Your Perfect Assignment is Just a Click Away

We Write Custom Academic Papers

100% Original, Plagiarism Free, Customized to your instructions!

glass
pen
clip
papers
heaphones

UMUC Online Network Security For The University Proposal

UMUC Online Network Security For The University Proposal

Paper 1 Teacher comments:
Please see my comments on each section below. In general, make sure that you develop each of the required elements, technical requirements, proposed solution, justification, for each section. Following the templates provided can help with this.
Assessed the appropriate vulnerability assessment tools to support the requirements of the organization: Well done.Identified the appropriate security policy for the organization: You have mentioned many good security controls here, but these items do not address security policy. This section should address the security policy requirement, propose a solution, and justify the solution. Be specific when defining the overall security outlook for the organization, discussing the various plans and documents that make up a security policy, their value to the organization, and how the policy meets the requirements of the given scenario. Describe the proper risk management solution to reduce risk to an acceptable level: This section does not really address the topic of risk management. Discuss the requirements for a risk management practice, propose a solution (discuss the process in detail, including relevant formulas and methodologies), and justify your selection of methodologies. Be sure to use the proper risk management terminology.Assessed the appropriate business continuity plan to enable critical organizational functions to continue: Some of the elements you discuss here are relevant to the BCP process overall. This section needs to discuss the BCP planning process. You will need to discuss the BCP activities in detail, including a discussion of each of the included plan type. Be sure to develop all three sections, requirements, proposal, and justification.Assessed the proper access control models for the organization: You’ve got a good start here to the discussion of access controls. This section should discus the requirements in relation to the given scenario, propose a clear, detailed solution, and justify your selection of controls. Be specific about the access control model you select and why it’s appropriate. Satisfy standards of writing style and grammatical correctness: No spelling and/or grammar errors are noted but the formatting and spacing changes throughout the document making it more difficult to read in addition to being inconsistent with the assignment guideline of producing a network proposal. I would recommend closely following the templates provided in the project project instructions section.

Paper 2 Teacher Comments:
Assessed the appropriate physical security for the organization: You have identified a few elements of physical security but this section fails to address adequately the three primary factors of prevention, detection, and recovery. For the requirements, discuss the physical threats present in the given scenario. For your proposal, suggest controls that meet those requirements, and then justify why you selected those controls. Identified the appropriate mobile device security to implement: This section generically talks to a few specific controls but fails to address the topic with depth and detail. This section should include smartphones, laptops, tablets, and any other mobile device that may be introduced in the UMUC environment. Consider the implications of both university-owned devices and BYOD. Discuss the threats presented by these devices. Assessed the proper perimeter defenses to defend the organization: This section addresses the appropriate controls and architecture for the perimeter. This section is missing the appropriate discussion of the the technical requirements. Discuss the types of threats present at the perimeter and how your recommendations address those threats.Assessed the proper network defense devices to defend the organization: The identification and description of an IDS/IPS is one appropriate measure for network defense. IDS/IPS systems are just one element of a defense strategy for the network segment. Consider the different types of attacks in this segment, security appliances, infrastructure appliances, and the network configuration to implement.Assessed the proper host defense to defend the organization: VPNs are related to host connectivity but do not address host-based security measures. Consider the various threats at the host segment and discuss a defense-in-depth solution to mitigate those threats. Be detailed and thorough.

Paper 3 Teacher Comments:
Assessed the appropriate public key infrastructure implementation: This is a very good discussion of what PKI is and the importance of issuing/using class 3 certificates. As with previous work submissions, this section does not address the primary assignment requirements or presenting the technical requirements, proposal, and justification. How does this information you presented apply to the given scenario? What is required to establish a PKI enviornment? Be specific when discussing the implementation and configuration required for the PKI solution, not just the certificate.Identified the secure protocol implementation given the network design: This section should consider data as it is in transit and discuss the numerous scenarios and solutions to protect it. IPSEC is one possible protocol, but how and why is it implemented? How does it apply to the given scenario? There are numerous scenarios involving data in transit that should be addressed here.Assessed the appropriate file encryption implementation: Disk encryption is one possible implementation of file encryption. How does it apply to the given scenario? Your discussion of encryption on mobile devices is interesting, but, is it applicable? As with the previous section, there are numerous scenarios relating to data at rest that should be discussed here.Assessed the appropriate implementation for hashing method: This section should consider where hashing should be implemented in the network design and explain what it provides in each instance.Assessed the proper backup and restoration implementation for the organization: This section should explain the backup process, where it is applicable in the UMUC network scenario, and how it will be achieved (process, hardware, and frequency).

Order Solution Now

Our Service Charter

1. Professional & Expert Writers: Homework Discussion only hires the best. Our writers are specially selected and recruited, after which they undergo further training to perfect their skills for specialization purposes. Moreover, our writers are holders of masters and Ph.D. degrees. They have impressive academic records, besides being native English speakers.

2. Top Quality Papers: Our customers are always guaranteed of papers that exceed their expectations. All our writers have +5 years of experience. This implies that all papers are written by individuals who are experts in their fields. In addition, the quality team reviews all the papers before sending them to the customers.

3. Plagiarism-Free Papers: All papers provided by Homework Discussion are written from scratch. Appropriate referencing and citation of key information are followed. Plagiarism checkers are used by the Quality assurance team and our editors just to double-check that there are no instances of plagiarism.

4. Timely Delivery: Time wasted is equivalent to a failed dedication and commitment. Homework Discussion is known for timely delivery of any pending customer orders. Customers are well informed of the progress of their papers to ensure they keep track of what the writer is providing before the final draft is sent for grading.

5. Affordable Prices: Our prices are fairly structured to fit in all groups. Any customer willing to place their assignments with us can do so at very affordable prices. In addition, our customers enjoy regular discounts and bonuses.

6. 24/7 Customer Support: At Homework Discussion, we have put in place a team of experts who answer to all customer inquiries promptly. The best part is the ever-availability of the team. Customers can make inquiries anytime.