Design and provide the ip scheme for the network

Assignment Help Computer Network Security
Reference no: EM131310632

CASE PROJECT:  LAW FIRM

Company:  Law Firm: Lincoln Partners, Esq.

A law firm has hired you as a Network Security Consultant to help its operations by providing a secure network to support its growth.  The Law firm currently has offices in Philadelphia, Cherry Hill, Wilmington, Harrisburg and Princeton.  Its corporate office out of Philadelphia will provide all of its IT support.

Philadelphia Office is the main corporate office and consists of the following groups

Legal Group

Partners:  There are 3 Attorneys that are the principals of the firm.

Associates:  There are 10 Associates, attorneys, who work for the firm but do not share in the company profits, and therefore are not partners.

Paralegals: There are 15 Paralegals, who work on a part time basis to support the law firm

Office Manager:  One manager who is responsible to support the office and she is responsible to ensure that everything runs smoothly, such as telephone, Fax, Copy, Supplies, Utilities, IT, etc. Also Manages the Cherry Hill Location.

IT Admin:  He is responsible for maintaining all of the IT equipment: Internet Services, Telephone Services, Desktops, Servers, Routers and Switches, and Website. Also supports the Cherry Hill location.

Other Offices:

Associates:  There are three associates, who help get new clients from other offices and their respective areas.

Paralegal: There is one paralegal to support the associates

IT Background Information

 

Philadelphia

Other Offices

Servers (Windows )

1

1

Desktops

20

4

Network Printers / Copier / Fax

1

0

Desktop Printers

5 - (Partners, Office Manager, IT Admin)

4

Laptops

4

0

Routers

1

1

Switches

1 Main 2 Distributions

1

Website - Outsourced

Outsourced

 

Email -

Outsourced

 

Security Issues:  What concerns the partners at this firm

1) Associates and paralegals taking clients / stealing business

2) Not having the ability to monitor business in remote locations

3) Reduce Costs in IT by consolidating

4) Privacy for their clients information

Task 1: Design a Secure Network using either Visio, Paint, Word, etc showing the All locations.

Task 2: Design and provide the IP Scheme for the network

Task 3: Establish a VPN between the All offices and allow the ability to work from home.

Task 4: Allow all employees the ability to access servers at the other locations

Task 5: Show and/or document all necessary security controls and its configuration. And allocate rules (format for rules should be same as attached file 2 )

Task 6: Update the firewalls to ensure security policy is enforced

Task 7: Show the DMZ on the diagram and placement of servers and Eliminate Outsourcing

Additionally, a new database (DB) system has been implemented in the Philadelphia office that is accessible by all locations.  The DB holds client data that is confidential, and needs to be properly protected.  The DB system also tracks attorney hours and allows the attorneys to charge the right customers.  Many attorneys have been issued laptops and now have the ability to VPN from home.

Reference no: EM131310632

Questions Cloud

What circumstances should the state increase restrictions : Should the United States adopt information-control regulations similar to Britain's Official Secrets Act?What are the policy implications of permitting journalists to have the same degree of access to information as occurred during the Vietnam War?
Important contributor to incident management process : Penetration testing is a particularly important contributor to the incident management process. Explain why that is the case, and provide examples of how penetration test results can be used to improve the incident response process.
How long can the air freshener provide fragrance : What is the initial rate of aroma delivery to the surrounding in grams/hour?- How long can the air freshener provide fragrance?
How should i handle the given situation : When confronted, Sarah admitted to the breach of confidentiality. She hasn't made any other mistakes, though, and I really depend on her. How should I handle this situation?
Design and provide the ip scheme for the network : Design a Secure Network using either Visio, Paint, Word, etc showing the All locations. Design and provide the IP Scheme for the network. Establish a VPN between the All offices and allow the ability to work from home
Exception error and explain potential implications : Select a Java program that contains an exception error. The exception error can be one that you have encountered yourself or one you located using the Internet. Describe your chosen exception error and explain potential implications.
Design an autoassociator for these patterns : What response does the network give to the test input pattern, p, shown to the left?
How common is the problem : introduce this topic (i.e., introduce the topic to a casual reader), being sure to present evidence (from the literature) that supports your conclusion that the problem is worthy of concern (How serious is the problem? How common is the problem? ..
Identify various threats to the validity of a proposed topic : In this assignment, you will identify the various threats to the validity of a proposed research topic. The different types of threats to validity and a brief explanation of the threats that are appropriate for your research design.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Program to strip all occurrences

Write a program to strip all occurrences of these characters: '(', ')' and '-'. Also, strip all the leading and trailing whitespace characters. Display the stripped phone number

  Design a remote access control policy for richman

Design a remote access control policy for Richman using the appropriate access controls for systems, applications, and data access. Include the design and justification for using the selected access controls for systems, applications, and data acc..

  Goals of computer security

Computer security as a whole comprises six goals, but not every goal is important to every application. All Web sites are concerned with access control and availability.

  Explaining wan links for point-to-point home office address

Servers, administrative and support users 2 subnets with 50 hosts for faculty & student labs 10 or more WAN links for point-to-point home office address. Design the subnet?

  Internet technology- marketing and security

Internet Technology, Marketing, and Security

  Create a cyber-security policy describing the principle

Create a cyber-security policy describing the principle, the objective, and policy statement for the law firm's company network.

  Concept of privacy and security

For discussion, noting the extent to which we are connected to the internet, at home, while in class, even in flight, what is your approach to protecting your privacy when online? What measures do you take to safeguard your computer and other devi..

  How many possible keys are embodied in the final cipher text

How many possible keys are embodied in the final cipher text? - how many possible keys are embodied in the resulting double-encrypted cipher text?

  Why is the authentication header mode ipsec incompatible

Design and explain any issues or problems - Why is the authentication header (AH) mode of IPSec incompatible with network address translation schemes

  Desktop publishing system used to produce documents

Consider a desktop publishing system used to produce documents for various organizations. Give an example in which system availability is the most impotent requirement. Please be very brief.

  What is access control

What is Access Control? What is SSO and what are some of parts and types of Access Control?

  Describe the steps that are required if a data recovery

Identify the backup software that will be used and how it will be configured. Describe the steps that are required if a data recovery is necessary.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd