subject

Assignment Requirements You have been working as a technology associate in the information systems department at Corporation Techs for more than two months now. Corporation Techs’ information technology (IT) department is setting up a new network in a remote office for an engineering firm. The network requires several groups: Project Management, Engineering, Drafting, and Architecture. The office is being set up near the project site and therefore, is separate from the main office. Further, several key employees will need access to the main office and remote office computer services. A network security and Virtual Private Network (VPN) plan is needed to connect it all together.
The network should segment for the four major groups with VPN access allowed by specific remote workers into each group.
Tasks
Develop a network security plan, basic topology, and VPN plan for this remote office. The security plan should keep the main office and its digital assets safe in case of a failure at the remote office.
Remote Office
Required Resources
Assignment Template:
(YOU MUST USE THIS TEMPLATE TO GET FULL CREDIT)
Submission Requirements
Format: Microsoft Word
Font: Arial, Size 12, Double-Space
Citation Style: APA
Length: 3–4 pages
Spelling and Grammar count
Self-Assessment Checklist
I identified at least four different ways to protect digital assets with a
defense-in-depth approach.
I explained at least three methods to protect corporate digital assets from the potential threats the host-to-gateway VPN would introduce.
I explained the overall network topology.
Week 6: (RS4) Assignment 6: Remote Access Security Plan and Documentation
(YourName)
Assignment Requirements
You have been working as a technology associate in the information systems department at Corporation Techs for more than two months now. Corporation Techs’ information technology (IT) department is setting up a new network in a remote office for an engineering firm. The network requires several groups: Project Management, Engineering, Drafting, and Architecture. The office is being set up near the project site and therefore, is separate from the main office. Further, several key employees will need access to the main office and remote office computer services. A network security and Virtual Private Network (VPN) plan is needed to connect it all together.
The network should segment for the four major groups with VPN access allowed by specific remote workers into each group.
Tasks
Develop a network security plan, basic topology, and VPN plan for this remote office. The security plan should keep the main office and its digital assets safe in case of a failure at the remote office.
Describe the Network Topology to connect the Remote Office as shown above to the Corporate Office:
Identify at least four different ways to protect digital assets with a Defense-in-Depth approach:
Defense 1:
Defense 2:
Defense 3:
Defense 4:
List at least three methods to protect corporate digital assets from the potential threats the host-to-gateway VPN would introduce.
Method 1:
Method 2:
Method 3:
Method 4:

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 06:00
Write a function that draws a pool ball. this function should take as parameters, the color, the number that should go on the pool ball, and the location of the center of the pool ball. the radius of the pool balls should be pool_ball_radius, and the font of the number should be pool_ball_font. the text of the pool ball font should be white. drawpoolball(color.orange, 5, 100, 100); drawpoolball(color.green, 6, 50, 200); drawpoolball(color.red, 3, 150, 350); drawpoolball(color.blue, 2, 250, 140); to center the numbers on the pool ball, you should use the getwidth() and getheight() methods. you are allowed to call these methods on your text object, such as txt.
Answers: 3
question
Computers and Technology, 23.06.2019 20:00
Match the file formats with the types of multimedia they can store
Answers: 2
question
Computers and Technology, 24.06.2019 11:00
Why is it uncommon for users to perform searches directly in database tables? a.)users are discouraged from interacting directly with tables because they might confuse tables with spreadsheets. b.) users are discouraged from interacting directly with tables because this may result in unintended changes to source data. c.)users do not have the technical skills required to perform searches directly in database tables. d.)users do not have the permissions required to perform searches directly in database tables.
Answers: 1
question
Computers and Technology, 24.06.2019 16:30
The database design steps are listed below in the incorrect order. choose the correct order number next to each step. determine the information to be stored in the database. determine the fields needed to record the data determine if there will be any repetition of data entered, and separate the fields into tables to normalize the data. create relationships to connect the tables.
Answers: 3
You know the right answer?
Assignment Requirements You have been working as a technology associate in the information systems...
Questions
question
Computers and Technology, 23.04.2021 01:00
question
Mathematics, 23.04.2021 01:00
Questions on the website: 13722367