Question: - 8 Information Security Architecture Mapping ? What to do & Why? Now that you've leaned about various type of equipment used to build networks

-8 Information Security Architecture Mapping
? What to do & Why?
Now that you've leaned about various type of equipment used to build networks and secure information
security assets, apply what you've learned and diagram the network for the business you've created in
the earlier moduled.
(i)
How to do it?
Construct a diagram of the network for the business you created from the floorplan.
Be sure to include details such as network address ranges, locations of firewalls and other security
controls, and all components. Also include any peripherals such as laser printers and IOT devices.
What to submit?
Use any means for creating the diagram. There are some great tools online for network diagraming, or you
can simply use Visio, MS-Word/Powerpoint, or Google Drawings
- 8 Information Security Architecture Mapping ?

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!