project scenarios reminder you will use the same scenario and associat
Search for question
Question
Project Scenarios
Reminder you will use the same scenario and associated documents that were used in Module Five for their Project Three
Milestone
Next week, you will submit Project Two: Network Segmentation Strategy, which refers to a scenario. This is the scenario you will use and the
supporting files you will need: (See Attached)
○
О
https://learn.snhu.edu/content/enforced/1535978-CYB-220-R4945-OL-TRAD-
UG.24EW4/course documents/CYB%20220%20Project%20Two%20Scenario%201%20Student%20Files.zip?
Project Two Guidelines and Rubric
Overview
One of the projects for this course is creating a network segmentation strategy in which you will
create host-based and network-based firewall policies in a provided network and explain how the
network achieves isolation, segmentation, and least privilege. As a security analyst, you will often be
asked to evaluate and suggest solutions that require this type of network security design, so this project demonstrates competency in the field. The audience for this strategy is your IT security
manager.
The project leverages the skills that you have built in Module Four and practiced in the Firewall and
Access Control Activity. The project will be submitted in Module Six.
In this assignment, you will demonstrate your mastery of the following course competency:
• Describe the fundamental principles and practices of network traffic flow policy and
enforcement.
Scenario
As a security analyst, you are tasked with creating a network segmentation strategy for your IT
security manager. This includes configuration tasks in a network as well as a written rationale of the
network segmentation strategy.
Your instructor will post a real-world scenario that includes the minimum specifications on which
your work will be based. You will also be provided with a Packet Tracer native file (.pkt) that you will
import into the Packet Tracer application to use as the base diagram for your network. You will use
the scenario and the provided Packet Tracer lab environment to do your work.
Prompt
You must address the critical elements listed below. Network Segmentation Strategy
1. Configuration
A. Configure the host-based firewall policy to meet project specifications. Provide a
screenshot of the configured policy.
B. Configure the FTP server to meet project specifications for access control. Provide a
screenshot of the configured FTP server.
C. Configure the network-based firewall policy to meet project specifications for the
extended access control list. Provide a screenshot of the configured policy.
II. Rationale
A. Describe how network segmentation is achieved after meeting the configuration
requirements for the host-based firewall.
B. Describe how the concept of least privilege is achieved in the configuration of the FTP
server.
C. Describe an approach of employing a network-based firewall to achieve
network isolation to meet project specifications.
What to Submit
Your submission should be 1 to 2 pages in length (not including screenshots) and should be written
in APA format. Use double spacing, 12-point Times New Roman font, and one-inch margins. Use a
filename that includes the course code, the assignment title, and your name—for example,
CYB_100_Project_One_Neo_Anderson.docx. Criteria
Configuration: Host-Based Firewall Policy
Project Two Rubric
N/A
Configuration: FTP Server
N/A
Configuration: Network-Based Firewall Policy N/A
Rationale: Segmentation
Exemplary
Meets "Proficient"
criteria and addresses
critical element in an
exceptionally clear,
Proficient
Configures the host-
based firewall policy to
meet project
specifications and
provides a screenshot of
the configured policy
(100%)
Configures the FTP
server to meet project
specifications for access
control and provides a
screenshot of the
configured FTP server
(100%)
Configures the
network-based firewall
policy to meet project
specifications for the
extended access control
list and provides a
screenshot of the
configured policy
(100%)
Describes how network
segmentation is
achieved after meeting
the configuration
Needs Improvement
Addresses "Proficient"
criteria, but there are
gaps
in clarity, logic,
or detail (55%)
Addresses "Proficient"
criteria, but there are
gaps in clarity, logic,
or detail (55%)
Addresses "Proficient”
criteria, but there are
gaps in clarity, logic,
or detail (55%)
Addresses "Proficient"
criteria, but there are
gaps in clarity, logic,
or detail (55%)
Not Evident
Does not address
critical element, or
response is
irrelevant (0%)
Does not address
critical element, or
response is
irrelevant (0%)
Does not address
critical element, or
response is
irrelevant (0%)
Does not address
critical element, or
response is
irrelevant (0%) Criteria
Rationale: Least Privilege
Rationale: Isolation
Articulation of Response
Exemplary
insightful,
sophisticated, or
creative manner
(100%)
Meets "Proficient"
criteria and addresses
critical element in an
exceptionally clear,
insightful,
sophisticated, or
creative manner
(100%)
Meets "Proficient”
criteria and addresses
critical element in an
exceptionally clear,
insightful,
sophisticated, or
creative manner
(100%)
Submission is free of
errors related to
grammar, spelling,
and organization and
is presented in a
professional and
easy-to-read format
(100%)
Proficient
requirements for the
host-based firewall
(85%)
Describes how the
concept of least
privilege is achieved in
configuration of the
FTP server (85%)
Describes an approach
of employing a
network-based firewall
to achieve network
isolation to meet project
specifications (85%)
Submission has no
major errors related to
grammar, spelling, or
organization (85%)
Needs Improvement
Not Evident
Addresses "Proficient”
criteria, but there are
gaps in clarity, logic,
or detail (55%)
Addresses "Proficient”
criteria, but there are
gaps in clarity, logic,
or detail (55%)
Submission has some
errors related to
grammar, spelling, or
organization that
negatively impact
readability and
articulation of main
ideas (55%)
Does not address
critical element, or
response is
irrelevant (0%)
Does not address
critical element, or
response is
irrelevant (0%)
Submission has
critical errors related
to grammar,
spelling, or
organization that
prevent
understanding of
ideas (0%)