it2250 network security plan intro to network technology
Network Security Plan
Assignment Preparation
Complete the practice labs provided in the Virtual Resource: Hands-On Labs activity for this unit, if you have not already done so. You will apply the activity to your assignment.
Assignment Instructions
Because networks are designed to share information, security is an ongoing issue that must be assessed and addressed at all levels. For this assignment, imagine you are responsible for creating a security and privacy plan for a small doctors’ office that has 4 doctors and 10 staff. The purpose of your plan is to describe standards that help ensure the privacy and integrity of the many different facets of a network.
Include the following in your 5–6-page security and privacy plan:
- Create an enterprise-wide network security plan for the abovementioned organization.
- Describe the most common vulnerabilities, risks, and issues that your plan will address.
- Describe a plan for standards to protect the users from harming the network and system, both intentionally and accidentally. Discuss how these will be enforced.
- Include policies that protect the hardware and physical aspects of the network.
- Identify hardware areas that need to be secured.
- Describe steps that will be taken to ensure the security of the operating systems and network files.
- Discuss measures that are necessary to protect the transfer of data to and from the network.
- Apply the concepts from the unit’s assigned hands-on virtual labs.
Submission Requirements
- Written communication: Written communication is free of errors that detract from the overall message.
- APA formatting: If you use sources, ensure that resources and citations are formatted according to APA (6th edition) style and formatting.
- Font and font size: Times New Roman, 12 point.
Refer to the Network Security Plan Scoring Guide to ensure that you meet the grading criteria for this assignment.
Network Security Plan Scoring Guide
Due Date: End of Unit 5.
Percentage of Course Grade: 12%.
Network Security Plan Scoring Guide Grading Rubric |
||||
Criteria |
Non-performance |
Basic |
Proficient |
Distinguished |
Discuss measures that are necessary to protect the transfer of data to and from the network. |
Does not discuss measures that are necessary to protect the transfer of data to and from the network. |
Lists one measure necessary to protect the transfer of data to and from the network. |
Discusses measures that are necessary to protect the transfer of data to and from the network. |
Analyzes measures that are necessary to protect the transfer of data to and from the network. |
Identify policies that protect the hardware and physical aspects of the network. |
Does not identify policies that protect the hardware and physical aspects of the network. |
Lists networking policies, but does not specify how these policies protect the hardware and physical aspects of the network. |
Identifies policies that protect the hardware and physical aspects of the network. |
Explains policies that protect the hardware and physical aspects of the network. |
Describe common vulnerabilities, risks, and issues in networking. |
Does not describe common vulnerabilities, risks, and issues in networking. |
Lists but does not describe common vulnerabilities, risks, and issues in networking. |
Describes common vulnerabilities, risks, and issues in networking. |
Analyzes common vulnerabilities, risks, and issues in networking. |
Describe steps that will be taken to ensure the security of the operating systems and network files. |
Does not describe steps that will be taken to ensure the security of the operating systems and network files. |
Lists but does not describe steps that will be taken to ensure the security of the operating systems and network files. |
Describes steps that will be taken to ensure the security of the operating systems and network files. |
Describes steps that will be taken to ensure the security of the operating systems and network files; discusses how these will be enforced. |
Identify hardware areas that need to be secured. |
Does not identify hardware areas that need to be secured. |
Identifies hardware areas that need to be secured; identification is incorrect. |
Identifies hardware areas that need to be secured. |
Identifies hardware areas that need to be secured and describes how to complete this. |
Describe a plan for standards to protect the users from harming the network and system. |
Does not describe a plan for standards to protect the users from harming the network and system. |
Describes a plan for standards to protect the users from harming the network and system; description is incorrect. |
Describes a plan for standards to protect the users from harming the network and system. |
Describes a plan for standards to protect the users from harming the network and system; discusses the application of enforcing these strategies. |
Apply the unit’s assigned hands-on virtual labs concepts and activities. |
Does not apply the unit’s assigned hands-on virtual labs concepts and activities. |
Discusses the unit’s assigned hands-on virtual labs concepts and activities but does not apply them to the activity. |
Applies the unit’s assigned hands-on virtual labs concepts and activities. |
Applies the unit’s assigned hands-on virtual labs concepts and activities; application shows strong understanding of the concepts. |
Create an enterprise-wide network security plan for an organization. |
Does not create an enterprise-wide network security plan for an organization. |
Creates an incorrect enterprise-wide network security plan for an organization. |
Creates an enterprise-wide network security plan for an organization. |
Creates a detailed enterprise-wide network security plan for an organization; plan successfully incorporates networking standards. |
Communicate in a manner that is scholarly, professional, and consistent with expectations for members of professional communities. |
Does not communicate in a manner that is scholarly, professional, and consistent with expectations for members of professional communities. |
Communicates in an inconsistent scholarly and professional manner for members of professional communities. |
Communicates in a manner that is scholarly, professional, and consistent with expectations for members of professional communities. |
Communicates in a manner that is scholarly, professional, and consistent with expectations for members of professional communities; written communication is free of errors that detract from the overall message. |