NETWORK DESIGN PROJECT

  Assume that you are designing a network architecture for a complex enterprise with adiverse application, user community, and end-user device mix. This enterprise hasexposure to the Internet in addition to providing remote access for employees to internalsites via a Virtual Private Network (VPN).2. Choose a specialty topic from Module 7: Week 7 (Cellular Security, Cloud Security,Optical Wireless Security, RFID Security, Industrial Security, Bluetooth Security, orInternet of Things (IOT) Security). Sample references are included in Blackboard. Notethat any other topic besides these must be approved in advance by the instructor.3. Create a network diagram for the fictitious Liberty Beverages Corporation using anydiagramming tool you wish (e.g., Visio, MS Paint, application at http://www.draw.io) forthe diagram but be sure to paste a standard image (e.g., JPG, PNG) of it in the finalreport. Include at least the following elements:a. Remote devices used by employees and vendorsb. Demilitarized Zone (DMZ) facing externallyc. Firewall(s)d. IDS/IPS solutione. SIEMf. Components integrated from chosen specialty topic4. Describe and define the following security threats with at least a paragraph each. Alsodescribe what makes each vulnerability a threat and impact to the business.a. Denial of Service (DOS) and Distributed Denial of Service (DDOS) attacksb. Worms, virus, Trojan horses, and other malware.c. Man-in-the-middle (MITM) attacksd. Rootkit injectionse. Misconfiguration of remote mobile devices5. Document how five (5) or more components and measures in the network architecture, aswell as host-based measures, address the security threats from the previous step. Thecomponents could be a combination of software or hardware in nature such as firewalls, IDS/IPS, routers, switches, anti-virus/malware software, full-disk encryption (FDE) andencryption in transit, remote device management software, etc.6. Describe in three (3) or more paragraphs the specific security threats regarding thespecialty topic you chose. These are in addition to those from step 4.7. Describe in three (3) or more paragraphs the security controls (and their rationale forinclusion) that you will implement to mitigate against the security threats of the chosenspecialty.8. Beyond the network design, what additional procedural/governance measures do yourecommend to address security concerns (e.g., training, procedures, policies)? Describe intwo (2) or more paragraphs at least one measure.9. Describe in one or more paragraphs how biblical principles come to bear with yourproposed design and approach. Include specific scriptural references.OutputsWrite a project report in a research-based paper in current APA format that includes all theinstructions described above. It must be ten (10) or more double-spaced pages of content. Theassignment must also include a title page, as well as a reference page with at least 10 references inaddition to the course textbook and the Bible. Share on Facebook Tweet Follow us This question has been answered. Get Answer

QUALITY: 100% ORIGINAL PAPER NO ChatGPT.NO PLAGIARISMCUSTOM PAPER

Best Custom Essay Writing Services

Looking for unparalleled custom paper writing services? Our team of experienced professionals at AcademicWritersBay.com is here to provide you with top-notch assistance that caters to your unique needs.

We understand the importance of producing original, high-quality papers that reflect your personal voice and meet the rigorous standards of academia. That’s why we assure you that our work is completely plagiarism-free—we craft bespoke solutions tailored exclusively for you.

Why Choose AcademicWritersBay.com?

  • Our papers are 100% original, custom-written from scratch.
  • We’re here to support you around the clock, any day of the year.
  • You’ll find our prices competitive and reasonable.
  • We handle papers across all subjects, regardless of urgency or difficulty.
  • Need a paper urgently? We can deliver within 6 hours!
  • Relax with our on-time delivery commitment.
  • We offer money-back and privacy guarantees to ensure your satisfaction and confidentiality.
  • Benefit from unlimited amendments upon request to get the paper you envisioned.
  • We pledge our dedication to meeting your expectations and achieving the grade you deserve.

Our Process: Getting started with us is as simple as can be. Here’s how to do it:

  • Click on the “Place Your Order” tab at the top or the “Order Now” button at the bottom. You’ll be directed to our order form.
  • Provide the specifics of your paper in the “PAPER DETAILS” section.
  • Select your academic level, the deadline, and the required number of pages.
  • Click on “CREATE ACCOUNT & SIGN IN” to provide your registration details, then “PROCEED TO CHECKOUT.”
  • Follow the simple payment instructions and soon, our writers will be hard at work on your paper.

AcademicWritersBay.com is dedicated to expediting the writing process without compromising on quality. Our roster of writers boasts individuals with advanced degrees—Masters and PhDs—in a myriad of disciplines, ensuring that no matter the complexity or field of your assignment, we have the expertise to tackle it with finesse. Our quick turnover doesn’t mean rushed work; it means efficiency and priority handling, ensuring your deadlines are met with the excellence your academics demand.

ORDER NOW and experience the difference with AcademicWritersBay.com, where excellence meets timely delivery.

NO PLAGIARISM