Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)
NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.
NB: All your data is kept safe from the public.
Class Project – Choosing and Securing Network Components Problem Scenario and Ov
Class Project – Choosing and Securing Network Components Problem Scenario and Overview
You have just moved into a new home, and you are looking to upgrade/replace some of your Internet and networking devices. Suppose you have a budget of $1000 to buy the new devices. Research and pick a new desktop computer and a new router for your home, listing the specs while justifying your choices (like what you did in Assignment 2). The specs for each should also include the pricing and a link to where you can“purchase” it. This should be a complete thought. It could be one or more sentences. After contacting your Internet Service Provider and getting connected, you now need
to secure all the devices, mobile, and stationary shown in the above diagram by fulfilling the problem requirements below.
Problem Requirements
Research and pick a suitable computer and router for your needs.
All devices must be protected against intrusion from other people
Devices must be secure against malware
People using the devices must be security aware
Internet access must be secure from unauthorized access and/or intrusion
All devices must be up-to-date and properly functioning
All critical data must be recoverable in the event of failure
The digital communications environment must be safe to use and defended
1
Problem-Solving Process:
Part 1: Identify Strategies
Here the problem is defined in detail. The scope of the problem is stated so that it is clear why this problem is important. The impact and risks of the problem are evaluated so that each risk is named with its likelihood of occurring and its level of severity. Actions are assigned to each risk that will reduce or resolve it. Finally, all the people that are affected are identified giving a clear declaration of their level of involvement with the problem. These people are called stakeholders. Also include in this document the computer and router you picked.
Hint: you can brainstorm with your classmates in the Class Project Discussion Forum.
Part 2: Propose Solutions – Evaluate Solutions – Evaluate Outcomes
Here possible solutions are proposed and evaluated, and alternative approaches to solving the problem are identified and discussed (use the Class Project Discussion Forum). There may be many solutions to this problem. We will call them alternative solutions. Alternative solutions should be both creative and reasonable. The goal is to choose one solution. We will call this the recommended solution. Strive to clearly explain why this recommended solution is the best solution. You should have at least 2 possible solutions to evaluate!
Questions to consider:
Use these and other questions to develop and design your solutions. These are not questions to answer directly in your submissions but only to help you solve the problem and evaluate your solutions.
How will the security solution be used and by whom?
Are devices protected from unauthorized use and intrusion?
Are the people using the devices cyber-security aware?
Can the data on the devices be recovered?
Is the environment defended against malware?
What documentation and planning prepare for security problems?
Is the Internet use safe from intrusion?
Does your solution solve the whole problem for all the people involved?
Deliverables
Submit the following:
1. Problem Statement you designed in Part 1 (Word document or PDF).
2. List of different solutions you designed in Part 2, and the recommended solution. Please highlight the advantages of the recommended solution over the other alternative solutions (Word document or PDF).
3. Presentation outline and video (PowerPoint or PDF and working YouTube link). This video shows you how to post a YouTube link.
2
Grading Criteria:
25 points – problem statement that includes the scope of the problem, analysis of at least 3
risks, and the people affected
25 points – identification of at least 5 steps to secure the environment that includes the value and importance of each proposed step
25 points – solution is evaluated and defended including the identification and use of at least 3 security criteria
25 points – presentation (outline and YouTube video) includes a description of the problem, consideration of at least one solution you did not use and the solution you did, pros and cons of the proposed solution, a description of the solution selected and the reasoning behind your solution selection
Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)
NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.
NB: All your data is kept safe from the public.
Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount