Analyze need of a fictitious organization-wonder widgeta inc

Assignment Help Computer Network Security
Reference no: EM131725409

Assignemnt: Why Virtualize?

In this assignment, you will analyze the needs of a fictitious organization-Wonder Widgets Inc.

Scenario:

You have recently been hired to manage the entire network infrastructure of Wonder Widgets Inc., a midsized manufacturing firm that has been in business for over fifty years. The organization's technology infrastructure has grown organically through the years, adding servers as per the changing needs or replacing aging servers with new ones. The organization has forty-three servers of varying makes and models strewn throughout the facility wherever space to house the equipment could be found.

The current owner of the organization was responsible for the technology infrastructure until you were hired.

During a tour of the facility, you mention that the organization should consider virtualizing the server environment. Upon hearing the word, the owner says to you, "I keep hearing about this virtualization. I don't get it. Why does everyone seem to be doing this?"

Tasks:

Using the Argosy University online library resources, scholarly or professional resources, your course textbook, and the Internet, research on any three of the following:

• Disaster recovery and business continuity.
• Power consumption.
• Physical space requirements.
• Server provisioning.
• Server availability (uptime).
• Lab environments (test beds).

Based on your research, create a 2- to 3-page Microsoft Word document, including the following:

• A list and a general definition of the three terms selected.
• An overview of the issues that Wonder Widgets Inc. could be facing.
• An explanation of the benefits of virtualization for Wonder Widgets Inc.
• A description of how virtualization can be utilized to address concerns of your selected topics from the above list.
• A justification of your opinion using at least three scholarly sources.
• An explanation of the advantages of moving to a virtualized network for Wonder Widgets Inc. and the key information for making the transition as easy as possible.

Write in a clear, concise, and organized manner; demonstrate ethical scholarship in accurate representation and attribution of sources (i.e., APA); and display accurate spelling, grammar, and punctuation.

Reference no: EM131725409

Questions Cloud

Important for company to have career management program : Do you believe that it is important for a company to have career management program? Why or why not?
Identify and explain the types of pumps : Develop a simple Process and Instrumentation Diagram of any one process from the industry - Explain in detail the Feed and the Product streams
What is the optimal service level : What is the optimal service level that Ms. Turner should target to maximize expected profits?
Urban growth boundary and zoning policy : What is the difference between Urban Growth Boundary and Zoning Policy and their anticipated effect on property price?
Analyze need of a fictitious organization-wonder widgeta inc : In this assignment, you will analyze the needs of a fictitious organization-Wonder Widgets Inc. Disaster recovery and business continuity.
Customers as single transacttions or lifelong relationship : Do they think of their customers as single transacttions or lifelong relationship?
Explain the stakeholders and the influence level : Explain the stakeholders, their roles, and the influence level that they will have on the outcome of the project. Identify the project sponsor.
Why is costco immune from the amazon threat : Why is Costco immune from the Amazon threat? Will that continue going forward? What are the strengths and weaknesses?
What lends his claims credibility : Anecdotally, it seems a no-brainer that companies that provide perks such as free food, What lends his claims credibility?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Explain security measures that you would recommend

Determine and explain security measures, in detail, that you would recommend to enhance security. How cryptography and authentication can support security.

  Creating a switchboard design with control buttons

Construct a detail report that will display all courses in alphabetical order, with course name and instructor name in a group header; the Social Security number, name, and telephone number

  Explain access control methods and attacks

Explain access control methods and attacks

  Describes zero-day attack methodology

CSIS 343- Our text describes zero-day attack methodology, as well as a few countermeasures to defend against zero-day attacks. One defense mechanism discussed is heuristic scanning.

  Describe information systems architecture in terms of data

Apply the tools of systems analysis to describe the information system's architecture in terms of data, processes, interfaces, and network.

  Describe potential behaviors or consequences that can arise

Provide three examples of cognitive dissonance that you have experienced. Describe potential behaviors or consequences that can arise from this inconsistency.

  Develop skills to independently think of innovation

Analyse critically,three current or future security issues in IoT - Create a 3 - 5 minutes presentation and present your work during the Lab

  Indicate whether the certificate is valid or not

Identify the key elements in certificate, including the owner's name and public key, its validity dates, the name of the CA that signed it, and the type and value of signature.

  Analyze the importance of having acceptable use policies

Analyze the importance of having acceptable use policies, remote access policies, and network security control policies. Choose one acceptable use policy, remote access policy, or network security control policy.

  Review critical considerations to prepare procedure guide

Review the critical considerations to prepare the procedure guide. Organize all steps necessary for a malware-free environment.

  Identify the proper phase in the pdca cycle

Identify the proper phase in the PDCA cycle for each security administration task discussed in the lab. Submit to this discussion board.

  What was the apparent motivation of the attacker

Who was the victim of the attack? Who was the attacker, if known? What did the attacker do to the victim? What was the apparent motivation of the attacker?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd