Satisfaction Guarantee

First time here?

usewelcome15 to get 15% off

Create a network diagram for the fictitious “Liberty Beverages Corporation” using any diagramming tool you wish (e.g., Visio, MS Paint, application at http://www.draw.io ) for the diagram but either embed in the report or include as a standalone attachment the visual representation of the drawing.

Create a network diagram for the fictitious “Liberty Beverages Corporation” using any diagramming tool you wish (e.g., Visio, MS Paint, application at http://www.draw.io ) for the diagram but either embed in the report or include as a standalone attachment the visual representation of the drawing. Include at least the following elements:a. Remote devices used by employees and vendorsb. Demilitarized Zone (DMZ) facing externallyc. Firewall(s)d. IDS/IPS solutione. SIEMf. Components integrated from chosen specialty topicDescribe and define the following security threats with at least a paragraph each. Alsodescribe what makes each vulnerability a threat and impact to the business.a. Denial of Service (DOS) and Distributed Denial of Service (DDOS) attacksb. Worms, virus, Trojan horses, and other malware.c. Man-in-the-middle (MITM) attacksd. Rootkit injectionse. Misconfiguration of remote mobile devicesDocument how five or more components and measures in the network architecture, as well as host-based measures address the security threats from the previous step. The components could be a combination of software or hardware in nature such as firewalls, IDS/IPS, routers, switches, anti-virus/malware software, full-disk encryption (FDE) and encryption in transit, remote device management software, etc.Describe in three or more paragraphs the specific security threats regarding Cellular Security.Describe in three or more paragraphs the security controls (and their rationale for inclusion) that you will implement to mitigate against the security threats of the Cellular Security.Beyond the network design, what additional procedural/governance measures do you recommend to address security concerns (e.g., training, procedures, policies)? Describe in two or more paragraphs at least one measure.Describe in one or more paragraphs how biblical principles come to bear with your proposed design and approach. Include specific scriptural references.