Describe a comprehensive security policy for this data

Assignment Help Science
Reference no: EM132311941

The infrastructure which encompasses the network solution and security considerations is a major consideration for your company. Considering that the company will be expanding from one (1) floor to three (3) floors in the very near future you, as the CIO, are responsible for the design of the infrastructure and security protocols. You have been tasked with designing a network that is stable, redundant, and scalable. In addition, speed and reliability are important considerations. Assumptions should be drawn regarding network usage in relationship to network services and resources. All the established criteria that were set at the onset should be adhered to within your plan. The network solution that is chosen should support the conceived information system and allow for scalability. The network infrastructure will support organizational operations; therefore, a pictorial view of workstations, servers, routers, bridges, gateways, and access points should be used. In addition, access paths for Internet access should be depicted. Additionally, the security of the network should be in the forefront of your design because protecting your data is a primary consideration.

Section 1: Infrastructure Document

Write a four to six (4-6) page infrastructure document in which you:

Justify and support the relationship between infrastructure and security as it relates to this data-collection and analysis company.

Present the rationale for the logical and physical topographical layout of the planned network.

Design a logical and physical topographical layout of the current and planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.

Illustrate the possible placement of servers including access paths to the Internet, intrusion detection systems (IDS), and firewalls. Note: Facility limitations, workstations, databases, printers, routers, switches, bridges, and access points should be considered in the illustration.

Create and describe a comprehensive security policy for this data-collection and analysis company that will:

Protect the company infrastructure and assets by applying the principals of confidentiality, integrity, and availability (CIA). Note: CIA is a widely used benchmark for evaluation of information systems security, focusing on the three (3) core goals of confidentiality, integrity, and availability of information.

Address ethical aspects related to employee behavior, contractors, password usage, and access to networked resources and information.

Reference no: EM132311941

Questions Cloud

Analyze US political news article from RealClearPolitics : For this News Briefing Quest task, pick and analyze a U.S. political news article from RealClearPolitics. Present your own opinion about the political issue,
Applicability of concept to your professional practice : How well you demonstrate knowledge and understanding of concept and critical thinking pertaining to applicability of concept to your professional practice.
Explain how the nonprofits filled the need : Explain how the nonprofits filled the need. Describe intended and unintended consequences of these partnerships. Use two to four scholarly resources to support
Who had digestive disorders or difficulties such as ulcers : During your lifetime you may have known individuals who had a digestive disorders or difficulties such as ulcers or irritable bowel syndrome,
Describe a comprehensive security policy for this data : Create and describe a comprehensive security policy for data-collection and analysis company that will. Address ethical aspects related to employee behavior.
Why students should take professional communications course : Develop promotional message that is no more than one page to explain why students should take a professional communications course
Differences between the texts of motet and madrigal : What are the differences between the texts of a motet and a madrigal? How does the music for these forms reflect these differences?
What kinds of cyber-attacks have you experienced : What kinds of cyber-attacks have you experienced? Have you had a computer that was infected with a virus? Have you fallen for a phishing scheme?
Discusses issue from both workplace and societal viewpoint : You will choose social issue affecting workplace-working environment and develop paper that thoroughly discusses issue from both workplace-societal viewpoint.

Reviews

Write a Review

Science Questions & Answers

  Journal of pharmaceutical sciences

This journal is a scientific publication of Indian Pharmaceutical Association and highlights various bright points of it.

  Optical fibres

This document discuss about the main attributes and characteristics of optical fibres.

  Micro organisms

This project report reveals the fact and proves a specific objective mentioned to be studied upon.

  Describing histology of an organ

The discussion of the technique should include a literature review on the evolution of the technique.

  Interpret the sensitivity of mammography

Calculate and interpret the sensitivity of mammography. Diagnostic test with Sensitivity 50%, Specificity 50% and prevalence 50%. Crude mortality rate. Damage caused by motor vehicle accidents.

  Discuss the role that science plays in your daily life

Role that science plays in your daily life and Integrity, Intensity, Innovation, and involvement in scientific field

  Prepare a flexible budget gator divers

Prepare a Flexible Budget Gator Divers is a company that provides diving services such as underwater ship repairs to clients in the Tampa Bay area.

  Neurological disorders

Designing a neuroprosthesis for the neurological disorders

  Complexity of cell surfaces

Lipid rafts provide another example of the complexity of cell surfaces in both their structural character and biologic functionality. Please explain the nature of these structures and their functionality.

  Exploratory activity on bird beaks

Describe how natural selection and evolution are demonstrated by this activity

  Spatial and temporal variation of heat content in the upper

In this study the temporal and spatial variation of heat content in the upper 70m layer of the Arabian Sea was for a period of 1991 to 2008 have been attempted.

  Earthquake databases

Earthquake Databases

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd