Solved by a verified expert :Assignment 1: LASA 2 Internal and External Security PlanningIn this assignment, you will write a paper in which you create a network security plan for a small business.Tasks:You are an IT manager for a small business. You are being asked to create a network security plan both for internal IT workers and for the company in general.You are to put together a network security plan that addresses each of the following components:Explain the use of virtual private networks (VPNs) and their security benefits and drawbacks.Create a standard procedure for adding new users to a network.Create a summary of a network plan, including the use of a firewall, written for a business person with limited knowledge of IT.Document the uses of an intrusion detection system.Identify and explain whether workers should be required to report potential security violations and create a policy based on your viewpoints.Determine the best e-mail policy for an organization and document it for a business owner.Create a password-change policy for a networking group.Provide an executive summary briefing for a non-IT manager to review the business implications for the IT policies that you are recommending.Submission Details:By Monday, March 14, 2016, prepare a 7- to 9-page report. Write in a clear, concise, and organized manner; demonstrate ethical scholarship in accurate representation and attribution of sources (i.e., use APA format); and display accurate spelling, grammar, and punctuation.Save your document in a Microsoft Word document with the name M5_A1_LastName_FirstIinitial.doc, and upload it to the M5 Assignment 1 LASA 2 Dropbox.LASA 2 Grading Criteria and RubricAll LASAs in this course will be graded using a rubric. This assignment is worth 300 points. Download the rubric and carefully read it to understand the expectations.Assignment 1 Grading CriteriaMaximum PointsExplained the use of VPNs and their security benefits and drawbacks.32Created a standard procedure for adding new users to a network.36Created a summary of a network plan, including the use of a firewall, written for a business person with limited knowledge of IT.36Documented the uses of an intrusion detection system.40Identified and explained whether workers should be required to report potential security violations and created a policy based on your viewpoints.36Determined the best e-mail policy for an organization and document it for a business owner.28Created a password-change policy for a networking group.28Writing Components:Organization (16)Usage and Mechanics (16)APA Elements (24)Style (8)64Total:300