Design a network security

Assignment Help Basic Computer Science
Reference no: EM13902165

Design a network, network security, and WAN connectivity for the following situation 

Organization of 100 computer users in three locations:

Location one: 2 buildings, 25 computer users in each building. 50 Total

Location two: 1 building, 15 computers 

Location three: 1 building 35 computer users 

Document your design as follows: 

  1. Introduction to the design Explanation of equipment and software used. MS WORD
  2. Diagram of the entire network. PPT
  3. Diagrams for each location. PPT
  4. Explanation of security procedures. MS WORD
  5. Explanation of WAN connection. MS WORD

 Include with your documentation a PowerPoint presentation of 10 slides illustrating the key points you would convey to management and users.

YOU WILL submit TO ME:  the 2 FILES BELOW

1. A MS WORD DOCUMENT

2. A POWERPOINT PRESENTATION

 

Reference no: EM13902165

Questions Cloud

Identify costs to construct facility that should capitalized : Assume that a company needs to acquire a large special-purpose materials handling facility. Identify the costs to construct this facility that should be capitalized as assets.
Determine the distance to the fault : By multiplying the rhs brackets and collecting terms, show the effect of the leads is given by: Rx = (Rf-Ri/Rf) Rc-(RiRi/Rf). Determine the distance to the fault by modifying the expression in (b) and using Rx/Rc = x/L
Prepare a table with the following column headings : In January 2013, ProTech Co. pays $1,550,000 for a tract of land with two buildings.
What are the mission, values, goals and objectives : What are the (mission, values, goals and objectives) of the organization?
Design a network security : Design a network, network security, and WAN connectivity for the following situation  Organization of 100 computer users in three locations: Location one: 2 buildings, 25 computer users in each building. 50 Total
Represent the greatest advancement : 1. Which do you consider to represent the greatest advancement: Quantum mechanics or discovering the shape of the DNA molecule--- and why?
Evaluate the user dialog strategies used by a menu-driven : Write a four to five (4-5) page paper in which you:Evaluate the user dialog strategies used by a menu-driven interface.Determine why menu-driven interfaces continue to be popular in the modern computing age.
Identify a possible technology : What kind of questions might you ask in-order to identify a possible technology? Is there any other information you can identify and provide that would be useful in solving this problem?
Dispose of the pumped groundwater : If groundwater from a contaminated plume is pumped out using strategically placed wells to contain the contamination. What options do you have to dispose of the pumped groundwater?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Shoppingbay is an online auction service

ShoppingBay is an online auction service that requires several reports. Design a flowchart or psuedocode [this is changed to Java program, since this is an old assignment we're doing for practice in Java] for the following: a. A program..

  Write a function named getrandomaverage

Write a function named "getRandomAverage" that uses a "for" loop to compute the average of random numbers. The function receives the quantity of numbers to be averaged and returns the average of all thevalues. It does not print any output from within..

  Explaining reasonable values for items in risk register

Suggest reasonable values for the items in the risk register for this asset and threat, and provide justifications for your choices.

  Corporate or government agency policy on instant messaging

What specific questions must a corporate or government agency policy on "Employee use of Instant Messaging (IM) using corporate computers" address?

  What is the greatest integer g that is not in s

What is the greatest integer g that is not in S? Just write down the answer, you don't have to show your work here or prove that g is not in S.

  Assess the ease of use and efficiency of using both the

evaluate the ease of use and efficiency of using both windows and unix file management systems. of the two file

  The set binary divisible by 4 when interpreted as an integer

The set of binary strings which are divisible by 4 when interpreted as an integer value

  Design an application that uses three identical arrays

Design an application that uses three identical arrays of at least 20 integers. It should call each module on a different array, and display the number of swaps made by each algorithm.

  Two cyborgs walk into your home

Two cyborgs walk into your home, both claiming to be oracles for the graph 3-colorability decision problem. They both always give a yes/no answer in constant time for any instance, and are each self-consistent

  Identifying and explaining how the breach occurred

Based on the Target Data Breach answer the following questions and use only information from authoritative or scholarly sources and list references. identifying the type of breach identifying and explaining how the breach occurred (or suspicions by a..

  List the three features not supported in vcenter server

•In your words, write a brief explanation on processor, vRAM, vCPU entitlements as well as vCenter server and SUSE Linux for VMware.•List the three features not supported in vCenter server

  How many instructions does the machine execute

Suppose a person is typing forty words per minute at a keyboard. (A word is considered to be five characters.) If a machine executes 500 instructions every microsecond (millionth of a second), how many instructions does the machine execute during the..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd