Chat with us, powered by LiveChat Touchstone Task 4: Planning Network Security Measures ASSIGNMENT: The Touchstone Tasks in this course will help you prepare for the final Touchstone, which you will submit at the end of - Writingforyou

Touchstone Task 4: Planning Network Security Measures ASSIGNMENT: The Touchstone Tasks in this course will help you prepare for the final Touchstone, which you will submit at the end of

 

Touchstone Task 4: Planning Network Security Measures

ASSIGNMENT: The Touchstone Tasks in this course will help you prepare for the final Touchstone, which you will submit at the end of Unit 4. A Touchstone is a project that demonstrates your comprehension of the course material. It will help you refine skills, and demonstrate application of knowledge. For your reference, there is more information about Touchstones in the student guide.

There are a total of five Touchstone Tasks throughout the course:

  • Touchstone Task 1: Planning a Network Infrastructure
  • Touchstone Task 2.1: Planning Network Printer Connectivity
  • Touchstone Task 2.2: Planning IP Address Assignments
  • Touchstone Task 3: Planning a Wireless Infrastructure
  • Touchstone Task 4: Planning Network Security Measures

In this final Touchstone Task, you will formulate a plan for protecting the network in the scenario from the many types of security threats it may face. This plan may include firewalls, switch and router settings, authentication methods, password policies, physical access to equipment, and anti-malware solutions. These decisions and your rationales for them will become part of your final Touchstone report.

While you will not receive a grade or feedback on this Touchstone Task submission, doing the work now will help you complete your final project. Completing this exercise at this point of the course ensures that you are ready to move on. Further, these Touchstone Tasks build throughout the next Units and form the foundation of the presentation for your final project.

Touchstone Task 4 Template

In order to foster learning and growth, all work you submit must be newly written specifically for this course.

A. Directions

Step 1: Review Final Touchstone

Review the final Touchstone to learn more about the overall assignment and see how you will be graded. Return to this page to continue your Touchstone Task.

Step 2: Review Greenfield Properties Scenario

Review the scenario and client requirements about Greenfield Properties. You will use this information to answer questions related to network security measures.

Step 3: Answer Questions

Based on the information provided by the client, answer the questions in the Touchstone Task 4 Template in 2-4 sentences each. Be sure to explain your answers in detail.

HINTAs you review the scenario and respond to the questions, consider what the client is trying to accomplish and what they have shared about their expectations. Use these perspectives to shape your response to the questions.

Step 4: Upload Completed Questions

Select the submit button at the top of this page and follow the instructions to upload the template with your completed question responses. You will use these answers as a reference when completing the final Touchstone at the end of Unit 4.

B. Requirements

While this assignment is ungraded, we recommend you practice the following conventions, which are required for graded Touchstones:

  • Composition should be double-spaced with one-inch margins.
  • Use a readable 11- or 12-point font.
  • Use professional fonts such as Calibri, Arial, or Times New Roman. Do not use unusual fonts.
  • Composition must be original and written for this assignment, and all writing must be appropriate for an academic context.
  • Plagiarism of any kind is strictly prohibited.
  • The submission must include your name, the date, and the title of your composition.
  • Include all assignment components in a single .doc or .docx file.

Name

Date:

Touchstone Task 4: Planning Network Security Measures

Review the scenario and client expectations about Greenfield Properties.

Based on the information provided by the client, answer the following questions in 2-4 sentences each. Be sure to explain your answers in detail.

What types of firewall systems should be used? Explain your choice. (Ref: Firewalls Technologies and Firewalls Features and Functions )

What switch or router settings can be used to secure network access? Suggest one method and briefly explain its benefit. (Ref: Security Filtering – Access Control List and VPN

Which authentication method do you recommend for user sign-in to the network? Explain your recommendation. (Ref: User Authentication Methods )

What password policies would you recommend enforcing? Explain your recommendation. (Ref: User Account and Password Security )

How will the company protect physical access to the servers? Suggest two methods and briefly explain the benefits of each one. (Ref: Network Physical Security )

What types of anti-malware software should be deployed? Explain your choice. (Ref: Anti-Malware/Anti-Virus Programs )