Learning Goal: I’m working on a programming question and need guidance to help me learn.

BRING YOUR OWN DEVICE (BYOD)

Bring your own device (BYOD) is a trend towards allowing employee-owned mobile computing devices, especially smartphones, to access enterprise networks, systems, and data.

For this discussion, explore the relative advantages and disadvantages of BYOD, particularly as it relates to mobile device management and securing the confidentiality and integrity of proprietary enterprise data. Ideally, you will speak from your own professional experience. If you do not have any professional experience related to BYOD policies or management, then please base your discussion on your own research and be sure to include citations.

LAB 7: APPLYING SECURITY PROTOCOLS

OVERVIEW

This weeks hands-on lab provides you with an opportunity to create and deploy access-control lists on a Cisco router and switchport security on a Cisco switch. You will learn how to create standard and named access lists on a router, and security on switch ports, apply them to interfaces, and test the functionality of the newly created lists.

Access Control Lists (ACLs) are used for filtering traffic passing through an interface based on a specific criterion, for example, IP address or specific ports. Two different types of access lists can be configured:

  • Standard Access List: A standard access list is used for filtering traffic based on a source IP address.
  • Extended Access List: An extended access list provides more filtering criteria. You can add filtering based on source and destination IP address as well as source and destination ports.

Switchport Security features provide another aspect of security on layer 2, where you can protect your users from illegal DHCP servers. This is called DHCP snooping. You can also configure MAC address filtering per switchport and prevent illegal PCs from getting access to the network.

DIRECTIONS

Read the requirements for all related course activities before completing this lab so you can take notes as needed to help you achieve those activities. Click the button below to access a lab arranged through Practice Labs.

  1. Follow the lab instructions carefully.
  2. Download the Assignment Template found in the Resources and use it for both your lab screenshots and your assignment responses.
  3. Take the following four screenshots during the lab:
    • Exercise 1:
      • Task 1, Step 10.
    • Exercise 2:
      • Task 1, Step 8.
    • Exercise 3:
      • Task 1, Step 8.
    • Exercise 4: Task 3, Step 5
      • ASSIGNMENT 7
      • SECURITY IN A COMPLEX WORLD

        By now you should have completed the unit lab and saved your screenshots to a Word document for submission with this assignment.

        OVERVIEW

        Microsoft Windows products have held the largest portion of the operating system market for decades. Mobility is often crucial to the productivity of an enterprise’s workforce. The shift to mobile devices has introduced a variety of operating systems into the market, and the bring your own device (BYOD) trend is creating more complexity for organizations and for those charged with securing those operating systems.In this assignment you analyze security threats associated with BYOD devices in the workplace.

        PREPARATION

        • Research security features of a mobile OS of your choice.

        DIRECTIONS

        Use the Assignment Template with your screenshots for the lab documentation and the assignment.

        Lab Documentation

        Briefly describe what you learned from or observed in the lab and include it in the section with your screenshots in the Assignment With Lab Template. Be specific.

        ASSIGNMENT

        Analyze network security threats, risks, and solutions presented by mobile devices in BYOD workplaces.Do the following:

        • Analyze three common security threats for enterprises employing a BYOD policy.
        • Explain the risk factors associated with mobile device security threats.
        • Analyze how two significant features of a specific mobile OS keep their devices secure.

        Submit your Word document in this assignment.

      • UNIT 8
      • THIRD-PARTY TOOLS

        There are myriad tools available for managing the patching of information systems. While some network and server administrators choose to use tools from their network operating system (NOS) vendor, others take a best-of-breed approach by using third-party network management applications.Please choose from the following list or you may choose another third-party patch management tool that you use professionally:

        • ANSA by Autonomic Software.
        • Auditor Enterprise by Ecora Software.
        • Automox by Automox.
        • ConnectWise Automate by ConnectWise.
        • CorrelatedVM by NetSPI.
        • GFI LanGuard by GFI Software.
        • Kaseya VSA by Kaseya.
        • Kenna by Kenna Security.
        • Lumension Patch & Remediation by Lumension.
        • Patch Manager by Cloud Management Suite.
        • Patch Manager Plus by ManageEngine.
        • Patch Manager by SolarWinds.
        • Server Manager by Ivanti.
        • Shavlik by Ivanti.
        • SnaPatch by SmiKar Software.
        • SysAid by SysAid Technologies.
        • System Management by Cisco WebEx.

        Discuss one of its distinguishing features and other characteristics of the tool, including its feature set, cost, and ease of use.Any insights that you can share based on your personal or professional experience using the tool in an enterprise environment are welcome. You must write your own review of the tools prominent features; please do not include material directly copied from the vendors Web site or promotional materials.

      • LAB 8: USING FILE TRANSFER PROTOCOLS ON ROUTERS

        OVERVIEW

        In this exercise, you will learn to back up and restore configuration files. File Transfer Protocol (FTP) is a standard network protocol used to transfer files from one host (computer) to another host over a TCP-based network like a private intranet or the Internet. Trivial File Transfer Protocol (TFTP) is particularly useful for transferring and backing up large files such as router configurations and operating systems from the router to a host computer.

        DIRECTIONS

        Read the requirements for all related course activities before completing this lab so you can take notes as needed to help you achieve those activities. Click the button below to access a lab arranged through Practice Labs.

        1. Follow the lab instructions carefully.
        2. Download the Assignment Template found in the Resources and use it for both your lab screenshots and your assignment responses.
        3. Take the following screenshot during the lab:
          • Exercise 1:
            • Task 1, Step 7.
      • By now you should have completed the unit lab and saved your screenshots to a Word document for submission with this assignment.

        OVERVIEW

        Information security has become a bit of a cat-and-mouse game between network and server administrators and security managers on one side, and those with an interest in exploiting and damaging the confidentiality, integrity, and availability of enterprise information assets on the other. Two of the activities that may serve as effective controls against threats to the integrity of mission-critical enterprise data include proactive patch management and automated backups stored both locally and remotely.In this assignment you analyze aspects of patch management and data backup and restore.

        DIRECTIONS

        Use the Assignment Template with your screenshots for the lab documentation and the assignment.

        Lab Documentation

        Briefly describe what you learned from or observed in the lab and include it in the section with your screenshots in the Assignment Template found in the resources. Be specific.

        ASSIGNMENT

        Analyze aspects of data backup and restore and patch management. Do the following:

        • Explain three best practices for data backup and restore to prevent data loss.
        • Describe three tools that are available to network and server administrators to ensure that system patches and data backups are occurring effectively.
        • Describe important things to consider when deploying system patches
      • ASSIGNMENT 8 SYSTEM MANAGEMENT AND BACKUP SYSTEM

        By now you should have completed the unit lab and saved your screenshots to a Word document for submission with this assignment.

        OVERVIEW

        Information security has become a bit of a cat-and-mouse game between network and server administrators and security managers on one side, and those with an interest in exploiting and damaging the confidentiality, integrity, and availability of enterprise information assets on the other. Two of the activities that may serve as effective controls against threats to the integrity of mission-critical enterprise data include proactive patch management and automated backups stored both locally and remotely.In this assignment you analyze aspects of patch management and data backup and restore.

        DIRECTIONS

        Use the Assignment Template with your screenshots for the lab documentation and the assignment.

        Lab Documentation

        Briefly describe what you learned from or observed in the lab and include it in the section with your screenshots in the Assignment Template found in the resources. Be specific.

        ASSIGNMENT

        Analyze aspects of data backup and restore and patch management. Do the following:

        • Explain three best practices for data backup and restore to prevent data loss.
        • Describe three tools that are available to network and server administrators to ensure that system patches and data backups are occurring effectively.
        • Describe important things to consider when deploying system patches. Log in details is the same [email protected] Oladunni1989$