ZXY Corporation has relocated to a new building that was wired and set up for a local area network (LAN). The company implemented a client/server-based network in which all printers, folders, and other resources are shared but everyone has access to everything and there is no security outside of the defaults that were in place when the system was set up.
You have been hired to secure ZXY’s network and ensure that the company has the highest levels of security to protect against internal and external attacks. In an 8-10 page proposal, include the following items to provide a comprehensive secure environment:
A plan to provide secure access control methods for all user access
A password which includes complexity, duration, and history requirements
A cryptography method to ensure vital data is encrypted
A remote access plan to ensure that users who access the network remotely do so in a secure and efficient manner
A thorough plan to protect the network from malware and various types of malicious attacks
Your proposal should include all of the elements noted above with support, detail, and elaboration for each section explicitly grounded in knowledge from the assigned readings and media along with any outside sources you may choose to bring into your writing.
Your paper should be 8-10 pages in length with document formatting and citations of sources in conformity with CSU-Global Guide to Writing and APA Requirements.
(I can't provide you with any material from the class, but I can give you a basic description of the methods we learned for securing IT. The assigned reading and media for the course includes the most widely accepted, well-known, but also the NEWEST and BEST methods used today regarding plans to provide secure access, password cryptography, remote access plans, and protection against malware and other malicious attacks.)
And yes, the submission deadline is Sunday, June 28th, which is actually nine days from today, instead of seven. I hope this is ok. Thanks very much!
Length: 8 pages (2200 Words)
Information Technology security is vital for the success of any organization. As such, companies are supposed to put in place proper security to prevent external attacks as well as proper internal operations. For this reason, ZXY needs to have proper threat-vulnerability assessment and risk likelihood determination in order to come up with proper plans to secure the company’s infrastructure and internal operations.
* Once your purchase is processed by paypal you will be redirected back to this page and you'll have the option to download the paper. We'll also send the paper to your paypal email address as proof of purchase.Download Paper