Design a logical and topographical layout of planned network

Assignment Help Computer Network Security
Reference no: EM131142533

Project Deliverable: Network Infrastructure and Security

This assignment consists of two sections: an infrastructure document and a revised Gantt chart or project plan.

The infrastructure which encompasses the network solution and security considerations is a major consideration for your company. Considering that the company will be expanding from one floor to three floors in the very near future you, as the CIO, are responsible for the design of the infrastructure and security protocols. You have been tasked with designing a network that is stable, redundant, and scalable. In addition, speed and reliability are important considerations. Assumptions should be drawn regarding network usage in relationship to network services and resources. All the established criteria that were set at the onset should be adhered to within your plan. The network solution that is chosen should support the conceived information system and allow for scalability. The network infrastructure will support organizational operations; therefore, a pictorial view of workstations, servers, routers, bridges, gateways, and access points should be used. In addition, access paths for Internet access should be depicted. Additionally, the security of the network should be in the forefront of your design because protecting your data is a primary consideration.

Section 1: Infrastructure Document

1. Write a four to six page infrastructure document in which you:

? Justify and support the relationship between infrastructure and security as it relates to this data-collection and analysis company.
? Present the rationale for the logical and physical topographical layout of the planned network.
? Design a logical and physical topographical layout of the current and planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.
? Illustrate the possible placement of servers including access paths to the Internet, intrusion detection systems (IDS), and firewalls. Note: Facility limitations, workstations, databases, printers, routers, switches, bridges, and access points should be considered in the illustration.
? Create and describe a comprehensive security policy for this data-collection and analysis company that will:

• Protect the company infrastructure and assets by applying the principals of confidentiality, integrity, and availability (CIA). Note: CIA is a widely used benchmark for evaluation of information systems security, focusing on the three core goals of confidentiality, integrity, and availability of information.

• Address ethical aspects related to employee behavior, contractors, password usage, and access to networked resources and information.

Section 2: Revised Project Plan

Use Microsoft Project to:

2. Update the project plan from Project Deliverable 4: Analytics, Interfaces, and Cloud Technology, with three to five (3-5) new project tasks each consisting of five to ten (5-10) sub-tasks.

Reference no: EM131142533

Questions Cloud

Discuss auto backup for android applications : What are the different data types supported as preference-setting values? What is the directory on the Android file system that stores application Preference XML files? Discuss Auto Backup for Android Applications.
Write a paper by answering following question : How has the history of decolonialism and post-colonialism, and global inequality contributed to the developing threat of terrorism?
Find the critical temperature for thermal damage : Do you expect that to be lower or higher than a constant temperature case of the same exposure duration?
How does socioeconomics effect what is in the report : What is a pre-sentencing investigation report and how does the use of that report affect an offender's eligibility for bail (pretrial release vs pretrial detention), a pretrial diversion program, and sentencing and/or probation? How does socioecon..
Design a logical and topographical layout of planned network : Design a logical and physical topographical layout of the current and planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia.
Discuss the issue of attorney obligations : Discuss here the issue of attorney's obligations under the rule of Confidentiality and the filing of permits for emissions, discharge or waste disposal at facilities
Is this a reasonable value from a physiologic point of view : Is this a reasonable value from a physiologic point of view? Would the patient be considered normal or diabetic?
Write an essay geared towards synthesizing your ideas : write an essay geared towards synthesizing your ideas. Use complete sentences and adhere to standard rules of English grammar, punctuation, mechanics, and spelling.
Who actually formed these ideas : Discuss the following: Who actually formed these ideas? Expand upon the ideas of the 5 general principles. Why do you think they were implemented

Reviews

Write a Review

Computer Network Security Questions & Answers

  Computer security incident

Locard's Exchange Principle, electronic crime scene, modules or DLLs a process, router forensics, Configuration and user, Local logs process and memory, Network Information, File system, Portray the NTP vulnerability of some Cisco IOS routers

  Evaluate the physical security infrastructure

Evaluate the physical security infrastructure at your school or place of business - We can't forget about physical security! After reading through the SANS Physical Security checklist attached here, evaluate the physical security infrastructure at ..

  Determining the variable zipcode

Write some code that assigns True to a variable duplicates if there are two adjacent elements in the list that have the same value, but that otherwise assigns False to duplicates otherwise. In order to accomplish this, you may, if you wish, use o..

  Explain primary tasks high-level investigation processes

Explain the basic primary tasks, high-level investigation processes, and challenges of a computer forensics specialist.

  Advantage of partial order on the empirical relation system

What is the advantage of having a partial order on the empirical relation system and  Why is the number of decisions plus 1 an important method for calculating McCabe's cyclamate number?

  Research on workplace privacy laws

Determine how much time, if any, these two employees are spending surfing the Web. Is it wrong to access these records? Do some research on workplace privacy laws to justify your answer.

  Analysis of the network security

You have just been hired as the security administrator of a major organization that was recently breached by a social engineer. After a thorough analysis of the network security, you have determined that there was no security plan in place and no ..

  Evaluate the importance of the nondisclosure agreement

Evaluate the importance of the Nondisclosure Agreement and other legal agreements to both parties -  Propose the main pre-penetration test steps that the penetration tester should perform before beginning the initial phases of the XYZ penetration t..

  Hashing and bst

Hashing and BST

  Describe diffie-hellman algorithm to exchange shared key

User A and B use Diffie-Hellman algorithm to exchange a shared key and generate public keys of their own. Consider a common prime number q=71If user A has private key=5, what is A's public key?

  Explain how outsourcing can be used for risk transference

Describe how outsourcing can be used for risk transference. Name and briefly describe two examples/cases of risk transference in Australia that you believe this type of risk management helps to protect organisations interest. How is an application ..

  Why will you choose a certain acquisition method

What tools listed in the text book are available and how do you plan to acquire the data? Why will you choose a certain acquisition method?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd