· Describe the alternative architectures that would be appropriate to meet the objectives of the project.
· Analyze the pros and cons of each alternative architecture.
· Determine the security implications of each alternative architecture.
· Recommend an architecture that is optimal for implementation by this coffee and tea retailer
· Provide support for your recommendations.
Assignment Requirements
· Written communication: Written communication is free of errors that detract from the overall message.
· APA formatting: Resources and citations are formatted according to APA (6th edition) style and formatting.
· Length of paper: 2–3 pages, excluding the references page.
· Font and font size: Times New Roman, 12 point.
- Required Reading
The required reading covers design considerations for creating a secure network and will support completion of the unit assignment and discussion.
- Use Systems Security Engineering: An Integrated Approach to Building Trustworthy Resilient Systems to read Chapter 3, "The Processes," pages 33–75.
- Web Resources
Videos
The objectives of these videos are to explore applications of network technology and security architectures currently in use and those proposed for the future as well as to provide some context for the required reading and inform the Unit 2 assignment and discussion.
Engage in research using the following keywords to explore modern network architectures and the security implications that are associated with those architectures:
- Secure network architecture.
- Secure network design.
- Network architecture alternatives.
- Network design alternatives.
- Network design tools.
- Network architecture development tools.