Question: Instructions: Design a network to show how users log in, the flow of data, protections, etc. Be specific. Additionally, show how all of the components

 Instructions: Design a network to show how users log in, the

Instructions: Design a network to show how users log in, the flow of data, protections, etc. Be specific. Additionally, show how all of the components are used in the network. Pay close attention to the assignment as each component will build on the other. Keep in mind this is a conceptual/ hands-on project. 1. Define the following Network Components in detail: Routers Switches Application & Web Server Firewall File Server Workstation Domain Cloud User-Domain (employees, consultants, contractors) Service Domain 2. Using the same concepts above, design a simple network. 3. Apply the following Network Security concepts to the simple network above. In other words, how would the following apply? Show where and how confidentiality is applied in the network Explain what controls are in place to Protect the integrity of data Explain how availability controls are in use in your network. Look at your infrastructure show availability. Ensure the privacy of personally identifiable data Enforce access control Monitor the IT environment for violations of policy (what product could you use to monitor the network to ensure technical/ logical policies are in place. Using controls discussed in class, what would you use for authentication? Instructions: Design a network to show how users log in, the flow of data, protections, etc. Be specific. Additionally, show how all of the components are used in the network. Pay close attention to the assignment as each component will build on the other. Keep in mind this is a conceptual/ hands-on project. 1. Define the following Network Components in detail: Routers Switches Application & Web Server Firewall File Server Workstation Domain Cloud User-Domain (employees, consultants, contractors) Service Domain 2. Using the same concepts above, design a simple network. 3. Apply the following Network Security concepts to the simple network above. In other words, how would the following apply? Show where and how confidentiality is applied in the network Explain what controls are in place to Protect the integrity of data Explain how availability controls are in use in your network. Look at your infrastructure show availability. Ensure the privacy of personally identifiable data Enforce access control Monitor the IT environment for violations of policy (what product could you use to monitor the network to ensure technical/ logical policies are in place. Using controls discussed in class, what would you use for authentication

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!