Class Project – Choosing and Securing Network Components
Problem Scenario and Overview
You have just moved into a new home, and you are looking to upgrade/replace some of
your Internet and networking devices. Suppose you have a budget of $1000 to buy the
new devices. Research and pick a new desktop computer and a new router for your
home, listing the specs while justifying your choices (like what you did in Assignment 2).
The specs for each should also include the pricing and a link to where you can
“purchase” it. This should be a complete thought. It could be one or more sentences.
After contacting your Internet Service Provider and getting connected, you now need
to secure all the devices, mobile, and stationary shown in the above diagram by fulfilling
the problem requirements below.
- Research and pick a suitable computer and router for your needs.
- All devices must be protected against intrusion from other people
- Devices must be secure against malware
- People using the devices must be security aware
- Internet access must be secure from unauthorized access and/or intrusion
- All devices must be up-to-date and properly functioning
- All critical data must be recoverable in the event of failure
- The digital communications environment must be safe to use and defended
Part 1: Identify Strategies
Here the problem is defined in detail. The scope of the problem is stated so that it is clear why
this problem is important. The impact and risks of the problem are evaluated so that each risk
is named with its likelihood of occurring and its level of severity. Actions are assigned to each
risk that will reduce or resolve it. Finally, all the people that are affected are identified giving a
clear declaration of their level of involvement with the problem. These people are called
stakeholders. Also include in this document the computer and router you picked.
Hint: you can brainstorm with your classmates in the Class Project Discussion Forum.
Part 2: Propose Solutions – Evaluate Solutions – Evaluate Outcomes
Here possible solutions are proposed and evaluated, and alternative approaches to solving the
problem are identified and discussed (use the Class Project Discussion Forum). There may be
many solutions to this problem. We will call them alternative solutions. Alternative solutions
should be both creative and reasonable. The goal is to choose one solution. We will call this the
recommended solution. Strive to clearly explain why this recommended solution is the best
solution. You should have at least 2 possible solutions to evaluate!
Questions to consider:
Use these and other questions to develop and design your solutions. These are not questions to
answer directly in your submissions but only to help you solve the problem and evaluate your
- How will the security solution be used and by whom?
- Are devices protected from unauthorized use and intrusion?
- Are the people using the devices cyber-security aware?
- Can the data on the devices be recovered?
- Is the environment defended against malware?
- What documentation and planning prepare for security problems?
- Is the Internet use safe from intrusion?
- Does your solution solve the whole problem for all the people involved?
Submit the following:
- Problem Statement you designed in Part 1 (Word document or PDF).
- List of different solutions you designed in Part 2, and the recommended solution. Please
highlight the advantages of the recommended solution over the other alternative solutions
(Word document or PDF).
- Presentation outline and video (PowerPoint or PDF and working YouTube link). This video
shows you how to post a YouTube link.
25 points – problem statement that includes the scope of the problem, analysis of at least 3
risks, and the people affected
25 points – identification of at least 5 steps to secure the environment that includes the value
and importance of each proposed step
25 points – solution is evaluated and defended including the identification and use of at least 3
25 points – presentation (outline and YouTube video) includes a description of the problem,
consideration of at least one solution you did not use and the solution you did, pros and cons of
the proposed solution, a description of the solution selected and the reasoning behind your