Create a network diagram that makes use of devices

Assignment Help Computer Engineering
Reference no: EM132839359

Assignment: It is essential to have a basic understanding of network defense topologies in order to properly comprehend the defensive strategies deployed by companies to protect their information assets.

Use the Cisco Packet Tracer application to create a network diagram that makes use of the following devices listed below, which belong to Company X. The diagram should illustrate your knowledge of network defense by placing network assets in their proper location, so as to ensure their protection. Include, within the diagram, any small office/home office (SOHO) solutions that will be used to protect either the infrastructure or end-user devices.

Within the diagram make sure to include at a minimum:

1. 10 mobile devices (phones/laptops/tablets)

2. Five desktop/stationary computers

3. Two servers (file/email)

4. One printer

5. One router/firewall

6. One WAN/gateway connection

7. One switch

8. One corresponding backup/replication asset for disaster recovery (local or remote storage/server)

Note: Any IP addresses used should be labeled next to the corresponding device.

Then, create a report outlining the abilities of the network topology in reference to securing network devices and other information assets used by Company X. Make sure to address the following within the report:

1. A detailed explanation of the topology design addressing the "why" and "how" of the topology defenses solution and design, specifically threat models, motivations (such as insider threat), and ideologies

2. Network defense solution list (i.e., software/hardware used to protect information assets)

3. Encryption policies used by the network and end-users

4. Disaster plan recovery, including restoration plans

When completing the report for this assignment, refer to the "Report Template."

APA style is not required, but solid academic writing is expected.

Reference no: EM132839359

Questions Cloud

Discuss purchasing the various types of items : Discuss purchasing the various types of items that are stocked in the Pharmacy Department in terms of HOW the following principals will (or should)
Describe impact of dr martin luther king jr assassination : Describe the impact of Dr. Martin Luther King Jr.'s assassination on the effort to expand civil rights for African Americans. How might the struggle for civil
Comparison of canadian gaap with ifrs : Comparison of Canadian GAAP with IFRS, students will write a 3 pages research report to compare the Canadian GAAP with IFRS. How are they are suitable
What was life like in germany during the weimar republic : What was life like in Germany during the Weimar Republic? In what ways is the Weimar Constitution similar to the US Constitution?
Create a network diagram that makes use of devices : Use the Cisco Packet Tracer application to create a network diagram that makes use of the following devices listed below, which belong to Company X.
How do charles chesnutt short story about wife of youth : How do Charles Chesnutt's short story "The Wife of his Youth," Alice Dunbar Nelson's short story "The Stones of the Village," and James Weldon Johnson
How pharmaceutical companies use electronic records : Check newspapers, Web sites, trade journals, and other sources of news or recent information for one or more topical mentions of electronic document management.
PMBoK versus PRINCE2 or Agile in contemporary projects : PMBoK versus PRINCE2 or Agile in contemporary projects - How each method treats project risk and compares and contrasts PMBoK and PRINCE2 or Agile
Explain the purpose of the system of checks and balances : An important feature of the U.S. Constitution. Explain the purpose and structure of the system of checks and balances and give an example of how it works.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd