Network Security Plan For the past several weeks you have addressed several different areas of telecommunications and information technology in relation to different types of communication across the...

1 answer below »

Network Security Plan


For the past several weeks you have addressed several different areas of telecommunications and information technology in relation to different types of communication across the organizational footprint of Sunshine Health Corporation. Review the work you have done and formulate theNetwork Security Planto be implemented across the network footprint. This is not to be an overly detailed report but to address different network concerns and recommendations for improving and securing organizational data, personnel records, intellectual property, and customer records.


Please address the narrative plan as well as a network diagram (no IP addresses, or circuit data required) and what is being done to secure the network at different levels of the OSI model and the organizational structure. Please make sure that you bring in a minimum of two external sources to strengthen and support your presentation.


The assignment should be 5-6 pages of content not counting title page, reference page or appendices (diagrams, budget sheet, equipment list, etc.). Please follow APA format.



Note:it is suggested that as you are reviewing your previous assignments in order to complete this assignment, also be making modifications and refining your previous work in order to successfully complete the week seven assignment, which is a final project report.


-PLEASE, PLEASE DO AS THE ATTACH APA TEMPLATE IS. The school guidelines.




Running head: TITLE OF ESSAY 1 TITLE OF ESSAY 3 Title of Essay Author’s Name Grantham University Abstract Abstracts are research tools that can help you readers determine if the scope of your article/essay will help them in their own research. In APA, abstracts are typically 150-250 words in length and provide an evaluative summary of the essay to follow. The personal opinion of the author is strictly prohibited in abstracts. Unlike a body paragraph, the first line of an abstract is not tabbed-in. For many student essays, especially in lower-numbers courses, an abstract will not be required; still, it is good to practice this skill. Title of Essay In APA style, the introduction of the essay should begin here, followed by the body paragraphs. APA is typically a more formal style than most students are accustomed to using in a writing course. For the purposes of this course, the level of formality should be based on the assignment. For example: APA asks that students always write in third person (avoiding words such as I, me, we, our(s), you, your(s), etc). Certain rhetorical modes, however, don’t cater well to third person (narrative and reflection writing are two such examples). In these situations, first person (I, me, we, our(s)) may be, and should be employed; second person (you, your(s)) should be avoided in all academic writing unless an essay is specifically designed to relay instructions (there are few assignments that will employ second person). Like any essay, students should make sure their essays are formatted with one inch margins, with their text exclusively in Times New Roman 12-point font, and students should double space their lines. This document can be downloaded and used as a template wherein students may simply replace names, titles, dates, and so on with their own information. The final page of this document will demonstrate a References page. If a student uses information from any source, that source must be identified within the text and listed on a References page. These citations should be listed in alphabetical order and, opposite to the way a normal paragraph works, the first line should be flush left and each following line should be tabbed in. Though there is really no substitute for a good APA Style Manual, students can refer to a citation generator such as www.citationmachine.net to ensure proper formatting. Any further questions should be directed to the instructor of the course. References Badley, G. (2009). A place from where to speak: The university and academic freedom. British Journal of Educational Studies, 57(2), 146-163. doi:10.1111/j.1467- 8527.2009.00429.x Baumanns, M., Biedenkopf, K., Cole, J. R., Kerrey, B., & Lee, B. (2009). The future of universities and the fate of free inquiry and academic freedom: Question and answer session. Social Research, 76(3), 867-886. Retrieved from EBSCOhost. Berthoff, A. E. (2009). Learning the uses of chaos. In S. Miller (Ed.), The Norton Book of Composition Studies (pp. 649). New York: W. W. Norton & Company. Carroll, L. (2000) The Annotated Alice: The Definitive Edition. M. Gardner (Ed.) NY: Norton. Elbow, P. (2000). Getting along without grades—and getting along with them too. Everyone Can Write: Essays Toward a Hopeful Theory of Writing and Teaching Writing. NY: Oxford University Press.
Answered Same DayAug 04, 2021

Answer To: Network Security Plan For the past several weeks you have addressed several different areas of...

Tanmoy answered on Aug 05 2021
155 Votes
1
Network Security Implementation in Organization
NETWORK SECURITY IMPLEMENTATION IN ORGANIZATION
Jennifr Davis
Grantham University
Abstract
This topic is about the network security followed by the various organizations in order to protect the secre
t data from being hacked by external agencies. As per a study conducted by Intel security, it has been found that most of the data leakages are due to human error which account to 43% and is intentionally while the other half is due to accidental leakage of the sensitive information by the employees and management personnel of the organization. These may be due to various reasons like corporate and competitor espionage, dishonest financial benefits and grievances towards the employer of the organization. Mostly, the accidental data leakages arise due to inefficient business operations and failure to implement appropriate secured technologies to prevent data theft. Hence, it has become critical for corporate to protect the enormous amount of big data which can be done by implementing a secured and well equipped networking system by following the OSI (Open Systems Interconnection) model at various level of its execution. Here, there will be discussion on the various network security concerns faced by the corporate and how can these issues be resolved by application of the OSI model.
Analysis – Network Security implementation in organization
Network concerns
A corporate organization during its operation faces various types of network security issues. These network security issues results in data theft; breach of internal security and even hacking of network system. These security lapses can result in organization data like employee and consumer information, data related to intellectual property rights and even medical records getting distorted resulting in massive financial and economical losses for the company. Most of the data loses are either due to employees mistake. These mistakes may be accidental or purposeful to revenge against the employer for illicit financial benefits. There have been instances of such data breach in companies which as per a study conducted by IBM in 2016 states that the average consolidated cost of data breach was estimated to be $4 million. As per a study conducted by Juniper research in 2019, the global data breach amounted to $2.1 trillion which was due to rapid digitalization of data. There have been cases of huge financial losses due to data breach for companies like Target Inc. where in 2013, the cyber criminals stolen more...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here