Need Help ?

Home >> Samples >> CYB 310 Network Defense >> CYB 310: 7-2 Project Three Submission: Restructuring Status Report

CYB 310: 7-2 Project Three Submission: Restructuring Status Report ...


CYB 310: 7-2 Project Three Submission: Restructuring Status Report

Restructuring Status Report

Overview

Organizations always need to enhance their security through network protection. They must hire people with the right skills or train the team in charge of protecting the network. Companies can grow or downsize rapidly, and their network configurations need to adapt just as quickly. A strong traffic flow policy will help the company manage these changes. The focus of this project is creating a traffic flow policy that includes firewall rules.

As a cybersecurity analyst, you must develop different forms of technical expertise, including the ability to complete discrete tasks. The ability to take a holistic view of security and be mindful of the global effects of configurations on a system is equally important. This expertise will help you better understand an organization’s security posture as a whole.

For this project, you will use the virtual sandbox to create a proof of concept for the upcoming organizational restructuring. 

The project incorporates one milestone, which will be submitted in Module Five. Use instructor feedback on your pre-planning milestone to reconfigure the network in your lab this week. The project will be submitted in Module Seven.

In this assignment, you will demonstrate your mastery of the following competency:

  • Implement a traffic flow policy based on organizational security strategy

Scenario

Congratulations! You got the job! You are a cybersecurity analyst with a company that is restructuring. Your manager has asked you to use the virtual sandbox from your interview to create a proof of concept of a network configuration that reflects the new organizational structure. Use the network reconfiguration plan you already created to develop a restructuring status report that documents your technical work and thoughts on how this work improves the organization’s overall security posture.

Prompt

Open the CYB 310 Sandbox, click on the GNS3 icon, and select Project Three from the Projects Library list. Note: You must complete this project in one sitting, as the lab environment is non-persistent. Be aware of your time as you complete the lab. You can extend your lab when the time warning appears.

You must address the following rubric criteria:

  1. Network Reconfiguration: Include the following screenshots:
    1. Network diagram
    2. Port assignment and VLAN assignment for each switch
  2. Traffic Flow Configuration: Include screenshots of the following:
    1. Configure a firewall rule to allow port 80 HTTP from the WAN to the FTP server.
    2. Configure a firewall rule to allow port 443 HTTPS from the WAN to the FTP server.
    3. Configure a firewall rule to block port 80 HTTP from the WAN to any other system.
    4. Configure a firewall rule to block port 443 HTTPS from the WAN to any other system.
  3. Organizational Security Strategy
    1. Explain how the security posture of the organization has been improved by the restructuring.
    2. Describe how the tenets of the CIA triad (confidentiality, integrity, and availability) are affected by the restructuring.

 

Project Three Network Reconfiguration Specifications Spreadsheet

Project Three Network Reconfiguration Specifications Spreadsheet

 

 Project Three Milestone - GNS3

Project Three Milestone - GNS3






We have an Answer from Expert

View Expert Answer

Expert Answer


Answers CYB 310: 7-2 Project Three Submission: Restructuring Status Report

We have an Answer from Expert

Buy This Answer $10

Need your Own Custom Solution?

Order with full confidence and you will be amazed by our results

It’s pretty straightforward, but if you get stuck at any step, please feel free to contact us at any time for a chat.

WhatsApp support@gradegivers.com

NEED A UNIQUE PAPER ON THE ABOVE DETAILS?
Order Now
WhatsApp