Analyze the pros and cons of each alternative architecture

Assignment Help Management Information Sys
Reference no: EM131813364 , Length: 2

• Proposal for a Secure Network Architecture

You have been hired by an international coffee and tea retailer with hundreds of shops around the world. This organization, like most in the industry, is known for providing high-end coffees, teas, and snacks in a caf setting frequented by neighbors and business people in search of an Internet connection.

This organization has a corporate headquarters located in Seattle, Washington. Your task is to recommend a network architecture that will be optimal for the organization to implement in order to offer secure public wireless in each location in a consistent, cost-effective, and secure manner.

Engage in research to explore the available alternatives that would fit these criteria as well as apply the information from the required study materials.

Write a 2-3 page paper that covers the following topics:

• Describe the alternative architectures that would be appropriate to meet the objectives of the project.

• Analyze the pros and cons of each alternative architecture.

• Determine the security implications of each alternative architecture.

• Recommend an architecture that is optimal for implementation by this coffee and tea retailer

• Provide support for your recommendations.

Assignment Requirements

• Written communication: Written communication is free of errors that detract from the overall message.

• APA formatting: Resources and citations are formatted according to APA (6th edition) style and formatting.

• Length of paper: 2-3 pages, excluding the references page.

• Font and font size: Times New Roman, 12 point.

• Required Reading

The required reading covers design considerations for creating a secure network and will support completion of the unit assignment and discussion.

• Use Systems Security Engineering: An Integrated Approach to Building Trustworthy Resilient Systems to read Chapter 3, "The Processes," pages 33-75.

• Web Resources

Videos

The objectives of these videos are to explore applications of network technology and security architectures currently in use and those proposed for the future as well as to provide some context for the required reading and inform the Unit 2 assignment and discussion.

• Level(3) Sponsor Talk: Leveraging Network Intelligence for Data Security (30 minutes).

• Future Network Architectures, SDN, CNN at NetEvents Ethernet 40 Innovations Summit (31 minutes).

Internet and Library Research

Engage in research using the following keywords to explore modern network architectures and the security implications that are associated with those architectures:

• Secure network architecture.

• Secure network design.

• Network architecture alternatives.

• Network design alternatives.

• Network design tools.

• Network architecture development tools.

Reference no: EM131813364

Questions Cloud

Discuss what factors go into deciding what makes up : Security is just one of the trade-offs that organizations must consider when designing their network infrastructure.
What is the relevant cost to make a unit for special order : A customer has offered to buy 14,000 units for $26 each. What is the relevant (incremental) cost to make a unit for the special order
Estimating the state insurance commission : A state insurance commission estimates that 13% of all motorists in its state are uninsured. Suppose this proportion is valid.
Identify and define the users of accounting information : What is accounting information? What role does it play in the firm
Analyze the pros and cons of each alternative architecture : Describe the alternative architectures that would be appropriate to meet the objectives of the project.
What collaborative methods of problem : What collaborative methods of problem MEE 5901, Advanced Solid Waste Management 3 solving could be use to solve the marketing team's problem of choosing an RPF?
Write a report to update her about the potential liability : write a report to update her about the potential liability that auditors face as a result of the global financial crisis
Determine documents will contain with some sort of error : An outside financial auditor has observed that about 4% of all documents he examines contain an error of some sort. Assuming this proportion to be accurate.
Calculate the net cash flow from investing activities : The following information was taken from ABC Company's 2018 income statement: Calculate the net cash flow from investing activities for 2018

Reviews

Write a Review

Management Information Sys Questions & Answers

  Write a review about section on personal speech recognition

Write a review about Section on personal speech recognition products like DragonNaturally, and others.

  Describe the process of performing a risk assessment

Analyze the term "risk appetite". Then, suggest at least one practical example in which it applies.Describe the process of performing a risk assessment.

  Definition of procurement and contract management

A research paper about the field of project management and how it relates to purchasing and supply management

  Which kinds of information systems do users really need

the personal computer marketplace became fragmented around choices about which operating system people thought was best or coolest, or about which choice of systems offered users the best integrated and reliable options versus price.

  Summarize the project requirements and other assumptions

As the project manager for an IT department, you have been assigned to manage the project of deploying a new VoIP phone system to the company's campus. The campus consists of three (3) different buildings, each with twenty to fifty (20 to 50) work..

  Illustrate the nine steps of e-business strategy formulation

Illustrate the nine steps of the e-business strategy formulation roadmap through a real-world example that you are familiar with. What challenges do traditional companies face when moving from bricks to clicks?

  Describes the sourcing trends that are important for it

Identify the factors that were important in each sourcing strategy and whether the sourcing decision was strategic for the long term or tactical for short term.

  List the six general types of information management systems

List the six general types of information management systems, and give one logistics application to each one of the types listed. Highlight the advantages and/or disadvantages

  Evaluate the consequences of a poor hiring decision

Evaluate the consequences of a poor hiring decision. Propose steps that could be taken to prevent such bad decisions in the first place. Examine what an organization could possibly learn when a policy is implemented to observe personnel in an ongoi..

  Describes and prepare a system flowchart

HI5019 - Development and adoption of the accounting software packages and Identify the leaders in the market and what gives them the competitive advantage

  Websites and analyze at least two policy papers

Go to Websites and analyze at least two policy papers or reports published by a government agency or a think tank that address a current issue

  How might the company build more of an online presence

Analysis of their website. What was favorable about their website? What are some of their website attributes that customers may find unappealing?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd