Description
Unformatted Attachment Preview
Purchase answer to see full attachment
Explanation & Answer
Attached. Please let me know if you have any questions or need revisions.
ASSIGNMENT OUTLINE
I.
INTRODUCTION
A. Background Information
➢ An asset is any device, data, or another component of the system of an
organization, which is often, valued because it has data that is more sensitive.
These assets in an organization include components like desktop computers,
company mobile phones, and laptops.
➢ These assets require a high level of security in any institution or organization
that will protect them from intruders, hackers, and cybercriminals.
B. Thesis statement
➢ There are several security solutions we can implement for the asset management
in the UOL Company, which will help them, protect their asset from intruders,
cybercriminals and hackers.
➢ In this paper, we are going to discuss the various security solution to the assets
at the UOL based on the various requirement that includes remote Access to
VPN, sensitive serve replacement, firewall policy, ACL configuration and
inspection of suspected traffics.
II.
BODY
A. Question one
➢ This question discusses the security solution to the transmission of resources
across a remote access VPN. The question also requires the justification of these
solutions.
➢ They will achieve this by using data security to prevent anyone from
eavesdropping in the internet activities. . Data security is so advantageous for
this company for it will help the company transmit its resources without any
threat over the remote access to the VPNs
B. Question two
➢ This question discusses how the UOL company will secure its server after
placement
➢ One of the methods they can use is securing the connectivity of the server. The
implementation process of this solution includes using and establishing a
connection that has a high level of security
➢ This security solution will help bring appropriate policies to control Access.
C. Question three
➢ This question discusses one firewall solution that offers protection at various
layers of the OSI model
➢ Use of security solutions like administrators knowing how to manage the
firewalls effectively and properly.
➢ The management of the firewall policy interface also enables the administrators
of the networks to have the ability to allow or disallow the firewall policy whose
core purpose is to create and manage the rules mainly designed for inter-zone,
incoming and outgoing traffic
D. Question four
➢ Suggestions on how to monitor the incoming traffic and subject them for
inspection.
➢ UOL Company of information technology shall need good security measures,
which include using tools for monitoring traffic in the network to achieve this.
➢ The information given by these tools will help in the identification of security
vulnerabilities, issues of troubleshooting the network, and analyzing the impact
the new applications will have on the network
E. Question five
➢ Write a st...