subject

Assignment Requirements You have been working as a technology associate in the information systems department at Corporation Techs for more than two months now. Corporation Techs’ information technology (IT) department is setting up a new network in a remote office for an engineering firm. The network requires several groups: Project Management, Engineering, Drafting, and Architecture. The office is being set up near the project site and therefore, is separate from the main office. Further, several key employees will need access to the main office and remote office computer services. A network security and Virtual Private Network (VPN) plan is needed to connect it all together.
The network should segment for the four major groups with VPN access allowed by specific remote workers into each group.
Tasks
Develop a network security plan, basic topology, and VPN plan for this remote office. The security plan should keep the main office and its digital assets safe in case of a failure at the remote office.
Remote Office
Required Resources
Assignment Template:
(YOU MUST USE THIS TEMPLATE TO GET FULL CREDIT)
Submission Requirements
Format: Microsoft Word
Font: Arial, Size 12, Double-Space
Citation Style: APA
Length: 3–4 pages
Spelling and Grammar count
Self-Assessment Checklist
I identified at least four different ways to protect digital assets with a
defense-in-depth approach.
I explained at least three methods to protect corporate digital assets from the potential threats the host-to-gateway VPN would introduce.
I explained the overall network topology.
Week 6: (RS4) Assignment 6: Remote Access Security Plan and Documentation
(YourName)
Assignment Requirements
You have been working as a technology associate in the information systems department at Corporation Techs for more than two months now. Corporation Techs’ information technology (IT) department is setting up a new network in a remote office for an engineering firm. The network requires several groups: Project Management, Engineering, Drafting, and Architecture. The office is being set up near the project site and therefore, is separate from the main office. Further, several key employees will need access to the main office and remote office computer services. A network security and Virtual Private Network (VPN) plan is needed to connect it all together.
The network should segment for the four major groups with VPN access allowed by specific remote workers into each group.
Tasks
Develop a network security plan, basic topology, and VPN plan for this remote office. The security plan should keep the main office and its digital assets safe in case of a failure at the remote office.
Describe the Network Topology to connect the Remote Office as shown above to the Corporate Office:
Identify at least four different ways to protect digital assets with a Defense-in-Depth approach:
Defense 1:
Defense 2:
Defense 3:
Defense 4:
List at least three methods to protect corporate digital assets from the potential threats the host-to-gateway VPN would introduce.
Method 1:
Method 2:
Method 3:
Method 4:

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 23.06.2019 03:00
Your business be in google top rank.more the rank more the business leads.for best seo and digital marketing services be confident to contact you can get best seo solutions by assistance experts provide digital marketing, website development, seo expert services and social media internet seo expert services your branding solutions. seo expert services ,best seo expert services,online seo expert services,
Answers: 3
question
Computers and Technology, 24.06.2019 01:00
Verify each identity[tex] \frac{csc}{cot \: x \: + \: tan \: x} = cos \: x[/tex]
Answers: 1
question
Computers and Technology, 24.06.2019 06:00
Hey i really need some solving this problem: 1. encrypt this binary string into cipher text: 110000. include in your answer the formula the decoder would use to decrypt your cipher text in the format (coded answer) x n mod (m) = y & 2. decrypt this cipher text into a binary string: 106 you.
Answers: 2
question
Computers and Technology, 24.06.2019 08:00
Can someone work out the answer as it comes up in one of my computer science exams and i don't understand the cryptovariables
Answers: 1
You know the right answer?
Assignment Requirements You have been working as a technology associate in the information systems...
Questions
question
Chemistry, 04.09.2020 23:01
question
Arts, 04.09.2020 23:01
Questions on the website: 13722365