Firewall File Server Workstation Domain Cloud User-Domain (employees, consultants, contractors) Service Domain 2. Using the same concepts above, design a simple network. 3. Apply the following Network Security concepts to the simple network above. In other words, how would the following apply? Show where and how confidentiality is applied in the network Explain what controls are in place to Protect the integrity of data Explain how availability controls are in use in your network. Look at your infrastructure show availability. Ensure the privacy of personally identifiable data Enforce access control Monitor the IT environment for violations of policy (what product could you use to monitor the network to ensure technical/ logical policies are in place. Using controls discussed in class, what would you use for authentication
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started