Task 4 – Planning Network Security Measures

Touchstone Task 4: Planning Network Security Measures

ASSIGNMENT: The Touchstone Tasks in this course will help you prepare for the final Touchstone, which you will submit at the end of Unit 4. A Touchstone is a project that demonstrates your comprehension of the course material. It will help you refine skills, and demonstrate application of knowledge. For your reference, there is more information about Touchstones in the student guide.

Having Trouble Meeting Your Deadline?

Get your assignment on Task 4 – Planning Network Security Measures completed on time. avoid delay and – ORDER NOW

There are a total of five Touchstone Tasks throughout the course:

  • Touchstone Task 1: Planning a Network Infrastructure
  • Touchstone Task 2.1: Planning Network Printer Connectivity
  • Touchstone Task 2.2: Planning IP Address Assignments
  • Touchstone Task 3: Planning a Wireless Infrastructure
  • Touchstone Task 4: Planning Network Security Measures

In this final Touchstone Task, you will formulate a plan for protecting the network in the scenario from the many types of security threats it may face. This plan may include firewalls, switch and router settings, authentication methods, password policies, physical access to equipment, and anti-malware solutions. These decisions and your rationales for them will become part of your final Touchstone report.

While you will not receive a grade or feedback on this Touchstone Task submission, doing the work now will help you complete your final project. Completing this exercise at this point of the course ensures that you are ready to move on. Further, these Touchstone Tasks build throughout the next Units and form the foundation of the presentation for your final project.

Touchstone Task 4 Template

In order to foster learning and growth, all work you submit must be newly written specifically for this course.

A. Directions

Step 1: Review Final Touchstone

Review the final Touchstone to learn more about the overall assignment and see how you will be graded. Return to this page to continue your Touchstone Task.

Step 2: Review Greenfield Properties Scenario

Review the scenario and client requirements about Greenfield Properties. You will use this information to answer questions related to network security measures.

Step 3: Answer Questions

Based on the information provided by the client, answer the questions in the Touchstone Task 4 Template in 2-4 sentences each. Be sure to explain your answers in detail.

HINTAs you review the scenario and respond to the questions, consider what the client is trying to accomplish and what they have shared about their expectations. Use these perspectives to shape your response to the questions.

Step 4: Upload Completed Questions

Select the submit button at the top of this page and follow the instructions to upload the template with your completed question responses. You will use these answers as a reference when completing the final Touchstone at the end of Unit 4.

B. Requirements

While this assignment is ungraded, we recommend you practice the following conventions, which are required for graded Touchstones:

  • Composition should be double-spaced with one-inch margins.
  • Use a readable 11- or 12-point font.
  • Use professional fonts such as Calibri, Arial, or Times New Roman. Do not use unusual fonts.
  • Composition must be original and written for this assignment, and all writing must be appropriate for an academic context.
  • Plagiarism of any kind is strictly prohibited.
  • The submission must include your name, the date, and the title of your composition.
  • Include all assignment components in a single .doc or .docx file.

 

 

Touchstone Task 4: Planning Network Security Measures

Review the scenario and client expectations about Greenfield Properties.

Based on the information provided by the client, answer the following questions in 2-4 sentences each. Be sure to explain your answers in detail.

What types of firewall systems should be used? Explain your choice. (Ref: Firewalls Technologies and Firewalls Features and Functions )

What switch or router settings can be used to secure network access? Suggest one method and briefly explain its benefit. (Ref: Security Filtering – Access Control List and VPN

Which authentication method do you recommend for user sign-in to the network? Explain your recommendation. (Ref: User Authentication Methods )

What password policies would you recommend enforcing? Explain your recommendation. (Ref: User Account and Password Security )

How will the company protect physical access to the servers? Suggest two methods and briefly explain the benefits of each one. (Ref: Network Physical Security )

What types of anti-malware software should be deployed? Explain your choice. (Ref: Anti-Malware/Anti-Virus Programs )

 

 

Explanation & Answer

Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Order Now and we will direct you to our Order Page at Litessays. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.

Do you need an answer to this or any other questions?

Similar Posts