Limited Offer Get 25% off — use code BESTW25
No AI No Plagiarism On-Time Delivery Free Revisions
Claim Now

Assignment 1 Scenario 1 Assume you are a security professional for an educational institution with 10 servers. Researchers on campus push a lot of traffic over the network, which slows performance at times. You also have a limited budget. You are evaluating both stand-alone and embedded firewalls in preparation of a purchase. A stand-alone firewall filters traffic before it reaches your servers, while an embedded firewall would be implemented on each server.

Assignment 1

Scenario 1

Assume you are a security professional for an educational institution with 10 servers. Researchers on campus push a lot of traffic over the network, which slows performance at times. You also have a limited budget. You are evaluating both stand-alone and embedded firewalls in preparation of a purchase. A stand-alone firewall filters traffic before it reaches your servers, while an embedded firewall would be implemented on each server.

Answer the following question(s):

Which type of firewall would you choose? Why?

 

Scenario 2

The process of reaching security goals is a continual process that requires specific direction. An organization’s success at complying with its internal security policy and external security regulations depends, in part, on clearly stated goals.

Answer the following question(s):

What are two potential consequences to an organization that does not have clearly stated goals? Why?

 

Assignment 1 Submission Requirements

Format: Microsoft Word (or compatible)    

Font: Arial, size 12, double-space    

Citation Style: APA 

Length: At least 500 words

References: At least 4 credible scholarly references

No Plagiarism

 

 

Assignment 2

Scenario

Due to the Always Fresh expansion, management wants additional network controls to protect their growing network.

Tasks

Consider the Windows servers and workstations in the domains of a typical IT infrastructure. Based on your understanding of network security controls, recommend at least four possible controls that will enhance the network’s security. Focus on ensuring that controls satisfy the defense in depth approach to security.

Summarize your network security controls in a summary report to management. You must provide rationale for your choices by explaining how each control makes the environment more secure. Self-Assessment Checklist

·       I selected appropriate network security controls for the Always Fresh network environment.

·       I provided rationale for my choices by explaining how each control makes the environment more secure.

·       I created a well-developed and formatted summary report with proper grammar, spelling, and punctuation.

·       I followed the submission guidelines.

Assignment 2 Submission Requirements

Format: Microsoft Word (or compatible)    

Font: Arial, size 12, double-space    

Citation Style: APA 

Length: At least 3 pages

References: At least 4 credible scholarly references

No plagiarism

Plagiarism Free Assignment Help

Expert Help With This Assignment — On Your Terms

Native UK, USA & Australia writers Deadline from 3 hours 100% Plagiarism-Free — Turnitin included Unlimited free revisions Free to submit — compare quotes
Scroll to Top