Design a network infrastructure for their two campuses

Assignment Help Management Information Sys
Reference no: EM132082358

The Acme Corporation is a new startup that wishes to sale their new phone to the public called Acmephone, a more secure version of the phone to business organizations, called the Acmephone B+, and highly secure version of the phone, called the Acmephone G+, to the government.

Due to the fear of corporate espionage and government security requirements, there are many security concerns that must be addressed.

As a security professional, you have been employed to design a network infrastructure for their two campuses located in Atlanta and Cincinnati based upon the following specifications:

1. There needs to be a constant connection between the two locations that can carry at least 50 Mbps of data.

2. Each facility has three floors. The buildings are rectangular with each floor being 350'x350'.

3. There will be 200 network connections on each floor with an additional 100 network connections in the data centers located on the third floor of each building.

4. The primary data center will be located at the Atlanta location.

5. There will be a failover data center at the Cincinnati location.

6. Each location should be protected from intrusions that are not limited to state change attacks.

7. The Atlanta location will house the two secure development teams. As such, it will need the most security. To further complicate the design, there will be database servers and the corporate Web servers housed at that location as well.

8. There will be database servers located at the Cincinnati site.

9. The servers must have redundancy.

10. The solution must have a plan to verify security measures.

Your job is to develop a network design to meet the requirements above.

1. You should submit a network drawing listing the network's topology including any necessary hardware.

2. You should list any recommended cable.

3. You can recommend wiring closets wherever you need them.

4. You should recommend ways to assure that you are not getting attacked.

5. You should build traps to stop attackers.

6. You should recommend any WAN or wireless technologies.

7. You should recommend any technology needed in the data center for high availability.

8. Justify your recommendations.

Reference no: EM132082358

Questions Cloud

The order before delivering the order to the customer : The barista prepares each item in the order before delivering the order to the customer. Model the process to include a looping task.
Identify volunteer opportunities related to the field : An explanation of what courses in the program will give you the skills needed to either succeed in that job or prepare someone else for that job;
Biases influence one approach to strategic planning : How does decision-making style impact preferences, and biases influence one’s approach to strategic planning?
What type of accounting information might be useful : What type of accounting information might be useful to the marketing managers of a business? Why? The response must be typed.
Design a network infrastructure for their two campuses : As a security professional, you have been employed to design a network infrastructure for their two campuses located in Atlanta.
What is the electric potential on the surface : A point charge of 8.40 mC is surrounded by an equipotential surface with a radius of 0.256 m. What is the electric potential on the surface?
Threats represent external factors : Please remember that Strengths and Weaknesses reflect internal factors while Opportunities and Threats represent external factors (see lecture materials).
What is the electric potential : What is the electric potential due to this dipole at a distance of 1.10e-5 m, in a direction 60° from the direction of the moment vector?
What type of liability is it : What Type of Liability Is It? Provide one of the following answers for each item below: current Long term Not a liability. Note payable with an interest rate.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Explain the internal and external penetration tests

Determine whether or not you believe penetration tests are necessary and an integral part of a security program and discuss why.

  Developing global information systems

Developing Global Information Systems - challenges a company faces when developing global information systems

  Can you explain why the team performed so well or so poorly

Discuss the team dynamics for a highly effective or ineffective team of which you were a member. Can you explain why the team performed so well or so poorly?

  Develop a gantt chart illustrating the project tasks

Define five major tasks, each with one to two subtasks. Also write a brief description for each task. Develop a Gantt chart illustrating the project tasks.

  Create an e-business plan for a local company

Create an e-Business Plan for a local company.Create a description of the 3 types of searches that will be used in your PPC plan.

  Create a security plan for medium sized health care facility

Using what you learned from Part I, create a security plan for a medium sized health care facility. In your security plan, evaluate how you would approach security threats from both inside and outside the organization

  Provide the type of the ids

Provide the type of the IDS, the computer platforms on which it runs, any purported strengths or benefits, and any other characteristics you find interesting.

  What does interfaces mean under scope section

Currently working on a business requirements document.  What does "interfaces" mean under "Scope" section?

  Develop two proposals in different professional settings

Explain how you would feel about being diagnosed by a doctor who could be hundreds or thousands of miles from you.

  Impact of various internal and external organizational

Impact of Various Internal and External Organizational "Environments" on IT Management - Your Capstone Case assignment is to produce a reasonable and workable plan to set the stage for these forthcoming IT improvements-a plan that will help affecte..

  Integration of new technologydescribe the purpose of

integration of new technologydescribe the purpose of initiatives and organizations like the justice technology

  Create a provider database and related reports

Create a provider database and related reports and queries to capture contact information for potential PC componentproviders .

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd