CYB 230 Project — NO AI or PLAGIARISM. Will be checked. Network System Secur

CYB 230 Project — NO AI or PLAGIARISM. Will be checked.
Network System Security Plan Recommendation
Attached are the Assignment instruction document, Network diagram, Network Diagram description and the network system security plan
Overview
The goal of any security practitioner is a secure network, so it’s essential to have an in-depth understanding of how various components can introduce security vulnerabilities and mitigate security risks. Practitioners must be able to analyze networks, identify deficiencies, and make recommendations to protect the system. In this project, you will be making recommendations for specific components based on your systems-level analysis of a network.
The project will be submitted in Module Seven. You will demonstrate your mastery of the following course competency:
Identify and troubleshoot deficiencies related to IT-system component security
Scenario
During its annual review of IT systems, Helios Health Insurance has realized that it lacks the in-house expertise to update its network system security plan. The organization has therefore hired a consultant to assist in this process. You will assume the role of this security consultant, tasked with updating the organization’s network system security plan by identifying deficiencies and recommending mitigation solutions. In order to help you make your recommendations, you have been provided with the current Helios Network System Security Plan and the Helios Network Diagram. Both documents can be found in the Project Three Submission task in Module Seven of your course.
Prompt
After reviewing the network system security plan and the network diagram, select a security objective (confidentiality, integrity, or availability) as the focus for your analysis and recommendations. Then prepare a report to communicate the system’s deficiencies and your recommendations to the organization’s security team.
Specifically, you must address the critical elements listed below. The codes shown in brackets indicate the course competency to which each critical element is aligned.
Identify a hardware-based deficiency in the system and explain why this is an issue, based on your selected security objective.
Recommend a method to remediate the hardware-based issue and protect the system.
Identify a software-based deficiency in the system and explain why this is an issue, based on your selected security objective.
Recommend a method to remediate the software-based issue and protect the system.
What to Submit
Your submission should be 3 pages in length (plus a cover page and any references). Use double spacing, 12-point Times New Roman font, and one-inch margins. Sources should be cited according to APA style.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount