Question: Assignment 5: Remote Access Security Plan and Documentation Learning Objectives and Outcomes You will learn how setting up a defense-in-depth plan can be complicated

Assignment 5: Remote Access Security Plan and Documentation Learning Objectives and OutcomesYou will learn how setting up a defense-in-depth plan can be complicated

Assignment 5: Remote Access Security Plan and Documentation Learning Objectives and Outcomes You will learn how setting up a defense-in-depth plan can be complicated and involve several technologies and layers. You will learn about potential conflicts in real-world requirements. Assignment Requirements You have been working as a technology associate in the information systems department at Corporation Techs for more than two months now. Corporation Techs' information technology (IT) department is setting up a new network in a remote office for an engineering firm. The network requires several groups: Project Management, Engineering, Drafting, and Architecture. The office is being set up near the project site and therefore, is separate from the main office. Further, several key employees will need access to | the main office and remote office computer services. A network security and Virtual Private Network (VPN) plan is needed to connect it all together. The network should segment for the four major groups with VPN access allowed by specific remote workers into each group. Tasks Develop a network security plan, basic topology, and VPN plan for this remote office. The security plan should keep the main office and its digital assets safe in case of a failure at the remote office. Remote Office Project Management Engineering Drafting Architecture Submission Requirements Format: Microsoft Word Font: Arial, 12-point, Double-Space Citation Style: APA Style where needed Length: 3-4 pages Self-Assessment Checklist I identified at least four different ways to protect digital assets with a defense-in-depth approach. I explained at least three methods to protect corporate digital assets from the potential threats the host-to-gateway VPN would introduce. I explained the overall network topology.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Computer Network Questions!