Learning Objectives and Outcomes
will learn how setting up a defense-in-depth plan can be complicated and
involve several technologies and layers.
will learn about potential conflicts in real-world requirements.
You have been working as a
technology associate in the information systems department at Corporation Techs
for more than two months now. Corporation Techs’ information technology (IT)
department is setting up a new network in a remote office for an engineering
firm. The network requires several groups: project management, Engineering,
Drafting, and Architecture. The office is being set up near the project site
and therefore, is separate from the main office. Further, several key employees
will need access to the main office and remote office computer services. A
network security and Virtual Private Network (VPN) plan is needed to connect it
The network should segment for the
four major groups with VPN access allowed by specific remote workers into each
Develop a network security plan,
basic topology, and VPN plan for this remote office. The security plan should
keep the main office and its digital assets safe in case of a failure at the
- Format: Microsoft Word
- Font: Arial, Size 12,
- Citation Style: Chicago Manual
- Length: 3 or more pages
identified at least four different ways to protect digital assets with a
explained at least three methods to protect corporate digital assets from
the potential threats the host-to-gateway VPN would introduce.
explained the overall network topology.