Create draft report detailing all information

Assignment Help Basic Computer Science
Reference no: EM133058741

Scenario

The senior network architect at Corporation Techs has informed you that the existing border firewall is old and needs to be replaced. He recommends designing a demilitarized zone (DMZ) to increase network perimeter security. He also wants to increase the security of network authentication, replacing the current username and password approach.

Tasks

For this part of the project, perform the following tasks:

1. Research and select firewalls for the Corporation Techs network.

a. Describe each firewall, why you selected it, and where it should be placed for maximum effectiveness.

b. Address network, server, and workstation firewalls.

2. Describe a plan for creating a DMZ, and explain how it makes the network more secure.

3. Research network authentication and create a high-level plan for secure authentication to internal network resources.

4. Create a draft report detailing all information as supportive documentation.

5. Cite sources, where appropriate.

Reference no: EM133058741

Questions Cloud

Prepare risk assessment analysis for website : You are the web master for the Republican Party National Committee. Prepare a risk assessment analysis for your website.
Social media platforms such as facebook : Social media platforms such as Facebook, Twitter, and even Tiktok have become very powerful and influential.
Required assistance such as no contact on door delivery : we hope to provide 24/7 virtual video sessions along with required assistance such as no contact on door delivery.
Definitions of structured data and unstructured data : Definitions of structured data and unstructured data. An example of unstructured data as captured within a research database.
Create draft report detailing all information : Research and select firewalls for the Corporation Techs network. Create a draft report detailing all information as supportive documentation.
Primary functions of operating system : What are the primary functions of an operating system? What is open-source software? How does it differ from closed-source software?
User frustration : Describe three reasons users are still frustrated with modern applications. Describe methods for determining if user frustration is caused by poor system design
Direct manipulation : Describe the three principles of direct manipulation and give examples as to how they are used in video game controls.
Database modeling and normalization : Determine the steps in the development of an effective entity relationship model (ERM) diagram.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Data visualization and business intelligence

Several Big Data Visualization tools have been evaluated in this weeks paper. While the focus was primarily on R and Python with GUI tools,

  Building personal brand

What skills you will need for your future career. How you will project a professional image to potential employers.

  How do the two alternative process technologies

How do the two alternative process technologies (Chemling and AFU) differ in terms of their scale and automation?

  Computer discussion homework

While it is understood that the CIO should set the example for the IT organization, determine the top three things that the head of IT should be doing to improve the skills of the IT staff.

  Implement this hash search method

If items are retrieved from a hash table with unequal frequencies a gradual speed-up in retrieval can be obtained by shifting each item as it is retrieved one position closer to its original hash position by performing an exchange. Implement this ..

  Project resource management

The 6th edition of the PMBOK has changed its "Project Human Resource" knowledge area to "Project Resource Management".

  Discusses methods to assess quality of simulations

Discusses methods to assess the quality of simulations. You learned about three different views of simulation quality.

  How to operate a computer system

Compose a letter to simon on how to operate a computer system

  Different approaches to detect outliers in dataset

What's an attribute? What's a data instance? Define outlier. Describe 2 different approaches to detect outliers in a dataset.

  Short-distance baseband transmission and for ir signaling

Line-coding is a technique used in short-distance baseband transmission and for IR signaling. Based on the NZR (non-zero) Manchester-encoding technique, line-coding for IR signals depends on modulated light rays. Briefly describe how emitted IR li..

  Reduce total cost of computing and enhance green computing

Many believe that cloud computing can reduce the total cost of computing and enhance "green computing" (environmental friendly).

  Probabilities of the indicated outcomes

In Problem use probability trees to find the probabilities of the indicated outcomes.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd