Design a secure network using either visio paint word etc

Assignment Help Computer Network Security
Reference no: EM131593950

CASE PROJECT: LAW FIRM

6 Pages Will be okay

Company: Law Firm: Lincoln Partners, Esq.

A law firm has hired you as a Network Security Consultant to help its operations by providing a secure network to support its growth. The Law firm currently has offices in Philadelphia, Cherry Hill, Wilmington, Harrisburg and Princeton. Its corporate office out of Philadelphia will provide all of its IT support.

Philadelphia Office is the main corporate office and consists of the following groups

Legal Group

Partners: There are 3 Attorneys that are the principals of the firm.

Associates: There are 10 Associates, attorneys, who work for the firm but do not share in the company profits, and therefore are not partners.

Paralegals: There are 15 Paralegals, who work on a part time basis to support the law firm

Office Manager: One manager who is responsible to support the office and she is responsible to ensure that everything runs smoothly, such as telephone, Fax, Copy, Supplies, Utilities, IT, etc. Also Manages the Cherry Hill Location.

IT Admin: He is responsible for maintaining all of the IT equipment: Internet Services, Telephone Services, Desktops, Servers, Routers and Switches, and Website. Also supports the Cherry Hill location.

Other Offices:

Associates: There are three associates, who help get new clients from other offices and their respective areas.

Paralegal: There is one paralegal to support the associates

IT Background Information

 

Philadelphia

Other Offices

Servers (Windows )

1

1

Desktops

20

4

Network Printers / Copier / Fax

1

0

Desktop Printers

5 - (Partners, Office Manager, IT Admin)

4

Laptops

4

0

Routers

1

1

Switches

1 Main 2 Distributions

1

Website - Outsourced

Outsourced


Email -

Outsourced


Security Issues: What concerns the partners at this firm

1) Associates and paralegals taking clients / stealing business

2) Not having the ability to monitor business in remote locations

3) Reduce Costs in IT by consolidating

4) Privacy for their clients information

Task 1: Design a Secure Network using either Visio, Paint, Word, etc showing the All locations.

Task 2: Design and provide the IP Scheme for the network

Task 3: Establish a VPN between the All offices and allow the ability to work from home.

Task 4: Allow all employees the ability to access servers at the other locations

Task 5: Show and/or document all necessary security controls and its configuration.

Task 6: Update the firewalls to ensure security policy is enforced

Task 7: Show the DMZ on the diagram and placement of servers and Eliminate Outsourcing

Additionally, a new database (DB) system has been implemented in the Philadelphia office that is accessible by all locations. The DB holds client data that is confidential, and needs to be properly protected. The DB system also tracks attorney hours and allows the attorneys to charge the right customers. Many attorneys have been issued laptops and now have the ability to VPN from home.

Reference no: EM131593950

Questions Cloud

An issue of common stock most recent dividend : An issue of common stock's most recent dividend is $3.75. Its growth rate is 5.0%. What is its price if the market's rate of return is 9.6%?
Interest compounded semiannually : You will deposit $6,000 today. It will grow for 10 years at 10% interest compounded semiannually.
Outlines an intervention plan for changing that behavior : Write a 1,400- to 1,750-word paper that outlines an intervention plan for changing that behavior.Describe the function of the baseline behavior.
What is the approximate yield to maturity for ten year bond : What is the approximate yield to maturity for a 10-year bond that pays 6 interest on a $1000 face value annually if the bond sells for $920?
Design a secure network using either visio paint word etc : Design a Secure Network using either Visio, Paint, Word, etc showing the All locations. Allow all employees the ability to access servers at the other location.
Find which sets of vectors are coplanar : In given exercise, find which sets of vectors are coplanar.
What is market value of the bond : A twelve-year bond, with par value equals $1,000, pays 8% annually. what is the market value of the bond?
Determine the value today of one of these bonds : Determine the value today of one of these bonds to an investor who requires a 11% rate of return on these securities.
Federal government debt levels : Federal Government Debt levels are at historic highs (aggregate debt is now almost $20 Trillion which is almost $61,000 for every man, woman and child in the US

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd