Project OverviewThis is a team project. Each team member must participate in theproject paper and the presentation. The respective roles of each teammember must be clearly identified to the faculty. Each team member mustidentify the part or parts of the project worked on. Each team memberwill receive the same grade based on the overall performance of theteam. The team must work with all its members to ensure timely andeffective project completion. Non-participation by team members must becalled to the attention of the faculty.Each team will create a target company for which a secure enterprise network will be developed.The components of the project paper should include the following as a minimum:Cover Page & Table of Contents:Cover Page should include:Project TitleTeam MembersTable of contents should reference the following sectionsCompany Overview: (Your instructor may provide a company overview as a guideline.)Discussion of the company and the company’s business.Discuss the scope of this effort as it applies to the company.Logical Topology:Define the logical topology of the company’s internetworkIdentify any strategic areas (DMZ, core area, access, and distribution layers).Risk Assessment:Make an inventory list of all assets and systems that require protection and security.List all possible threats within reason. Refer to the providedsecurity books and web resources. Consider threats from both inside andoutside the company. Include physical security and social engineeringattacks in addition to other hacking methods.List all possible defensive countermeasures within reason.Include the following in your analysis:HardwareSoftwareIntellectual propertyLabor costs: users, administrators and technical staffOperating systems, applications, databases, server services (DHCP, DNS, http, vsftp, etc.)Documentation (both IT and line-of-business)Internet, intranets, and extranetsDMZ and servers and services thereonConsider hardware replacement, restoring the OS and data, etc.Document the results of the analysisSecurity Proposal:Include the following in your design:Acceptable Use PolicyUser Account PolicyRemote Access PolicyInformation Protection PolicyNetwork Connection PolicyStrategic Partner PolicyPrivileged/Special Access PolicyPassword PolicyInternet Access PolicyMiscellaneous PoliciesYou may also incorporate all or part of the following Policy StandardsBS7799ISO 27002Define Enforcement ProceduresEmployeesCustomersVendorsIncident Handling and Escalation ProceduresDefine Security IncidentsComputer Security IncidentsPhysical Security IncidentsDefine Incident Severity Levels and Response TimesHigh – immediateMedium – short termLow – long termDefine Incident Handling ProcedureRecognize incident and determine severity levelLog incidentMake appropriate response to incident to protect systemInform appropriate personnelFollow up analysis and documentation of incidentSuggest possible modifications to security policy, as neededDocument the results of the analysisSummary & Conclusions Summarize findings and provide conclusions based on therecommendations of the project. Justify your recommendations withthoughtful, professional comments.Reflect on how the skills learned in this program have prepared you for your future career.DeliverablesProject paper: A 10-to-15 page, APA formatted Word document, covering the topics outlined abovePresentation: A 5-to-7 slide, PowerPoint presentation, highlighting key points of the project
Did you know you can hire someone to answer this question? Yes, classaider.com is a hub of paper writers, dedicated to completing research and summaries, critical thinking tasks, essays, coursework, and other homework tasks. It is simple as ABC.