SlideShare a Scribd company logo
Assignment Instructions
Instructions:
Note:
A 15 % or less originality score is required to be uploaded with
the paper prior to any grading.
Scenario
:
You are a Security professional hired by NextGard
Technologies in Phoenix, AZ to provide a Windows security
implementation model for their organization. NextGard
specializes in network consulting services for US companies
and they want to upgrade and secure their current network.
NextGard has 250,000 employees in 5 countries. The Phoenix
office operates as the NextGard Corporate headquarters.
Currently there are five district offices:
• Atlanta, Georgia
• Bangalore, India
• Los Angeles, California
• Montreal, Canada
• New York City, New York
The district offices have satellite employees that have a
combination of desktops, mobile computers and wireless
devices. There is a mix of computers running Windows 2000,
XP, Windows Vista and Windows 7. There is a Windows Active
Directory forest with domains set up for each office and seven
file and print servers which are located in the Phoenix office.
The Phoenix office also contains two proxy servers, configured
as an array, that provide Web cache services and Internet access
control for the organization since the majority of applications
are web-based and hosted from the Phoenix office.
There are also several Microsoft applications that all employees
within a region use that are hosted in the regional offices.
All employees have Internet access so they can browse the web.
Tasks
(Paper Sections):
For the assigned project, you are to submit a proposal for the
management of NextGard.
In the proposal, you must address the following:
Research solutions and detail the appropriate Microsoft
Windows access controls including policies, standards and
procedures that define who users are, what they can do, which
resources they can access, and what operations they can perform
on a system.
Research and detail the cryptography methods to protect
organizational information using techniques that ensure its
integrity, confidentiality, authenticity and non-repudiation, and
the recovery of encrypted information in its original form.
Research and devise a plan to thwart malicious code and
activity by implementing countermeasures and prevention
techniques for dealing with viruses, worms, logic bombs, Trojan
horses and other related forms of intentionally created deviant
code.
Research and formulate a plan to implement monitoring and
analysis by determining system implementation and access as
well as an incident response plan for security breaches or
events.
Research and detail security guidelines for contains the two
proxy servers and Internet access control for the organization
Research and define best practices for the security of
NextGard’s organization.
Conclusion summarizing your findings and recommendations
for the reader.
The Network topology must include all of the sites and
the network infrastructure required to provide the services
described in the Final Project Scenario in the section above
Submission Instructions:
An in-depth submission that is free of spelling and grammar
errors in APA format.
A minimum of 8 pages documenting your research on the
subject and contain a drawing of your design.
Double-spaced format (APA) with a readable style and font and
submitted inside the electronic classroom (unless classroom
access is not possible and other arrangements have been
approved by the professor).
Arial 11 or 12-point font or Times New Roman styles.
Page margins Top, Bottom, Left Side and Right Side = 1 inch,
with reasonable accommodation being made for special
situations and online submission variances
Important:
Good academic writing requires writers to cite the sources of
all facts in text. If you state that the sky is blue then you must
cite who said it. A good rule of thumb is one citation per
paragraph; paragraphs 3-5 sentences (
This is how to avoid unintentional plagiarism
). Papers are always written in third person past tense as you
are writing about events in the past from the point of view of an
observer. The student or writer proposed; One must observe;
The leaders at APUS choose the following systems....for the
following reasons:

More Related Content

DOCX
Option #1 XYZ CorporationXYZ Corporation is a small organiz.docx
DOCX
XYZ CorporationXYZ Corporation is a small organization of ro.docx
DOCX
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
DOCX
Windows Server Deployment ProposalOverview Each student .docx
DOCX
Term Paper Project Designing a Secure NetworkThis term paper .docx
DOCX
Bolton Health Service Secure Network Design.docx
DOCX
Term Paper Project Designing a Secure NetworkDue Week 10 and wo.docx
DOCX
Term Paper Project Designing a Secure Network Due Week 10 and wor.docx
Option #1 XYZ CorporationXYZ Corporation is a small organiz.docx
XYZ CorporationXYZ Corporation is a small organization of ro.docx
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
Windows Server Deployment ProposalOverview Each student .docx
Term Paper Project Designing a Secure NetworkThis term paper .docx
Bolton Health Service Secure Network Design.docx
Term Paper Project Designing a Secure NetworkDue Week 10 and wo.docx
Term Paper Project Designing a Secure Network Due Week 10 and wor.docx

Similar to Assignment InstructionsInstructionsNote A 15 or less origi.docx (20)

PDF
CMIT 320 FINAL PROJECT. NETWORK SECURITY
DOC
Uop cis 349 week 2 assignment 1 designing ferpa technical safeguards
PDF
CMIT 320 FINAL PROJECT NETWORK SECURITY.
DOC
A02 assignment-2
PDF
Cis 534 Teaching Effectively--tutorialrank.com
DOCX
Week 10 Term Paper SubmissionIf you are using the Blackboard Mobil.docx
PDF
K011117277
DOCX
Imagine you are an Information Systems Security Officer for a medium.docx
DOC
CIS 534 Life of the Mind/newtonhelp.com   
DOCX
Project Deliverable 5 Network Infrastructure and SecurityDue We.docx
DOCX
Project Deliverable 5 Network Infrastructure and SecurityDu
DOC
Strayer cis 210 week 3 case study 1 building an access control system
DOCX
reposting due to tutor not being able to complete.,This term .docx
DOCX
Overview Each student will create a detailed, organized, unifi.docx
DOCX
Cis 560 Enhance teaching / snaptutorial.com
DOCX
Need help writing term paper.  Posted previously with different due .docx
DOCX
Assignment 2 Implementing Network and Personnel Security Meas.docx
DOCX
CIS 560 Inspiring Innovation/tutorialrank.com
DOC
Cis 560 Effective Communication / snaptutorial.com
DOC
Cis 560 Education Redefined-snaptutorial.com
CMIT 320 FINAL PROJECT. NETWORK SECURITY
Uop cis 349 week 2 assignment 1 designing ferpa technical safeguards
CMIT 320 FINAL PROJECT NETWORK SECURITY.
A02 assignment-2
Cis 534 Teaching Effectively--tutorialrank.com
Week 10 Term Paper SubmissionIf you are using the Blackboard Mobil.docx
K011117277
Imagine you are an Information Systems Security Officer for a medium.docx
CIS 534 Life of the Mind/newtonhelp.com   
Project Deliverable 5 Network Infrastructure and SecurityDue We.docx
Project Deliverable 5 Network Infrastructure and SecurityDu
Strayer cis 210 week 3 case study 1 building an access control system
reposting due to tutor not being able to complete.,This term .docx
Overview Each student will create a detailed, organized, unifi.docx
Cis 560 Enhance teaching / snaptutorial.com
Need help writing term paper.  Posted previously with different due .docx
Assignment 2 Implementing Network and Personnel Security Meas.docx
CIS 560 Inspiring Innovation/tutorialrank.com
Cis 560 Effective Communication / snaptutorial.com
Cis 560 Education Redefined-snaptutorial.com

More from AMMY30 (20)

DOCX
After reviewing the Coleman (2016) article on executive compensation.docx
DOCX
After reviewing the chapter on Recognizing Contributions, perform .docx
DOCX
After reviewing the chapter on Recognizing Contributions, perform a .docx
DOCX
After reviewing the background materials and doing your own research.docx
DOCX
After reviewing the articles and videos, please address the followin.docx
DOCX
After reviewing Georgia v. Randolph and Fernandez v. Californi.docx
DOCX
After reviewing chapter 11 of the E-Text and the Required Resources .docx
DOCX
After reading Library ArticlesDevine, K., Kloppenborg, .docx
DOCX
After reading Trifles by Susan Glaspell complete the following works.docx
DOCX
After reading through Chapter 1, the focus was on targeting the five.docx
DOCX
After reading There Is No Unmarked Woman, by Deborah Tannen, a.docx
DOCX
After reading the U.S. Constitution and the Amendments respond t.docx
DOCX
After reading the two short primary source documents listed below, c.docx
DOCX
After reading the section titled Dominant Microprocessor Company In.docx
DOCX
After reading the section titled Dominant Microprocessor Compan.docx
DOCX
After reading the paper for this week, Steinfield C, LaRose R, C.docx
DOCX
After reading the Martin Luther King, Jr. speech in the attached lin.docx
DOCX
After reading the material from Shafer-Landau concerning the appeal .docx
DOCX
After reading the IMAA article this week on Effective Manageme.docx
DOCX
After reading the essay, Why Rational People Buy into Conspiracy Th.docx
After reviewing the Coleman (2016) article on executive compensation.docx
After reviewing the chapter on Recognizing Contributions, perform .docx
After reviewing the chapter on Recognizing Contributions, perform a .docx
After reviewing the background materials and doing your own research.docx
After reviewing the articles and videos, please address the followin.docx
After reviewing Georgia v. Randolph and Fernandez v. Californi.docx
After reviewing chapter 11 of the E-Text and the Required Resources .docx
After reading Library ArticlesDevine, K., Kloppenborg, .docx
After reading Trifles by Susan Glaspell complete the following works.docx
After reading through Chapter 1, the focus was on targeting the five.docx
After reading There Is No Unmarked Woman, by Deborah Tannen, a.docx
After reading the U.S. Constitution and the Amendments respond t.docx
After reading the two short primary source documents listed below, c.docx
After reading the section titled Dominant Microprocessor Company In.docx
After reading the section titled Dominant Microprocessor Compan.docx
After reading the paper for this week, Steinfield C, LaRose R, C.docx
After reading the Martin Luther King, Jr. speech in the attached lin.docx
After reading the material from Shafer-Landau concerning the appeal .docx
After reading the IMAA article this week on Effective Manageme.docx
After reading the essay, Why Rational People Buy into Conspiracy Th.docx

Recently uploaded (20)

PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
Complications of Minimal Access Surgery at WLH
PPTX
Institutional Correction lecture only . . .
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
RMMM.pdf make it easy to upload and study
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
01-Introduction-to-Information-Management.pdf
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
Cell Structure & Organelles in detailed.
102 student loan defaulters named and shamed – Is someone you know on the list?
VCE English Exam - Section C Student Revision Booklet
Complications of Minimal Access Surgery at WLH
Institutional Correction lecture only . . .
Microbial diseases, their pathogenesis and prophylaxis
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
RMMM.pdf make it easy to upload and study
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Final Presentation General Medicine 03-08-2024.pptx
01-Introduction-to-Information-Management.pdf
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
Chinmaya Tiranga quiz Grand Finale.pdf
Final Presentation General Medicine 03-08-2024.pptx
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
2.FourierTransform-ShortQuestionswithAnswers.pdf
Supply Chain Operations Speaking Notes -ICLT Program
O5-L3 Freight Transport Ops (International) V1.pdf
Cell Structure & Organelles in detailed.

Assignment InstructionsInstructionsNote A 15 or less origi.docx

  • 1. Assignment Instructions Instructions: Note: A 15 % or less originality score is required to be uploaded with the paper prior to any grading. Scenario : You are a Security professional hired by NextGard Technologies in Phoenix, AZ to provide a Windows security implementation model for their organization. NextGard specializes in network consulting services for US companies and they want to upgrade and secure their current network. NextGard has 250,000 employees in 5 countries. The Phoenix office operates as the NextGard Corporate headquarters. Currently there are five district offices: • Atlanta, Georgia • Bangalore, India • Los Angeles, California • Montreal, Canada • New York City, New York The district offices have satellite employees that have a combination of desktops, mobile computers and wireless devices. There is a mix of computers running Windows 2000, XP, Windows Vista and Windows 7. There is a Windows Active Directory forest with domains set up for each office and seven file and print servers which are located in the Phoenix office. The Phoenix office also contains two proxy servers, configured as an array, that provide Web cache services and Internet access control for the organization since the majority of applications are web-based and hosted from the Phoenix office.
  • 2. There are also several Microsoft applications that all employees within a region use that are hosted in the regional offices. All employees have Internet access so they can browse the web. Tasks (Paper Sections): For the assigned project, you are to submit a proposal for the management of NextGard. In the proposal, you must address the following: Research solutions and detail the appropriate Microsoft Windows access controls including policies, standards and procedures that define who users are, what they can do, which resources they can access, and what operations they can perform on a system. Research and detail the cryptography methods to protect organizational information using techniques that ensure its integrity, confidentiality, authenticity and non-repudiation, and the recovery of encrypted information in its original form. Research and devise a plan to thwart malicious code and activity by implementing countermeasures and prevention techniques for dealing with viruses, worms, logic bombs, Trojan horses and other related forms of intentionally created deviant code. Research and formulate a plan to implement monitoring and analysis by determining system implementation and access as well as an incident response plan for security breaches or events. Research and detail security guidelines for contains the two proxy servers and Internet access control for the organization Research and define best practices for the security of NextGard’s organization. Conclusion summarizing your findings and recommendations for the reader. The Network topology must include all of the sites and the network infrastructure required to provide the services
  • 3. described in the Final Project Scenario in the section above Submission Instructions: An in-depth submission that is free of spelling and grammar errors in APA format. A minimum of 8 pages documenting your research on the subject and contain a drawing of your design. Double-spaced format (APA) with a readable style and font and submitted inside the electronic classroom (unless classroom access is not possible and other arrangements have been approved by the professor). Arial 11 or 12-point font or Times New Roman styles. Page margins Top, Bottom, Left Side and Right Side = 1 inch, with reasonable accommodation being made for special situations and online submission variances Important: Good academic writing requires writers to cite the sources of all facts in text. If you state that the sky is blue then you must cite who said it. A good rule of thumb is one citation per paragraph; paragraphs 3-5 sentences ( This is how to avoid unintentional plagiarism ). Papers are always written in third person past tense as you are writing about events in the past from the point of view of an observer. The student or writer proposed; One must observe; The leaders at APUS choose the following systems....for the following reasons: