Instructions Network Security For the purpose of this assignment, assume that you are a network administrator for a small office located in the area where you currently live (or have lived).Normally,...

1 answer below »

Instructions

Network Security
For the purpose of this assignment, assume that you are a network administrator for a small office located in the area where you currently live (or have lived).Normally, the office has 20–25 people working onsite, using either desktop or laptop computers with Ethernet connections. Because of recent events, more than 75% of the employees are working remotely now and will continue to do so for at least the next year.With so many employees suddenly working remotely, it is critical to create a plan to protect the data and limit the company’s liability for breaches. Follow the instructions below to complete this assignment:


  1. Identify the types of threats and specific threats that need to be considered when designing security protocols and operations for this network. Remember to consider threats associated with remote access. Be specific to the situation and to your area.

  2. Discuss the tools or techniques you would use to protect the network and data from each type of threat, while still allowing workers remote access to the data and applications that they need. For each tool or technique mentioned, state whether it mainly involves intrusion prevention or intrusion detection.

Your case study should be at least two pages, in addition to a title page and a reference page, (title and reference pages do not count toward the total page requirement). You should use and cite at least three sources. One source should be the readings for this unit in uCertify. Another source should come from the CSU Online Library. To locate an appropriate CSU library source, be sure not to use very specific, obscure, or older journal articles. They will not have the information you need to answer these questions.You may find the
How to Research Information Technology Topicsvideo tutorial
useful for this.Adhere to APA Style when creating citations and references for this assignment. APA formatting, however, is not necessary.
Answered 3 days AfterJun 05, 2021

Answer To: Instructions Network Security For the purpose of this assignment, assume that you are a network...

Neha answered on Jun 09 2021
133 Votes
Threats for Network and Solutions
The network security threat can be defined as the as an effort to find out the illegal admission among the organization network and al
so use the data without the knowledge of the owner or perform some malicious activity. The network security is generally at risk or vulnerable if we are having some weakness or vulnerability in the computer network (Biswas, K., & Ali, M). There are few security threats which are intended who can upset the process of the organization and the functions instead of getting the information or performance of financial motives. If there is more use and accessibility for the network, then it can increase the path for different types of the attacks and the most common technique is the denial-of-service attack. There are different types of threats for the network.
The structure threat is generally the organised or concentrated type of the attack which is performed by one or multiple attackers with the help of hacking proficiency. The attackers generally work to create a reach over the network or system to the known victim. The intended attacker can have specifically selected or identified the user, or he can have also performed a random search approach. The motive of this type of attack is to include racial or the political motives, extorsion, state motivated attack or the personal motives.
The unstructured threat is generally known for covering the disorganise attack over one or multiple networks which is done by the attackers who have restricted skills. The motive of these attacks is to attack the people with unscrupulous content. The intent can be malicious but there are different manners to ensure the...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here