Professional Writers
We assemble our team by selectively choosing highly skilled writers, each boasting specialized knowledge in specific subject areas and a robust background in academic writing
Fill the order form details - writing instructions guides, and get your paper done.
Posted: March 5th, 2022
Security Analysis and Redesign of a Network
Security Analysis and Redesign of a Network
Objectives
ABC Invitation Design and XYZ Invitation Printing have decided to merge into one company, A2Z Invitations. ABC is a virtual company with a proprietary website that allows customers to do some preliminary work on invitations and then consult with a designer for the final product. XYZ is a traditional company with a system that allows customers to submit designs and track their orders. It also has a contact management and invoicing system. ABC will be moving its application into the XYZ data center and will be using all of XYZ’s back end systems.
Both companies have experienced data breaches in the past and do not want to have them in the future. A2Z has hired you to do a security analysis of its new network and to recommend how it can be set up in a secure manner. It has budgeted for a capital expenditure (outside of man hours) of $250,000 for hardware and software and $25,000 every year for additional security measures.
The Assignment
Your job is to analyze the current setup, identify vulnerabilities, and recommend solutions according to the statement of work objectives listed below.The data you will use for this project would be obtained from the You Decide assignments in Weeks 1 and 3. Your final project report must include all the activities outlined in the ~ Hire our professional writers now and experience the best assignment help online with our custom paper writing service. We ensure your essays and assignments are expertly researched, written and delivered on time. ~ Grading rubrics.
Guidelines
The statement of work objectives are as follows.
Perform online reconnaissance on XYZ to see what information is available to an attacker. No social engineering of employees is allowed. Use the Week 1 You Decide as the data for this section. DONE
Perform an analysis of the current XYZ network, using the current network diagram and the NMap report (listed in the file). NEED HELP
Check the user’s password strength. Use the Week 3 You Decide as the data for this section. DONE
Redesign of the network. (The current network is listed in the file). NEED HELP
Develop system hardening procedures for both IIS and Apache (even if they only use IIS). NEED HELP
Three complete security policies. NEED HELP
Develop a template for future security policies. NEED HELP
Your paper must conform to all requirements listed below. NEED HELP
Requirements
Papers must be at least 5–10 pages in length and double-spaced.
Papers must include at least three references outside of the text.
Paper and references must conform to Ace homework tutors – APA style, including
cover page;
header with student’s name and page number; and
sections including introduction, body, and conclusion or summary
You Want Quality and That’s What We Deliver
We assemble our team by selectively choosing highly skilled writers, each boasting specialized knowledge in specific subject areas and a robust background in academic writing
Our service is committed to delivering the finest writers at the most competitive rates, ensuring that affordability is balanced with uncompromising quality. Our pricing strategy is designed to be both fair and reasonable, standing out favorably against other writing services in the market.
Rest assured, you'll never receive a product tainted by plagiarism or AI-generated content. Each paper is research-written by human writers, followed by a rigorous scanning process of the final draft before it's delivered to you, ensuring the content is entirely original and maintaining our unwavering commitment to providing plagiarism-free work.
When you decide to place an order with Nurscola, here is what happens: