Assessment DescriptionIt is essential to have a basic understanding of network defense topologies in order to properly comprehend the defensive strategies deployed by companies to protect their information assets.Use the Cisco Packet Tracer application to create a network diagram that makes use of the following devices listed below, which belong to Company X. The diagram should illustrate your knowledge of network defense by placing network assets in their proper location, so as to ensure their protection. Include, within the diagram, any small office/home office (SOHO) solutions that will be used to protect either the infrastructure or end-user devices.Within the diagram make sure to include at a minimum:10 mobile devices (phones/laptops/tablets)Five desktop/stationary computersTwo servers (file/email)One printerOne router/firewallOne WAN/gateway connectionOne switchOne corresponding backup/replication asset for disaster recovery (local or remote storage/server)Note: Any IP addresses used should be labeled next to the corresponding device.Then, create a report outlining the abilities of the network topology in reference to securing network devices and other information assets used by Company X. Make sure to address the following within the report:A detailed explanation of the topology design addressing the “why” and “how” of the topology defenses solution and design, specifically threat models, motivations (such as insider threat), and ideologiesNetwork defense solution list (i.e., software/hardware used to protect information assets)Encryption policies used by the network and end-usersDisaster plan recovery, including restoration plansWhen completing the report for this assignment, refer to the “Report Template.” APA style is not required, but solid academic writing is expected.This assignment uses a basic scoring guide, provided by your instructor. Please review the scoring guide prior to beginning the assignment to become familiar with the expectations for successful completion.You are not required to submit this assignment to LopeWrite.Attachments
Assessment Description It is essential to have a basic understanding of network defense topologies in order to properly comprehend the defensive strategies deployed by companies to protect their infor
CYB-610 Network Defense System Scoring Guide Performance Level Ratings Meets Expectations Performance consistently met expectations in all essential areas of the assignment criteria, at times possibly exceeding expectations, and the quality of work overall was very good. The most critical goals were met. Near Expectations Performance did not consistently meet expectations. Performance failed to meet expectations in one or more essential areas of the assignment criteria, one or more of the most critical goals were not met. Below Expectations Performance was consistently below expectations in most essential areas of the assignment criteria, reasonable progress toward critical goals was not made. Significant improvement is needed in one or more important areas. Criteria Below Expectations Near Expectations Meets Expectations Earned The student successfully creates a diagram that illustrates network defense by placing network assets in their proper location to ensure their protection. 0 pts – 6 pts 7 pts – 9 pts 10 pts The student clearly presents the following: 10 mobile devices (1pt) (phones/laptops/tablets) Five desktop/stationary computers (1pt) Two servers (file/email) (1pt) One printer (1pt) One router/firewall (1pt) One WAN/gateway connection (1pt) One switch (1pt) One corresponding backup/replication asset for disaster recovery (local or remote storage/server (1pt) Small office/home office (SOHO) solutions that will be used to protect either the infrastructure or end-user devices (2pts) 0 pts – 6 pts 7 pts – 9 pts 10 pts The student uses appropriate graphic elements to make visual connections that contribute to the understanding of concepts and relationships. 0 pts – 2 pts 3 pts – 4 pts 5 pts The student develops a comprehensive report that outlines the abilities of the network topology in reference to securing network devices and other information assets used. The documentation is well presented. The required components are present (5 pts ea): A detailed explanation of the topology design (the why, how, threat models, motivations and ideologies) Network defense solution list (i.e., software/hardware used to protect information assets) Encryption policies used by the network and end-users Disaster plan recover, including restoration plans 0 pts – 13 pts 14 pts – 19 pts 20 pts The student correctly utilizes industry standard technical writing throughout. 0 pts – 2 pts 3 pts – 4 pts 5 pts TOTAL /50 Instructor Feedback © 2018. Grand Canyon University. All Rights Reserved.
Assessment Description It is essential to have a basic understanding of network defense topologies in order to properly comprehend the defensive strategies deployed by companies to protect their infor
CYB-610 Report Template Overview Use this section to provide a brief description for the purpose of the assignment. Details Use this section to provide the details of each step of the assignment. Provide proof of completion of each step using screen captures. Summary Use this section to provide a brief explanation of the results of the assignment. Describe why you obtained the successful or unsuccessful results for this assignment. © 2018. Grand Canyon University. All Rights Reserved.




Why Choose Us

  • 100% non-plagiarized Papers
  • 24/7 /365 Service Available
  • Affordable Prices
  • Any Paper, Urgency, and Subject
  • Will complete your papers in 6 hours
  • On-time Delivery
  • Money-back and Privacy guarantees
  • Unlimited Amendments upon request
  • Satisfaction guarantee

How it Works

  • Click on the “Place Order” tab at the top menu or “Order Now” icon at the bottom and a new page will appear with an order form to be filled.
  • Fill in your paper’s requirements in the "PAPER DETAILS" section.
  • Fill in your paper’s academic level, deadline, and the required number of pages from the drop-down menus.
  • Click “CREATE ACCOUNT & SIGN IN” to enter your registration details and get an account with us for record-keeping and then, click on “PROCEED TO CHECKOUT” at the bottom of the page.
  • From there, the payment sections will show, follow the guided payment process and your order will be available for our writing team to work on it.