An unsecured network poses risk of internal and external compromises. Users in human resources typically transmit sensitive information across the network. The network should encrypt HR data in transit. Using the configurations and topology you added to the “WLAN Configuration Design Template” in Week Three, security and segregate internal traffic. the network to: the “WLAN Configuration Design Template” to include: a 10- to 12-slide PowerPoint® presentation for management to explain from a security standpoint the changes you will make and the reasons for those changes. Include the following in the presentation: Other applications like Adobe® Spark or Microsoft® Sway® or Mix can be used instead of PowerPoint®. The presentation should be “media-rich,” it should include voice-overs, graphics, interaction, and other techniques to create a dynamic multimedia presentation. Be sure to include supporting images and appropriate backgrounds and styles. All references must be attributed, cited appropriately throughout the document, and adhere to APA guidelines. Images should not be copied unless the author permission is obtained or copyright-free images are used.

Title: Enhancing Network Security for HR Data in an Unsecured Network

Introduction:
In today’s interconnected world, network security plays a crucial role in safeguarding sensitive information. This is especially true for human resources (HR) departments, as they frequently transmit confidential data across the network. The purpose of this presentation is to propose necessary changes to the WLAN Configuration Design Template with the aim of enhancing security and segregating internal network traffic. This presentation will outline the rationale behind these changes and present a comprehensive plan to encrypt HR data in transit.

Slide 1: Introduction
– Brief overview of the importance of network security for HR departments.
– Introduce the objective of the presentation: to enhance security and segregate internal traffic using the WLAN Configuration Design Template.

Slide 2: Risks of Unsecured Networks
– Explanation of the risks associated with unsecured networks, both internal and external.
– Highlight potential consequences of compromised HR data.

Slide 3: Current Network Configuration
– Provide an overview of the existing network configuration using the WLAN Configuration Design Template.
– Discuss the vulnerabilities and potential issues related to the current configuration.

Slide 4: Encryption in Transit
– Explain the importance of encrypting HR data in transit.
– Discuss the different encryption protocols available and their strengths in securing data transmission.

Slide 5: Proposed Configuration: Encryption in Transit
– Present the proposed changes to the network configuration to enable encryption for HR data in transit.
– Discuss the recommended encryption protocols and their implementation within the WLAN Configuration Design Template.

Slide 6: Segregation of Internal Traffic
– Explain the benefits of segregating internal network traffic.
– Discuss the risks associated with a lack of segregation.

Slide 7: Proposed Configuration: Segregation of Internal Traffic
– Present the proposed changes to segregate internal network traffic within the WLAN Configuration Design Template.
– Outline the recommended network segmentation techniques and their implementation.

Slide 8: Media-Rich Presentation Techniques
– Discuss the use of media-rich presentation techniques to create a dynamic and engaging multimedia presentation.
– Explain the inclusion of voice-overs, graphics, interactions, and appropriate backgrounds/styles to enhance the overall impact.

Slide 9: Supporting Images and Copyright Guidelines
– Highlight the importance of including supporting images in the presentation.
– Emphasize the need to attribute and cite images appropriately while adhering to APA guidelines.
– Acknowledge the requirement for obtaining author permission or using copyright-free images.

Slide 10: Conclusion
– Recap the proposed changes to the WLAN Configuration Design Template for enhancing security and segregating internal network traffic.
– Reinforce the importance of network security in protecting HR data.
– Encourage management to implement the proposed changes to mitigate risks and ensure the confidentiality of HR information.

References:
– Cite all the references used throughout the presentation in accordance with APA guidelines.

Need your ASSIGNMENT done? Use our paper writing service to score better and meet your deadline.


Click Here to Make an Order Click Here to Hire a Writer