Design a network infrastructure for two campuses

Assignment Help Computer Network Security
Reference no: EM132007917

Telecommunications

Case Assignment

The Acme Corporation is a new startup that wishes to sale their new phone to the public called Acmephone, a more secure version of the phone to business organizations, called the Acmephone B+, and highly secure version of the phone, called the Acmephone G+, to the government. Due to the fear of corporate espionage and government security requirements, there are many security concerns that must be addressed.

As a security professional, you have been employed to design a network infrastructure for their two campuses located in Atlanta and Cincinnati based upon the following specifications:

1. There needs to be a constant connection between the two locations that can carry at least 50 Mbps of data.

2. Each facility has three floors. The buildings are rectangular with each floor being 350'x350'.

3. There will be 200 network connections on each floor with an additional 100 network connections in the data centers located on the third floor of each building.

4. The primary data center will be located at the Atlanta location.

5. There will be a failover data center at the Cincinnati location.

6. Each location should be protected from intrusions that are not limited to state change attacks.

7. The Atlanta location will house the two secure development teams. As such, it will need the most security. To further complicate the design, there will be database servers and the corporate Web servers housed at that location as well.

8. There will be database servers located at the Cincinnati site.

9. The servers must have redundancy.

10. The solution must have a plan to verify security measures.

Your job is to develop a network design to meet the requirements above.

1. You should submit a network drawing listing the network's topology including any necessary hardware.

2. You should list any recommended cable.

3. You can recommend wiring closets wherever you need them.

4. You should recommend ways to assure that you are not getting attacked.

5. You should build traps to stop attackers.

6. You should recommend any WAN or wireless technologies.

7. You should recommend any technology needed in the data center for high availability.

8. Justify your recommendations.

Verified Expert

In the given task the there is network in which database server and web server are present. In other hand there is branch network but branch having only database server. So for the given network design is required. security implementation is required and company wanted to trap attacker so that source of attack can be known. DMZ is recommended for the given assignment to provide security. and server redundancy is created for providing high availability.

Reference no: EM132007917

Questions Cloud

What is the impact of security breaches on society : List and define 4 specific computer attacks AND steps you can take to protect yourself. What is the impact of security breaches on society?
Estimate weston current cost of capital : Estimate Weston's current equity beta. Estimate Weston's current cost of capital.
How do the teams manage their team boundaries : How do the teams manage their team boundaries? What are the trade-offs between internal cohesion and external ties within each type of team?
What serious biases or misassumptions do groups : What serious biases or misassumptions do groups that are involved in inter-team conflict sometimes experience? How do these biases and prejudices affect.
Design a network infrastructure for two campuses : Design a network infrastructure for two campuses located in Atlanta and Cincinnati based upon the specifications
Historical averages of the united states : Are the current unemployment and inflations rates high or low compared to the historical averages of the United States?
Create all the instances to fill up your array : Declare and initialize an array of 5 Tribbles. Create all the instances to fill up your array (passing random locations and other values to the constructor).
Compute the expected return for stock : There is a 28.10% probability of a below average economy and a 71.90% probability of an average economy. Compute the Expected Return for Stock A :
Which of these would be considered discrimination : 1. In the United States, some groups have higher incomes than others. Which of these would be considered discrimination?

Reviews

inf2007917

12/21/2018 12:54:00 AM

HI, this assignment was very good ,I got 90% thanks for your help. However, I'll definitely use you again as an average student this is very good score. I am sooo happy with this expert as well. Thanks once more. Yes for sure I will utilize your service.

len2007917

6/5/2018 3:21:45 AM

Presentation The presentation is clear and consistent. The presentation includes motivating questions and advanced organizers The presentation logical progression of ideas and supporting information exhibiting a unity, coherence, and cohesiveness The presentation is generally competent. Ideas may show some inconsistency in organization or in their relationships to each other. 15

len2007917

6/5/2018 3:21:39 AM

Grammar, clarity, and organization The manuscript is well written and ideas are well developed and explained. Sentences and paragraphs are grammatically correct. Uses subheadings appropriately. The manuscript effectively communicates ideas. The writing is grammatically correct, but some sections lack clarity. The manuscript is poorly written and confusing. Ideas are not communicated effectively. 15 References and citations Properly and explicitly cited. Reference list matches citations Properly cited. May have a few instances in which proper citations are missing. The manuscript lacks proper citations or includes no citations. 10

len2007917

6/5/2018 3:21:34 AM

Maintains purpose/focus The project is well organized and has a tight and cohesive focus that is integrated throughout the document The project has an organizational structure and the focus is clear throughout. The document lacks focus or contains major drifts in focus 10 Methodology • Sample • Procedures • Measures • Data analytic plan Identifies appropriate methodologies and research techniques (e.g., justifies the sample, procedures, and measures). Data analytic plan is suitable to test study hypotheses. Provides appropriate justification for controls. Project is feasible Identifies appropriate methodologies and research techniques but some details are missing or vague. The methodologies described are either not suited or poorly suited to test hypotheses. The methodology is under-developed and/or is not feasible. 10

len2007917

6/5/2018 3:21:28 AM

Supporting evidence Provides clearly appropriate evidence to support position Provides adequate evidence to support position Provides little or no evidence to support position 10 Review of relevant research Sophisticated integration, synthesis, and critique of literature from related fields. Places work within larger context. Provides a meaningful summary of the literature. Shows understanding of relevant literature Provides little or no relevant scholarship. 10

len2007917

6/5/2018 3:21:22 AM

Project Evaluation Rubric Component Exemplary (3) Adequate (2) Inadequate (1) Score Max Project overview Effectively and insightfully develops a set of testable, supportable and impactful study hypotheses. Develops a set of testable and supportable hypotheses. Hypotheses are not testable or justifiable. 10 Justification for hypotheses The introduction section provides a cogent overview of conceptual and theoretical issues related to the study hypotheses. Demonstrates outstanding critical thinking. The introduction section provides a logical overview of conceptual and theoretical issues related to the study hypotheses. Demonstrates competent critical thinking. Very little support for the conceptual and theoretical relevant to the study hypotheses was provided. Provides little evidence of sound critical thinking. 10

Write a Review

Computer Network Security Questions & Answers

  For this application you will determine how your computer

for this application you will determine how your computer is connected through a network. you do not have to actually

  Discuss the current it cybersecurity policy

Discuss the current (as per the case study) IT cybersecurity policy. Describe the functionality of the new technology selected for implementation and the challenges associated with the current cybersecurity policy.

  Explain how will your plans affect the business

Based on what you've learned so far this week, what factors will you consider when coming up with your security plan? How will your plans affect the business?

  Why is network security critical to financial institutions

Why is network security critical to financial institutions? The Blog topic is based on ‘Banks Banking on Network Security' (Closing Case Study Two, Section 11/Plug in B5 - Integrating the Enterprise, IS Function & IS Technologies).

  Explain some virtues and shortcomings of australian computer

Explain some virtues and shortcomings of the Australian Computer Society Code of Ethics. Explain the ethical implications of "Dataveillance" in a modern day context using suitable examples.

  Information security standards for an organization

Every organization must consider the mandatory and recommended practices when creating its information security program and/or security policies.

  Prepare a report for softarc engineering

Your task is to prepare a report for SoftArc Engineering that discusses-Describe the risks that you see associated with this new Hybrid Cloud strategy

  How bitlocker and bitlocker to go protect data

Discuss how BitLocker and BitLocker To Go protect data using the text Internet and/or your job as reference for full credit.

  How message segmentation can reduce end-to-end delay

What do you think is the best choice of N from an efficiency standpoint? Does your answer change depending on the value of tprop?

  Describe in detail at least four types of system programs

Describe in detail at least four types of system program. Describe in detail advantage time-shared operating system has over a non-time-shared operating system.

  Analyze the necessity for different protocols

Identify common frequency bands used in current RF communications. Analyze the necessity for different protocols in wireless communications. Compare the challenges of using satellites in end-to-end communications links

  Intrusion detection system (ids)

concept of Data, information and knowledge in information warfare, politically motivated computer misdeeds, McClintock Manufacturing, Percentage of Windows systems that run antivirus software that is updated each day, network traffic that is evaluate..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd