Assignment 1 (JM5)

Instructions are attached.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper



!.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper



#.

$.

%.

!.
#.

Assignment 1: Defense in Depth Instructions (JM5)
Oftentimes, the process of implementing security opens one’s eyes to other forms
of security not previously considered. Well, in this assignment you should
experience just that. This assignment focuses on a model of implementing
security in layers which in many cases requires a network that is designed
accordingly. In this assignment, you are to design a network to incorporate the
following:
Corporate Site (Chicago)

All servers exist here (Web server, file server, print server, mail server, ftp
server)
Connection to the Internet (50mbps)
300 employees who only need access to local corporate resources and the
Internet

1 Remote Site (8 miles away)
20 employees who need access to all resources at corporate plus the Internet
Connection to the Internet (3mbps)

Write a paper in which you:
Using Microsoft Visio or its open source alternative, design a network diagram,
particularly with defense in depth in mind which depicts:

All network devices used (routers, switches, hubs, firewalls, VPNs,
proxies, and/or others)
The interconnections between network devices
The end user (client) devices (desktops, laptops)
The Internet cloud, generically, to represent your network’s interface to
the Internet

Describe the flow of data through your network, and explain how your network
design provides multiple layers of security.
Use at least four(4) quality resources in this assignment. (Note: Wikipedia and
similar websites do not qualify as quality resources.)
Include charts or diagrams created in Visio or an equivalent such as Dia. The
completed diagrams/charts must be imported into the Word document before
the paper is submitted.

Your assignment must follow these formatting requirements:
Use proper APA format.
Include a cover page containing the title of the assignment, the student’s
name, the professor’s name, the course title, and the date. The cover page
and the reference page (if applicable) are not included in the required
assignment page length.

The specific course learning outcomes associated with this assignment are:
Explain the essentials of Transmission Control Protocol / Internet Protocol
(TCP / IP) behavior and applications used in IP networking.



Identify network security tools and discuss techniques for network protection.
Use technology and information resources to research issues in network
security design.
Write clearly and concisely about Advanced Network Security Design topics
using proper writing mechanics and technical style conventions.

Note: The graphically depicted solution is not included in the required page
length.

Calculate your order
Pages (275 words)
Standard price: $0.00
Client Reviews
4.9
Sitejabber
4.6
Trustpilot
4.8
Our Guarantees
100% Confidentiality
Information about customers is confidential and never disclosed to third parties.
Original Writing
We complete all papers from scratch. You can get a plagiarism report.
Timely Delivery
No missed deadlines – 97% of assignments are completed in time.
Money Back
If you're confident that a writer didn't follow your order details, ask for a refund.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00
Power up Your Academic Success with the
Team of Professionals. We’ve Got Your Back.
Power up Your Study Success with Experts We’ve Got Your Back.

Order your essay today and save 30% with the discount code ESSAYHELP