help me in the question below 800 words

Stuck with a difficult assignment? No time to get your paper done? Feeling confused? If you’re looking for reliable and timely help for assignments, you’ve come to the right place. We promise 100% original, plagiarism-free papers custom-written for you. Yes, we write every assignment from scratch and it’s solely custom-made for you.


Order a Similar Paper Order a Different Paper

You have been hired as an IT expert by a small firm to set up an office for 20 staff members, half of whom will work with desktop computers, and the remaining with laptop computers using wireless networks. The office will use one networked laser printer, accessible from both the desktop and laptop computers. The desktop computers will use a wired network, while the laptop computers will employ a wireless network to print and access the Internet.

  • Assumptions and Constraints: Write a description of any assumptions and constraints regarding the project. Are there any assumptions made so far or constraints identified in the project? Are there any constraints or anything that would restrict the ability to achieve the IT project objectives successfully?
  • Project Deliverables: Write a description of what is necessary to acquire and install the computer and network security hardware and software. Phase 3 of the Portfolio Project is due in Module 6.

Select the appropriate security measures (hardware and software) to be implemented on the business network. Include the following with their features in the project deliverables section:

  • Firewalls (hardware and software options)
  • Network Intrusion Detection Systems
  • Antivirus software
  • Windows built in security features
  • Any other network security hardware or software.

Describe the security practices for your business operation, such as the following:

  • Security policies for your business
  • Password use policies
  • Authentication technologies
  • Encryption technologies
  • Social engineering awareness
  • Updating security software and installing security patches.
  • Data disposal and destruction
  • Wireless security measures.

Your paper should meet the following requirements:

  • Three to four pages in length, not including cover and reference pages.
  • Formatted according to the CSU Global Guide to Writing and APA Requirements.
  • Cite a minimum of three sources, two of which should be academic peer reviewed scholarly sources to support your responses, in addition to your textbook. The CSU Global library is a great place to find these resources.

Refer to the Portfolio Rubric available in the Module 6 Materials folder for information on grading details.

Writerbay.net

We’ve proficient writers who can handle both short and long papers, be they academic or non-academic papers, on topics ranging from soup to nuts (both literally and as the saying goes, if you know what we mean). We know how much you care about your grades and academic success. That's why we ensure the highest quality for your assignment. We're ready to help you even in the most critical situation. We're the perfect solution for all your writing needs.

Get a 15% discount on your order using the following coupon code SAVE15


Order a Similar Paper Order a Different Paper