Description
The Scenario:
After transitioning out of the military, you were contracted by a medium-sized start-up company that processes credit card transactions on a daily basis. The Chief Executive Officer (CEO) and other business staff have no knowledge of or the threats they face. They have an open position for a Chief Information Security Officer (CISO), but have yet to fill it. Thus, they hire you for your expertise in network security, firewalls, and VPN solutions.
This is a short term engagement that lasts 30 days. As the company's subject matter expert/consultant, the CEO wants a 4-6 page report at the end of your assignment. The CEO tells you they will have remote users, so firewall and VPN technologies are needed. They provide you with the following report outline to use:
1.0 Introduction
2.0 Overview of network security fundamentals, security threats, and issues (discuss from a company wide standpoint).
3.0 Detailed network security recommendations
4.0 Summary
Note:
Section 3.0 should include:
- Fundamentals of firewalls and VPNs
- Recommendations for firewall and VPN solutions for the new company
- Recommendations for implementing your proposed solutions
- Practices that you will use to ensure security within the enterprise if they hire you long term. You may make these as sub-sections if you'd like (e.g., 3.1 Fundamentals of Firewalls and VPNs, 3.2 Recommended Firewall and VPN Solutions, etc.)
Section 4.0:
This section should be short, a paragraph or two.
Requirements:
- Your submission should be 4 to 6 pages long (not including the title page and the reference page).
- All sections are represented (Sections 1.0 - 4.0).
- Paper is in APA format with proper citations and references.
- 1" margins.
- In Times New Roman or Arial font, font size 12.
- Utilized correct grammar and spelling.
- Include and cite references as needed.
- The key to this assignment is to demonstrate your understanding of the topics, not to re-word the text or reference material.
Explanation & Answer
Hi, kindly find attached
Running Head: NETWORK SECURITY
1
Network Security
Student’s Name
Institution
Date
NETWORK SECURITY
2
1.0 INTRODUCTION
Network or information security refers to the operation of safeguarding data from access
without authorization, disclosure, use, tampering or modification. The rising rate of using
electronic media in the personal lives of individuals including their businesses is what majorly
increases the possibilities of a security breach and its several negative impacts. Several theft
cases of credit card data, personal identity, and other vital information have been normalized
today due to the number of cases that have been occurring. Other cases such as stealing
privatized business data may, however, lead to bigger loses such as the loss of business for an
entire organization (Perez, 2014). In this network security report today, I focus on explaining the
following three key points:
I.
Overview of network security fundamentals, security threats, and issues while
discussing from a company-wide standpoint.
II.
III.
Detailed network security recommendations
Summary
2.0 Overview of Network Security Fundamentals, Security Threats and Issues
Cybercriminals together with careless current and former employees can highly
contribute to the damaging of computer networks and the compromising of data. Network
security consists of software, hardware and security procedures and policies that are structured
mainly for the purpose of securing against all threats that may affect the computer system of an
organization. The implementation of several layers of both hardware and software and be very
essential for the purpose of prohibiting threats from interfering with the computer netw...