Tag Archives: Security Assessment Report.”

LAN administration and security manager 2022 Best

LAN administration and security manager

Scenario You are the newly hired LAN administration and security manager at Healthy Body Wellness Center (HBWC). The HBWC includes the Office of Grants Giveaway (OGG), a growing department responsible for distributing hospital research grants.

LAN administration and security manager

Cybersecurity Architecture and Engineering – 1 Paper details: Scenario You are the newly hired LAN administration and security manager at Healthy Body Wellness Center (HBWC). The HBWC includes the Office of Grants Giveaway (OGG), a growing department responsible for distributing hospital research grants. The HBWC currently relies on a local area network (LAN), but plans to expand their services and hire more employees this year. It is evident the current cybersecurity architecture is limited and unable to meet current needs. In addition, HBWC’s cybersecurity architecture will need to transition to a wide area network (WAN).

LAN administration and security manager

Using the attached “Healthy Body Wellness Center Case Study” and “Healthy Body Wellness Center Security Assessment Report,” conduct a security analysis of HBWC’s current technologies and applications and identify threats to the company’s existing architecture. You will use the findings from your analysis to complete the attached “Business Requirements Document Template.” Requirements Your submission must be your original work. No more than a combined total of 30% of a submission can be directly quoted or closely paraphrased from sources, even if cited correctly. Use the report provided when submitting your task as a guide.

LAN administration and security manager

You must use the rubric to direct the creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each requirement below may be evaluated by more than one rubric aspect. Requirements: Analyze HBWC’s existing architecture using the attached “Healthy Body Wellness Center Case Study” and “Healthy Body Wellness Center Security Assessment Report.” Consider common security needs and functionalities necessary to meet the needs of the target network as part of your analysis. Record all responses in the appropriate section of the attached “Business Requirements Document Template.”

LAN administration and security manager

A. Introduction – Summarize each aspect of the project summary, project scope, and system perspective based on the attached “Healthy Body Wellness Center Case Study” and “Healthy Body Wellness Company Security Assessment Report.” Use the “Introduction” of the attached “Business Requirements Document Template” to record your responses. B. Business Process Overview – Describe the current business processes at HBWC and the proposed processes, including the interactions between systems and various business units. Include visual process flow diagrams to further illustrate the processes the new product will replace or enhance.

LAN administration and security manager

Use the “Business Process Overview” section of the attached “Business Requirements Document Template” to record your responses for each aspect. C. Business Requirements – Record the business requirements for the project, categorized by both priority and area of functionality addressing the needs from the “Healthy Body Wellness Center Case Study” and “Healthy Body Wellness Center Security Assessment Report.” Provide functional and nonfunctional requirements that can be followed throughout the project for the recorded business requirements.

LAN administration and security manager

Use the Business Requirements Document (BRD) template to record your responses for each aspect of the document in the “Business Requirements” section. D. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized. E. Demonstrate professional communication in the content and presentation of your submission. https://youtu.be/eFdo5mzrPlQ

Attached Files

 |

Powered by WordPress and MagTheme