You have been hired as part of the network security team at the higher institute of advanced technology (HIAT). After completing orientation and training, your manager calls you into a meeting to discuss your first project.

You’ve been asked to perform network security analysis and planning, secure the boundary devices, hosts, and software; and secure the data at rest and in transit. Your deliverable should explain the requirement, propose a solution, and justify the solution. You should make use of the TestOut LabSim material and any other material to create the task. You should also make use of other sources as required. It is important that your deliverable explain the technical issues in layman’s terms. Before you begin, make sure to review the Network Security Proposal template attached below. This template will guide you in completing the task. ( Network security proposal part 3).

Below is the Template

Network Security Proposal Template

Network Security Proposal

Prepared for:

Higher Institute of Advanced Technology

III. Securing Data at Rest and in Transit

A.Public Key Infrastructure

Requirements

In the requirements section, students will make explicit HIAT’s requirements for remote access and authentication.Given this section requires information related to public key infrastructure, students should review TestOut LabSim section 2 (Security Basics) and section 9 (Data), and use additional resources as necessary.

Proposed Solutions

In the proposed solution section, students will provide details of the proposed solution, based on the technical requirements and assumptions.Student should be specific and use additional resources as necessary.Given this section requires us to understand public key infrastructure, students should review TestOut LabSim section 2 (Security Basics) and section 9 (Data), and use additional resources as necessary.

Justification

This section should be used to justify your proposed solution based on the requirement(s).That is, you are explaining why you proposed the solution in the aforementioned paragraph, based on the requirement you made explicit in aforementioned paragraph.Each section should allow the reader to proceed from requirement, to solution, to justification.Given this section requires us to understand public key infrastructure, students should review TestOut LabSim section 2 (Security Basics) and section 9 (Data), and use additional resources as necessary.

B.Secure Protocol Implementation

Requirements

In the requirements section, students will make explicit HIATS’s requirements for remote access and authentication.Given this section requires information related to secure protocol implementation, students should review TestOut LabSim section 9 (Data), and use additional resources as necessary.

Proposed Solutions

In the proposed solution section, students will provide details of the proposed solution, based on the technical requirements and assumptions.Student should be specific and use additional resources as necessary.Given this section requires us to understand secure protocol implementation, students should review TestOut LabSim section 9 (Data), and use additional resources as necessary.

Justification

This section should be used to justify your proposed solution based on the requirement(s).That is, you are explaining why you proposed the solution in the aforementioned paragraph, based on the requirement you made explicit in aforementioned paragraph.Each section should allow the reader to proceed from requirement, to solution, to justification.Given this section requires us to understand secure protocol implementation, students should review TestOut LabSim section 9 (Data), and use additional resources as necessary.

C.File Encryption

Requirements

In the requirements section, students will make explicit HIAT’s requirements for remote access and authentication.Given this section requires information related to file encryption, students should review TestOut LabSim section 9 (Data), and use additional resources as necessary.

Proposed Solutions

In the proposed solution section, students will provide details of the proposed solution, based on the technical requirements and assumptions.Student should be specific and use additional resources as necessary.Given this section requires us to understand file encryption, students should review TestOut LabSim section 9 (Data), and use additional resources as necessary.

Justification

This section should be used to justify your proposed solution based on the requirement(s).That is, you are explaining why you proposed the solution in the aforementioned paragraph, based on the requirement you made explicit in aforementioned paragraph.Each section should allow the reader to proceed from requirement, to solution, to justification.Given this section requires us to understand file encryption, students should review TestOut LabSim section 9 (Data), and use additional resources as necessary.

D.Hashing

Requirements

In the requirements section, students will make explicit HIAT’s requirements for remote access and authentication.Given this section requires information related to hashing, students should review TestOut LabSim section 9 (Data), and use additional resources as necessary.

Proposed Solutions

In the proposed solution section, students will provide details of the proposed solution, based on the technical requirements and assumptions.Student should be specific and use additional resources as necessary.Given this section requires us to understand hashing, students should review TestOut LabSim section 9 (Data), and use additional resources as necessary.

Justification

This section should be used to justify your proposed solution based on the requirement(s).That is, you are explaining why you proposed the solution in the aforementioned paragraph, based on the requirement you made explicit in aforementioned paragraph.Each section should allow the reader to proceed from requirement, to solution, to justification.Given this section requires us to understand hashing, students should review TestOut LabSim section 9 (Data), and use additional resources as necessary.

E.Backup and Restore

Requirements

In the requirements section, students will make explicit HIAT’s requirements for remote access and authentication.Given this section requires information related to backup and restoration, students should review TestOut LabSim section 9 (Data), and use additional resources as necessary.

Proposed Solutions

In the proposed solution section, students will provide details of the proposed solution, based on the technical requirements and assumptions.Student should be specific and use additional resources as necessary.Given this section requires us to understand backup and restoration, students should review TestOut LabSim section 9 (Data), and use additional resources as necessary.

Justification

This section should be used to justify your proposed solution based on the requirement(s).That is, you are explaining why you proposed the solution in the aforementioned paragraph, based on the requirement you made explicit in aforementioned paragraph.Each section should allow the reader to proceed from requirement, to solution, to justification.Given this section requires us to understand backup and restoration, students should review TestOut LabSim section 9 (Data), and use additional resources as necessary.

Looking for solution of this Assignment?

WHY CHOOSE US?

We deliver quality original papers

Our experts write quality original papers using academic databases.We dont use AI in our work. We refund your money if AI is detected  

Free revisions

We offer our clients multiple free revisions just to ensure you get what you want.

Discounted prices

All our prices are discounted which makes it affordable to you. Use code FIRST15 to get your discount

100% originality

We deliver papers that are written from scratch to deliver 100% originality. Our papers are free from plagiarism and NO similarity.We have ZERO TOLERANCE TO USE OF AI

On-time delivery

We will deliver your paper on time even on short notice or  short deadline, overnight essay or even an urgent essay