Posted: April 24th, 2025
The process of implementing security frequently opens one’s eyes to other forms of security not previously considered. In this two-part assignment, you should experience just that. This assignment focuses on a model of implementing security in layers, which, in many cases, requires a network that is designed accordingly.
The specific course learning outcome associated with this assignment is:
Design a network that incorporates the following:
All servers exist here (web server, file server, print server, mail server, FTP server).
Connection to the Internet (50 MBps).
300 employees who only need access to local corporate resources and the Internet.
20 employees who need access to all resources at corporate, plus the Internet.
Connection to the Internet (3 MBps).
Use Microsoft Visio or an open-source alternative, such as Dia Diagram Editor, to:
All necessary network devices (routers, switches and/or hubs, firewalls, VPNs, proxies, and others).
The interconnections between network devices.
Connections to end-user (client) devices (desktops, laptops).
Connections from the Internet cloud to the network input.
Write a 6-10 page paper in which you:
Assume data begins at the remote site.
Data flow may be monitored by an IDS.
Cite each source listed on your source page at least one time within your assignment.
For help with research, writing, and citation, access the library or review library guides.
This course requires the use of Strayer Writing Standards (SWS). The library is your home for SWS assistance, including citations and formatting. Please refer to the
Library site
for all supports. Check with your professor for any additional instructions.
Import completed diagrams or charts into your paper before submitting your work.
View Rubric
Place an order in 3 easy steps. Takes less than 5 mins.