Your Perfect Assignment is Just a Click Away
We Write Custom Academic Papers

100% Original, Plagiarism Free, Customized to your instructions!

glass
pen
clip
papers
heaphones

ITS350 Module 8 Portfolio Project. ZXY Corporation has relocated to a new building that was wired and set up for a local area network (LAN)

ITS350 Module 8 Portfolio Project. ZXY Corporation has relocated to a new building that was wired and set up for a local area network (LAN)

ITS350 Module 8 Portfolio Project. ZXY Corporation has relocated to a new building that was wired and set up for a local area network (LAN)

Information Systems and Security – Portfolio Project

ZXY Corporation has relocated to a new building that was wired and set up for a local area network (LAN). The company implemented a client/server-based network in which all printers, folders, and other resources are shared but everyone has access to everything and there is no security outside of the defaults that were in place when the system was set up.

You have been hired to secure ZXY’s network and ensure that the company has the highest levels of security to protect against internal and external attacks. In an 8-10 page proposal, include the following items to provide a comprehensive secure environment:

  1. A plan to provide secure access control methods for all user access
  2. A viable password policy, which includes complexity, duration, and history requirements
  3. A cryptography method to ensure vital data is encrypted
  4. A remote access plan to ensure that users who access the network remotely do so in a secure and efficient manner
  5. A thorough plan to protect the network from malware and various types of malicious attacks

Your proposal should include all of the elements noted above with support, detail, and elaboration for each section explicitly grounded in knowledge from the assigned readings and media along with any outside sources you may choose to bring into your writing.

Your paper should be 8-10 pages in length with document formatting and citations of sources in conformity with APA version 6th.

Course: ITS350 Information Systems and Security
School: Colorado State University

 

  • : 24/05/2017
  • : 20

Order Solution Now

Our Service Charter

1. Professional & Expert Writers: Sight Writers only hires the best. Our writers are specially selected and recruited, after which they undergo further training to perfect their skills for specialization purposes. Moreover, our writers are holders of masters and Ph.D. degrees. They have impressive academic records, besides being native English speakers.

2. Top Quality Papers: Our customers are always guaranteed of papers that exceed their expectations. All our writers have +5 years of experience. This implies that all papers are written by individuals who are experts in their fields. In addition, the quality team reviews all the papers before sending them to the customers.

3. Plagiarism-Free Papers: All papers provided by Sight Writers are written from scratch. Appropriate referencing and citation of key information are followed. Plagiarism checkers are used by the Quality assurance team and our editors just to double-check that there are no instances of plagiarism.

4. Timely Delivery: Time wasted is equivalent to a failed dedication and commitment. Sight Writers is known for timely delivery of any pending customer orders. Customers are well informed of the progress of their papers to ensure they keep track of what the writer is providing before the final draft is sent for grading.

5. Affordable Prices: Our prices are fairly structured to fit in all groups. Any customer willing to place their assignments with us can do so at very affordable prices. In addition, our customers enjoy regular discounts and bonuses.

6. 24/7 Customer Support: At Sight Writers, we have put in place a team of experts who answer to all customer inquiries promptly. The best part is the ever-availability of the team. Customers can make inquiries anytime.