Question: Computer Science computer sciencee 9 J&L Coffee Inc. Purpose: To give you experience designing a secure network infrastructure. Directions: You have been selected as a

Computer Science computer sciencee9
J&L Coffee Inc.
Purpose: To give you experience designing a secure network infrastructure.
Directions: You have been selected as a consultant to design a secure network for J&L Coffee. To complete this project, read the scenario below and submit the required milestones when they are due. You may use any resources, including books, the Internet, and other appropriate sources to complete this project. Remember to cite your sources. The project is complete when you have submitted all five milestones.
Please note that this scenario is based on a fictitious company, and any similarity to a real company or real people, present or past, is coincidental and unintentional.
Scenario: See the J&L Coffee Case Study in the course project folder. The written description of the case is also attached to the assignments in the class. Please refer to it for details on the case.
The requirement:
Your job as a consultant is to document the existing network, identify current vulnerabilities, and propose a redesign that addresses the vulnerabilities and provides for security best practices to minimize future problems. Your deliverables are listed below. Good luck.
Milestone 1(Begin in Module 3 Due Module 4):
Your first milestone consists of two deliverables: a Visio diagram that depicts your interpretation of the current network and a written summary of network vulnerabilities that you uncover. Your network diagram doesn't have to depict every object. Instead, you can summarize objects.
Document as-is state
Document and outline the company's current approach to endpoint security and malware protection. Include data loss prevention and vulnerability scanning tools as well.
Computer Science computer sciencee 9 J&L Coffee

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!