An information security changes required in the environment

Assignment Help Computer Network Security
Reference no: EM13307784

Question 1.

The management of your employer wants to find out about desktop virtualisation and how it works. They think that there may be some advantage to the organisation from adopting some of these desktop virtualisation technologies.

You have been tasked to provide a two (2) page report that describes the differences between the different desktop virtualisation technologies that are now available.

Your report should briefly outline how each virtualisation technology works and indicate the circumstances where the use of each type of technology would be appropriate.

Your report should be supported by references to academic and/or practitioner literature in APA 6th edition format.

Question 2.

An affiliated company of your employer has approximately 2000 users who work on Windows XP workstations. Management wishes to upgrade the operating system to Windows 8 without refreshing and updating its desktop fleet.

Describe which virtualisation technology would be the better choice for virtualising this fleet of workstations. Your report should not exceed two (2) pages and it should include the following information:

Describe your reasons for choosing this virtualisation technology

What advantages does this virtualisation technology give you in this scenario?

What are the disadvantages of using this technology?

Which vendor would you recommend for this and why would you recommend their implementation of this technology?

Your report should be supported by references to academic and/or practitioner literature in APA 6th edition format.

Assignment 2

Regional Gardens Ltd is a company that runs a number of related gardening enterprises. It has a large display garden that it opens for public inspection a number of times a year. The company also ownsthe Regional Gardens Nursery which sells plants and garden supplies to the public. The company also owns Regional Garden Planners, which is a small company that provides garden advice, design and consultancy services.

Regional Gardens Ltd has a small data centre at its main site in Bathurst where the company's servers and data storage is located. The company has the following server infrastructure:

2 x Active Directory domain controllers on Windows Server 2012, (2 x Xeon 3.6GHZ, 8GB RAM, 140GB HDD);

3 x SQL Server 2012 database servers on Windows Server 2012 (2 x Xeon 2.8GHZ, 12GB RAM, 250GB RAID-5 array);

1 x MS Exchange Server 2013 email server on Windows Server 2012 (2 x Xeon 3.6GHZ, 8GB RAM, 250GB RAID-1 array);

4 x Windows Server 2012 File and Print servers (2 x Xeon 2.8GHZ, 4GB RAM, 250GB RAID-1 array);

2 x Red Hat Enterprise 6 Linux servers running Apache and TomCat (2 x Xeon 2.8GHZ, 16GB RAM, 140GB HDD).

The company has some 150 staff, who include management, administrative staff, nursery and Regional Garden Planners staff. The company has a range of different types of relatively old personal computers, which run Windows XP, to connect to the company data centre. These computers will need to be updated in the near future.

The directors of Regional Gardens Ltd are concerned about the increasing costs of power and cooling to operate their data centre and they are investigating whether they should employ a virtualization technology in their data centre. They are also considering whether they should use virtualisation to provide an updated desktop environment to their staff.

You are to consider how to implement a virtual infrastructure for the company and prepare a report for the directors of Regional Gardens Ltd. Your report should include:

A one (1) page Executive Summary that describes the main points of your report

A description of the proposed virtual infrastructure for the data centre, including which virtualisation technology is recommended and the reasons for that recommendation

A description of how virtual applications or desktops (or both) will be delivered to the user's desktops

A description of how you will provide disaster recovery in this infrastructure

A discussion of the information security changes required in this environment and the steps taken to monitor and control these changes

Your argument must be supported by references to academic and/or practitioner literature. All references must be in APA 6th edition format.

Reference no: EM13307784

Questions Cloud

What is the mathematical expression for the magnetic field : A plane electromagnetic wave propagates in a vacuum in the z-direction. What is the mathematical expression for the magnetic field
Write program that prompts user to pick either seat or price : Write a program that prompts users to pick either a seat or a price. Mark sold seats by changing the price to 0. When a user specifies a seat, make sure it is available.
Use ray tracing to determine the height of the image : A near-sighted person might correct his vision by wearing diverging lenses with focal length f = -60cm.  use ray tracing to determine the height of the image
Determine the tsp emission rate of the power plant : On a clear summer afternoon with a wind speed of 3.20 m/s measured at 100 m elevation, the TSP (total suspended solids) concentration was found to be 1520 ug / m3 at a point 2 km downwind
An information security changes required in the environment : A description of how you will provide disaster recovery in this infrastructure. A discussion of the information security changes required in this environment and the steps taken to monitor and control these changes
Competitor evaluation benchmark : Your company has decided to provide you with a new tablet of your choice. However, you must bring your procurement manager a proposal for your selection with benchmark of selected product capabilities and costs. Using MS Excel, build a Competitor Eva..
Write a program that asks user to input grade of student : Write a program that asks the user to input the grade of the student. If the grade is equal or greater than 60, the program prints the word "pass", otherwise it prints the word "fail".
Find the height to which the block rises : Type your question hereA bullet (m = 0.0210 kg) is fired with a speed of 92.00 m/s and hits a block (M = 2.60 kg) supported by two light strings as shown, Find the height to which the block rises
Find the first four terms of recursively defined sequence : Find the first four terms of the recursively defined sequence bk = 2k - bk - 1, for all integers k greater than or equal to 2, where b1 = 4

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd