Cybersecurity

Scenario:
A university wants to set up a WAN with enhanced routing and communication capabilities between two large buildings that are 500 feet apart on campus. The network must have a service provider link to a remote set of servers on the cloud.

Instructions:
For this assignment, you must write a technical paper that presents a solution for the scenario.

Your paper should include the following:

Discuss the type of infrastructure that needs to be in place.
Determine what methods of transmitting data packets should be used.
Select and justify the types of switching that should be used (e.g., packet, circuit, message, cell relay, frame relay, ATM, other)
Determine whether or not technologies like FDDI, SONET, SD-WAN, SMDS, or other options should be incorporated into the network. Explain your reasoning.
Explain the protocols that are relevant to the WAN.
Provide a critical analysis of your recommendations and articulate the potential risks involved or other considerations that may be necessary to implement them. Justify and support from the literature.
Include a diagram that details the components and types of links between the buildings and the link that leaves the premises to a remote cloud installation. The diagram must be your own creation using diagramming tools like Visio, Lucidchart, Smartdraw, or OpenOffice-Draw. Diagrams adapted from internet sources will not be accepted.
Length: 5-7 page technical paper, and network conceptual diagram file

Resources: Cite at least 3 resources

The completed assignment should address all of the assignment requirements, exhibit evidence of concept knowledge, and demonstrate thoughtful consideration of the content presented in the course. The writing should integrate scholarly resources, reflect academic expectations and current APA standards, and adhere to Northcentral University’s Academic Integrity Policy.

Upload the completed assignment and click the Submit to Dropbox button.

Due Date
Mar 20, 2022 11:59 PM
Submit Assignment
Files to submit
(0) file(s) to submit

After uploading, you must click Submit to complete the submission.
Comments

Cybersecurity

This assignment will be submitted to Turnitin®.
Instructions
For this assignment, you must research three network diagnostic tools and write a short paper that compares the different network diagnostic tools. Do not use protocol analyzers for this assignment. Protocol analyzers will be reviewed in Week 2.

Your paper should address the following questions:

What is a network diagnostics tool and how it is used by organizations?
How do your selected tools work?
Which main criteria should be used as part of this evaluation and tool selection?
How are your selected tools similar? How do they differ? Create a table that compares each tool in terms of functionality, advantages, disadvantages, etc.
Which tools are most effective? Justify your choices.
Length: 3-5 pages

Resources: Cite at least 3 scholarly resources.

The completed assignment should address all of the assignment requirements, exhibit evidence of concept knowledge, and demonstrate thoughtful consideration of the content presented in the course. The writing should integrate scholarly resources, reflect academic expectations and current APA standards, and adhere to Northcentral University’s Academic Integrity Policy.

Cybersecurity

For this assignment, you must prescribe corporate standards based on lessons you learned this week for requesting access to OS and applications.

Be sure your paper addresses the following:

Determine and document the corporate standard(s).
Include the process (how you will do it).
Identify the minimum-security requirements.
Password length
Account type definitions
Multi-factor authentication
Password expiration
Length: 3 to 5-page paper

References: Include a minimum of 3 scholarly resources.

The completed assignment should address all of the assignment requirements, exhibit evidence of concept knowledge, and demonstrate thoughtful consideration of the content presented in the course. The writing should integrate scholarly resources, reflect academic expectations and current APA standards, and adhere to Northcentral University’s Academic Integrity Policy.

When applicable, conduct a Turnitin pre-check and then upload your completed assignment and click the Submit to Dropbox button.

Cybersecurity

Week 4 Assignment: Explain the Distribution of Denial of Service (DDoS) Defense Strategy
Hide Folder Information
Turnitin®
Turnitin® enabledThis assignment will be submitted to Turnitin®.
Instructions
For this assignment, create a memo to explain to the CSO the purpose of a recommended strategy, which is designed to protect the organization from DDoS attacks. Be sure to describe the pros and potential cons of your strategy.

Length: 2 to 3-page paper

References: Include a minimum of 3 scholarly resources.

The completed assignment should address all of the assignment requirements, exhibit evidence of concept knowledge, and demonstrate thoughtful consideration of the content presented in the course. The writing should integrate scholarly resources, reflect academic expectations and current APA standards, and adhere to Northcentral University’s Academic Integrity Policy.