{br} STUCK with your assignment? {br} When is it due? {br} Get FREE assistance. Page Title: {title}{br} Page URL: {url}
UK: +44 748 007-0908, USA: +1 917 810-5386 [email protected]

Learning Goal: I’m working on a computer science writing question and need the explanation and answer to help me learn.

CYB 220 Project Two Guidelines and Rubric

Overview

One of the projects for this course is the creation of a network segmentation strategy in which you will create host-based and network-based firewall policies in a provided network and explain how the network achieves isolation, segmentation, and least privilege. As a security analyst, you will often be asked to evaluate and suggest solutions that require this type of network security design, so this project demonstrates competency in the field. The audience for this strategy is your IT security manager.

The project leverages the skills that you have built in Module Four. The project will be submitted in Module Six.

In this assignment, you will demonstrate your mastery of the following course competency:

  • Describe the fundamental principles and practices of network traffic flow policy and enforcement

Scenario

As a security analyst, you are tasked with creating a network segmentation strategy for your IT security manager. This includes configuration tasks in a network as well as a written rationale of the network segmentation strategy.

Your instructor will post a real-world scenario that includes the minimum specifications on which your work will be based (SCENARIO ATTACHED BELOW). You will also be provided with a Packet Tracer native file (.pkt) that you will import into the Packet Tracer application to use as the base diagram for your network. You will use the scenario and the provided Packet Tracer lab environment to do your work.

Prompt

You must address the critical elements listed below. The codes shown in brackets indicate the course competency to which each critical element is aligned.

Network Segmentation Strategy

  1. Configuration
    1. Configure the host-based firewall policy to meet project specifications. Provide a screenshot of the configured policy.
    2. Configure the FTP server to meet project specifications for access control. Provide a screenshot of the configured FTP server.
    3. Configure the network-based firewall policyto meet project specifications for the extended access control list. Provide a screenshot of the configured policy.
  2. Rationale
    1. Describe how network segmentation is achieved after meeting the configuration requirements for the host-based firewall.
    2. Describe how the concept of least privilege is achieved in the configuration of the FTP server.
    3. Describe an approach of employing a network-based firewall to achieve network isolation to meet project specifications.

What to Submit

Your submission should be 1 to 2 pages in length (not including screenshots) and should be written in APA format. Use double spacing, 12-point Times New Roman font, and one-inch margins. Use a filename that includes the course code, the assignment title, and your namefor example, CYB_100_Project_One_Neo_Anderson.docx.

Project Two Rubric

Criteria Exemplary Proficient Needs Improvement Not Evident Value
Configuration: Host-Based Firewall Policy N/A Configures the host-based firewall policy to meet project specifications and provides a screenshot of the configured policy (100%) Addresses Proficient criteria, but there are gaps in clarity, logic, or detail (55%) Does not address critical element, or response is irrelevant (0%) 16
Configuration: FTP Server N/A Configures the FTP server to meet project specifications for access control and provides a screenshot of the configured FTP server (100%) Addresses Proficient criteria, but there are gaps in clarity, logic, or detail (55%) Does not address critical element, or response is irrelevant (0%) 16
Configuration: Network-Based Firewall Policy N/A Configures the network-based firewall policy to meet project specifications for the extended access control list and provides a screenshot of the configured policy (100%) Addresses Proficient criteria, but there are gaps in clarity, logic, or detail (55%) Does not address critical element, or response is irrelevant (0%) 16
Rationale: Segmentation Meets Proficient criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative manner (100%) Describes how network segmentation is achieved after meeting the configuration requirements for the host-based firewall (85%) Addresses Proficient criteria, but there are gaps in clarity, logic, or detail (55%) Does not address critical element, or response is irrelevant (0%) 16
Rationale: Least Privilege Meets Proficient criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative manner (100%) Describes how the concept of least privilege is achieved in configuration of the FTP server (85%) Addresses Proficient criteria, but there are gaps in clarity, logic, or detail (55%) Does not address critical element, or response is irrelevant (0%) 16
Rationale: Isolation Meets Proficient criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative manner (100%) Describes an approach of employing a network-based firewall to achieve network isolation to meet project specifications (85%) Addresses Proficient criteria, but there are gaps in clarity, logic, or detail (55%) Does not address critical element, or response is irrelevant (0%) 16
Articulation of Response Submission is free of errors related to grammar, spelling, and organization and is presented in a professional and easy-to-read format (100%) Submission has no major errors related to grammar, spelling, or organization (85%) Submission has some errors related to grammar, spelling, or organization that negatively impact readability and articulation of main ideas (55%) Submission has critical errors related to grammar, spelling, or organization that prevent understanding of ideas (0%) 4
Total: 100%

Sample Answer

Compelling correspondence is essential to the achievement all things considered but since of the changing idea of the present working environments, successful correspondence turns out to be more troublesome, and because of the numerous impediments that will permit beneficiaries to acknowledge the plan of the sender It is restricted. Misguided judgments.In spite of the fact that correspondence inside the association is rarely completely open, numerous straightforward arrangements can be executed to advance the effect of these hindrances.

Concerning specific contextual analysis, two significant correspondence standards, correspondence channel determination and commotion are self-evident. This course presents the standards of correspondence, the act of general correspondence, and different speculations to all the more likely comprehend the correspondence exchanges experienced in regular daily existence. The standards and practices that you learn in this course give the premise to additionally learning and correspondence.

This course starts with an outline of the correspondence cycle, the method of reasoning and hypothesis. In resulting modules of the course, we will look at explicit use of relational connections in close to home and expert life. These incorporate relational correspondence, bunch correspondence and dynamic, authoritative correspondence in the work environment or relational correspondence. Rule of Business Communication In request to make correspondence viable, it is important to follow a few rules and standards. Seven of them are fundamental and applicable, and these are clear, finished, brief, obliging, right, thought to be, concrete. These standards are frequently called 7C for business correspondence. The subtleties of these correspondence standards are examined underneath: Politeness Principle: When conveying, we should build up a cordial relationship with every individual who sends data to us.

To be inviting and polite is indistinguishable, and politeness requires an insightful and amicable activity against others. Axioms are notable that gracious “pay of graciousness is the main thing to win everything”. Correspondence staff ought to consistently remember this. The accompanying standards may assist with improving courtesy:Preliminary considering correspondence with family All glad families have the mystery of progress. This achievement originates from a strong establishment of closeness and closeness. Indeed, through private correspondence these cozy family connections become all the more intently. Correspondence is the foundation of different affiliations, building solid partners of obedient devotion, improving family way of life, and assisting with accomplishing satisfaction (Gosche, p. 1). In any case, so as to keep up an amicable relationship, a few families experienced tumultuous encounters. Correspondence in the family is an intricate and alluring marvel. Correspondence between families isn’t restricted to single messages between families or verbal correspondence.

It is a unique cycle that oversees force, closeness and limits, cohesiveness and flexibility of route frameworks, and makes pictures, topics, stories, ceremonies, rules, jobs, making implications, making a feeling of family life An intelligent cycle that makes a model. This model has passed ages. Notwithstanding the view as a family and family automatic framework, one of the greatest exploration establishments in between family correspondence centers around a family correspondence model. Family correspondence model (FCP) hypothesis clarifies why families impart in their own specific manner dependent on one another ‘s psychological direction. Early FCP research established in media research is keen on how families handle broad communications data. Family correspondence was perceived as an exceptional scholastic exploration field by the National Communications Association in 1989. Family correspondence researchers were at first impacted by family research, social brain science, and relational hypothesis, before long built up the hypothesis and began research in a family framework zeroed in on a significant job. Until 2001, the primary issue of the Family Communication Research Journal, Family Communication Magazine, was given. Family correspondence is more than the field of correspondence analysts in the family. Examination on family correspondence is normally done by individuals in brain science, humanism, and family research, to give some examples models. However, as the popular family correspondence researcher Leslie Baxter stated, it is the focal point of this intelligent semantic creation measure making the grant of family correspondence special. In the field of in-home correspondence, correspondence is normally not founded on autonomous messages from one sender to one beneficiary, yet dependent on the dynamic interdependency of data shared among families It is conceptualized. The focal point of this methodology is on the shared trait of semantic development inside family frameworks. As such, producing doesn’t happen in vacuum, however it happens in a wide scope of ages and social exchange.

Standards are rules end up being followed when performing work to agree to a given objective. Hierarchical achievement relies significantly upon compelling correspondence. So as to successfully impart, it is important to follow a few standards and rules. Coming up next are rules to guarantee powerful correspondence: clearness: lucidity of data is a significant guideline of correspondence. For beneficiaries to know the message plainly, the messages ought to be sorted out in a basic language. To guarantee that beneficiaries can without much of a stretch comprehend the importance of the message, the sender needs to impart unmistakably and unhesitatingly so the beneficiary can plainly and unquestionably comprehend the data.>

Our customer support team is here to answer your questions. Ask us anything!