ISSC363 APUS Network Risk Assessment Network Devices Assignment

User Generated

QnqqlFunex

Writing

American Public University System

Description

The key to this assignment is to demonstrate your understanding of the topics, not to re-word the text or reference material. Please see Appendix A for the grading rubric on all written assignments.


Please complete the scenario below following these guidelines for your deliverable.

  • Your assignment must be a minimum of 2 pages double spaced, plus a title page and a reference page for a total of 4 pages.
  • Make sure you are using at least two (2) academic references.
  • This submission should be created following APA 6th edition guidelines.
  • The paper is to follow the APA style guide, Sixth Edition (available via bookstores).
  • Submit your assignment as a MSWord attachment.
  • You will be required to run your paper through Turnitin.com, ensure that your similarity index is sufficiently low, and submit an originality report with your paper.


Scenario:



You have been hired as a consultant to secure all network devices for a large firm.

1. Describe the steps you would take to determine the needs of the organization (the discovery of the network devices)

2. Detail the countermeasures (and tools) you would put in place.

*******(Note: You are not limited to following the steps/countermeasures described in your textbook. If there are additional steps you would take please list them and explain why you are taking them.)

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Hello.....I have completed the assignment. please find attached. its nice working with you😇

Running head: NETWORK RISK ASSESSMENT

ISSC363 Network Risk Assessment
Institution Affiliation
Date

1

NETWORK RISK ASSESSMENT

2

Network Risk Assessment
Define network devices
Network devices play an essential role in ensuring safe packet delivery of information
within an organization's network. They include firewalls, switches, routers and IPS (Intrusion
Detection System) (Owokade, 2014). Other network infrastructure devices may include storage
area networks, domain name systems, load balancers, and servers. Besides performance issues
which may lead to loss of data packets reducing the efficiency of the network system, network
devices can harbor security threats to an organization’s network. As such, security assessment to
discover vulnerabilities such as "legacy, unencrypted protocols" should be part of a general
network assessment on compliance and performance of the system's network devices (National
Cybersecurity and Communications Integration Center, 2018). This paper discusses the steps...


Anonymous
I was having a hard time with this subject, and this was a great help.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags