Design a network infrastructure for two campuses

Assignment Help Computer Network Security
Reference no: EM132007917

Telecommunications

Case Assignment

The Acme Corporation is a new startup that wishes to sale their new phone to the public called Acmephone, a more secure version of the phone to business organizations, called the Acmephone B+, and highly secure version of the phone, called the Acmephone G+, to the government. Due to the fear of corporate espionage and government security requirements, there are many security concerns that must be addressed.

As a security professional, you have been employed to design a network infrastructure for their two campuses located in Atlanta and Cincinnati based upon the following specifications:

1. There needs to be a constant connection between the two locations that can carry at least 50 Mbps of data.

2. Each facility has three floors. The buildings are rectangular with each floor being 350'x350'.

3. There will be 200 network connections on each floor with an additional 100 network connections in the data centers located on the third floor of each building.

4. The primary data center will be located at the Atlanta location.

5. There will be a failover data center at the Cincinnati location.

6. Each location should be protected from intrusions that are not limited to state change attacks.

7. The Atlanta location will house the two secure development teams. As such, it will need the most security. To further complicate the design, there will be database servers and the corporate Web servers housed at that location as well.

8. There will be database servers located at the Cincinnati site.

9. The servers must have redundancy.

10. The solution must have a plan to verify security measures.

Your job is to develop a network design to meet the requirements above.

1. You should submit a network drawing listing the network's topology including any necessary hardware.

2. You should list any recommended cable.

3. You can recommend wiring closets wherever you need them.

4. You should recommend ways to assure that you are not getting attacked.

5. You should build traps to stop attackers.

6. You should recommend any WAN or wireless technologies.

7. You should recommend any technology needed in the data center for high availability.

8. Justify your recommendations.

Verified Expert

In the given task the there is network in which database server and web server are present. In other hand there is branch network but branch having only database server. So for the given network design is required. security implementation is required and company wanted to trap attacker so that source of attack can be known. DMZ is recommended for the given assignment to provide security. and server redundancy is created for providing high availability.

Reference no: EM132007917

Questions Cloud

What is the impact of security breaches on society : List and define 4 specific computer attacks AND steps you can take to protect yourself. What is the impact of security breaches on society?
Estimate weston current cost of capital : Estimate Weston's current equity beta. Estimate Weston's current cost of capital.
How do the teams manage their team boundaries : How do the teams manage their team boundaries? What are the trade-offs between internal cohesion and external ties within each type of team?
What serious biases or misassumptions do groups : What serious biases or misassumptions do groups that are involved in inter-team conflict sometimes experience? How do these biases and prejudices affect.
Design a network infrastructure for two campuses : Design a network infrastructure for two campuses located in Atlanta and Cincinnati based upon the specifications
Historical averages of the united states : Are the current unemployment and inflations rates high or low compared to the historical averages of the United States?
Create all the instances to fill up your array : Declare and initialize an array of 5 Tribbles. Create all the instances to fill up your array (passing random locations and other values to the constructor).
Compute the expected return for stock : There is a 28.10% probability of a below average economy and a 71.90% probability of an average economy. Compute the Expected Return for Stock A :
Which of these would be considered discrimination : 1. In the United States, some groups have higher incomes than others. Which of these would be considered discrimination?

Reviews

inf2007917

12/21/2018 12:54:00 AM

HI, this assignment was very good ,I got 90% thanks for your help. However, I'll definitely use you again as an average student this is very good score. I am sooo happy with this expert as well. Thanks once more. Yes for sure I will utilize your service.

len2007917

6/5/2018 3:21:45 AM

Presentation The presentation is clear and consistent. The presentation includes motivating questions and advanced organizers The presentation logical progression of ideas and supporting information exhibiting a unity, coherence, and cohesiveness The presentation is generally competent. Ideas may show some inconsistency in organization or in their relationships to each other. 15

len2007917

6/5/2018 3:21:39 AM

Grammar, clarity, and organization The manuscript is well written and ideas are well developed and explained. Sentences and paragraphs are grammatically correct. Uses subheadings appropriately. The manuscript effectively communicates ideas. The writing is grammatically correct, but some sections lack clarity. The manuscript is poorly written and confusing. Ideas are not communicated effectively. 15 References and citations Properly and explicitly cited. Reference list matches citations Properly cited. May have a few instances in which proper citations are missing. The manuscript lacks proper citations or includes no citations. 10

len2007917

6/5/2018 3:21:34 AM

Maintains purpose/focus The project is well organized and has a tight and cohesive focus that is integrated throughout the document The project has an organizational structure and the focus is clear throughout. The document lacks focus or contains major drifts in focus 10 Methodology • Sample • Procedures • Measures • Data analytic plan Identifies appropriate methodologies and research techniques (e.g., justifies the sample, procedures, and measures). Data analytic plan is suitable to test study hypotheses. Provides appropriate justification for controls. Project is feasible Identifies appropriate methodologies and research techniques but some details are missing or vague. The methodologies described are either not suited or poorly suited to test hypotheses. The methodology is under-developed and/or is not feasible. 10

len2007917

6/5/2018 3:21:28 AM

Supporting evidence Provides clearly appropriate evidence to support position Provides adequate evidence to support position Provides little or no evidence to support position 10 Review of relevant research Sophisticated integration, synthesis, and critique of literature from related fields. Places work within larger context. Provides a meaningful summary of the literature. Shows understanding of relevant literature Provides little or no relevant scholarship. 10

len2007917

6/5/2018 3:21:22 AM

Project Evaluation Rubric Component Exemplary (3) Adequate (2) Inadequate (1) Score Max Project overview Effectively and insightfully develops a set of testable, supportable and impactful study hypotheses. Develops a set of testable and supportable hypotheses. Hypotheses are not testable or justifiable. 10 Justification for hypotheses The introduction section provides a cogent overview of conceptual and theoretical issues related to the study hypotheses. Demonstrates outstanding critical thinking. The introduction section provides a logical overview of conceptual and theoretical issues related to the study hypotheses. Demonstrates competent critical thinking. Very little support for the conceptual and theoretical relevant to the study hypotheses was provided. Provides little evidence of sound critical thinking. 10

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd