• help@unquite.com
  • +1 302 231 1203

QUESTION'S DESCRIPTION

$ 250
CIS 550 and CIS 532 Week 10 Term Papers Custom Work

Question Posted By

Online
  • gallantkellly
  • Questions : 147
  • Solutions : 336

Question Description

CIS 550 Week 10 Term Paper

If you are using the Blackboard Mobile Learn IOS App, please click "View in Browser."

Click the link above to submit your assignment.

Students, please view the "Submit a Clickable Rubric Assignment" in the Student Center. 
Instructors, training on how to grade is within the Instructor Center.

Term Paper: DigiNotar, Part 6B

Due Week 10 and worth 200 points

DigiNotar was a Certificate Authority (CA) whose security was breached in 2011. In your term paper, you are to play the role of a CIO and review the role CAs provide. Provide a historical perspective of CAs and their significance to the Internet and organizations. Your paper will review the events that lead to the breach of DigiNotar and the factors that would have mitigated it.

Write a ten to sixteen (10-16) page paper in which you develop a security policy document for your mid-sized organization that will include measures to protect against breaches and act as a proactive defense. You may select a fictitious name for your organization for the purpose of this paper. Do not duplicate a company’s existing policy. Create your own unique work based on what you have learned in this course. Policy reference materials can be found in Part 6B of your textbook. There will be two (2) major sections of the handbook: Policy Introduction and Policy Criteria.

Section 1: Policy Introduction
In two to four (2-4) pages total, develop a policy introduction that secures the reason for the policy. It must include the following four (4) items:

  1. Document information
  2. Audience
  3. Purpose
  4. Scope

Section 2: Policy Criteria
In eight to twelve (8-12) pages total, develop a security policy to protect against breaches and act as a proactive defense. It must include the following five (5) policy items:

  1. Objectives
  2. Compliances
  3. Responsibilities
  4. Implementation
  5. Controls
  6. Use at least four (4) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Develop policies and procedures to provide necessary countermeasures to common security threats and vulnerabilities.
  • Use technology and information resources to research issues in information security.
  • Write clearly and concisely about security management using proper writing mechanics and technical style conventions.

Grading for this assignment will be based on answer quality, logic/organization of the paper, and language and writing skills. Click here to access the rubric for this assignment.

 

CIS 532 Week 10 Assignment 5: Technical Term Paper

Students, please view the "Submit a Clickable Rubric Assignment" in the Student Center.
Instructors, training on how to grade is within the Instructor Center.

Assignment 5: Technical Term Paper
Due Week 10 and worth 150 points

The Technical Term Paper will include the detailed response to the network design request. The document will be submitted in MS Word and will be between 10-15 pages with graphics embedded within the document.

Background

You are a small network design company called Wide-IP that is looking for that big break. As the CTO of the Wide-IP company, you recently made a persuasive presentation of your company's approach to designing networks at a large industry event. The CEO of Fiction Corporation, a large retail chain, was impressed by your presentation. It looks like you've finally got your break! You have a small team of 10 technically proficient staffers with a strong background in project management, networking, and internetworking skills that include PMP, Network+, CCNP, and CISSP credentials.

You have been selected by Fiction Corporation to develop a network design document and plan without an RFP.

Overview

Fiction Corporation, a large national retail chain of 10,000 employees and 500 retail outlets, is migrating its one primary data center operation to a new headquarters building several miles away. The company wishes to upgrade its network and correct any security flaws in its infrastructure as part of this move. The Fiction CEO has informed you that the capital budget for this migration cannot exceed $500,000 and must not interrupt business operations. What follows is a brief background that will serve as your foundation in developing the network design.

The data in the center supports remote retail locations, an off-site 100 seat call center and 3 remote warehousing operations 24 hours a day with annual uptime at 99.9%. Any significant downtime to its production systems would impact Fiction Corporation's operations and profitability. From the data processing viewpoint, the move includes 2 large UPS, 4 RS/6000 AIX application servers, 10 virtualized servers and 20 PC servers.

The network consists of approximately 500 remote location retail stores connected via frame relay (with ISDN backup) to 10 routers at the data center running a common LAN shared by the entire organization. The retail operations also run WLANs that are on its own subnet. You will have a T1 link and ISDN as a primary backup. Network managers also need to monitor the status of remote systems. The SNMP management system must be able to detect and report failure of the remote system or its communications link and the status of individual applications.

The company wishes a seamless migration that minimizes impact to its customers and employees. Any gaps in this background will require you to make sound technical and persuasive assumptions that satisfy the customer's goals that are within the budget guidelines.

You were selected in part due to your detailed analysis and agreement to an implementation cost that will not exceed $500,000. Your network migration plan will be in phases with noted milestones. Key to the success of this plan is the availability of a T1 link between the remote sites to support remote bridging and development of configurations for all the remote routers.

Include the following in your assignment:
1. Title page
2. Table of contents
3. Executive summary
4. Project goal
5. Project scope
6. Design requirements:

a. Business goals
b. Technical goals
c. User communities and data stores
d. Network applications

7. Current state of the network
8. Logical design
9. Physical design
10. Results of network design testing

11. Discuss the availability of a T1 link.
11. Implementation plan with a project schedule
12. Project budget with a return on investment calculation
13. Design document appendix

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Design a systematic network architecture plan in accordance with network design steps.
  • Summarize among scalability, availability, performance security, manageability, usability, adaptability, and affordability as they relate to internetworking product selection.
  • Design a network topology to include hierarchy, redundancy, modularity, and security.
  • Create a network security plan inclusive of identifying and analyzing network assets, security risks, security requirements, and security policy.
  • Develop network management strategies to include resource monitoring and data collection and interpretation.
  • Describe processes that address performance, faulty, configuration, security, and accounting management.
  • Compare and contrast the selection of technologies and devices for campus and enterprise networks that include remote access networks, WANs, service providers, end user remote access devices, central site remote access devices, VPN concentrators, and routers.
  • Develop network design testing procedures through services, tools, and testing scripts.
  • Describe optimal network design for critical business applications to include effective use of bandwidth and satisfying QoS requirements.
  • Develop a comprehensive network design document.
  • Use technology and information resources to research issues in network architecture and analysis.
  • Write clearly and concisely about network architecture and analysis using proper writing mechanics and technical style conventions.

Click here to view the grading rubric for this assignment.

 


Available Solutions
$ 250
CIS 550 and CIS 532 Week 10 Term Papers Custom Work

Answer Posted By

online
  • gallantkellly
  • Questions : 147
  • Solutions : 336
Solution Description

xxxxxxxxxxxxxx 550 xxxx 10 xxxx Paper xxxxxx Work

CIS xxx Week xx Assignment xx Technical xxxx Paper xxxxxx Work

 

Buy Solution !
JOIN OUR NEWLETTER

Be the first to receive exciting news,features and special offers from Minds Blow

Copyrights © 2016 | Unquite.com is a Part of Minds Blow LLC and All Rights Reserved With Minds Blow LLC

Uploading copyrighted material is strictly prohibited. Refer to our DMCA Policy for more information.

This is an online marketplace for tutorials and study guides. All the content is provided by third parties and unquite.com is not liable for the similarity.