Develop a network design to meet the requirements

Assignment Help Management Information Sys
Reference no: EM131935318

Case Assignment

The Acme Corporation is a new startup that wishes to sale their new phone to the public called Acmephone, a more secure version of the phone to business organizations, called the Acmephone B+, and highly secure version of the phone, called the Acmephone G+, to the government.

Due to the fear of corporate espionage and government security requirements, there are many security concerns that must be addressed. As a security professional, you have been employed todesign a network infrastructure for their two campuses located in Atlanta and Cincinnati based upon the following specifications:

1. There needs to be a constant connection between the two locations that can carry at least 50 Mbps of data.

2. Each facility has three floors. The buildings are rectangular with each floor being 350'x350'.

3. There will be 200 network connections on each floor with an additional 100 network connections in the data centers located on the third floor of each building.

4. The primary data center will be located at the Atlanta location.

5. There will be a failover data center at the Cincinnati location.

6. Each location should be protected from intrusions that are not limited to state change attacks.

7. The Atlanta location will house the two secure development teams. As such, it will need the most security. To further complicate the design, there will be database servers and the corporate Web servers housed at that location as well.

8. There will be database servers located at the Cincinnati site.

9. The servers must have redundancy.

10. The solution must have a plan to verify security measures.

Your job is to develop a network design to meet the requirements above.

1. You should submit a network drawing listing the network's topology including any necessary hardware.

2. You should list any recommended cable.

3. You can recommend wiring closets wherever you need them.

4. You should recommend ways to assure that you are not getting attacked.

5. You should build traps to stop attackers.

6. You should recommend any WAN or wireless technologies.

7. You should recommend any technology needed in the data center for high availability.

Justify your recommendations.

Verified Expert

In the given task the there is network in which database server and web server are present. In other hand there is branch network but branch having only database server. So for the given network design is required. security implementation is required and company wanted to trap attacker so that source of attack can be known. DMZ is recommended for the given assignment to provide security. and server redundancy is created for providing high availability.

Reference no: EM131935318

Questions Cloud

Explain how a natural experiment differs from a traditional : Explain how a natural experiment differs from a traditional one by providing an example of each and discussing the differences.
Variety of disciplines including education : Leadership is a topic studied from a variety of vantage points in a variety of disciplines including education.
Educational facility-wants information about safety programs : A parent visited your educational facility and wants information about the safety programs you have in place.
How do insurance and financial resources affect the options : How do insurance and financial resources affect the options? How do cultural beliefs, traditions, and religion affect the options?
Develop a network design to meet the requirements : There will be 200 network connections on each floor with an additional 100 network connections in the data centers located on the third floor of each building.
Concepts of natural rights : Analyze the case according to the concepts of Natural Rights. For example, what human rights are being upheld or denied in the case?
Define religion and discuss why it is useful in society : Define religion, and discuss why it is useful in society. Explain why it is important for you personally to understand the beliefs of other religious groups
Discuss emerging it and security trends : Discuss emerging IT and security trends. How do they impact network security? Are there challenges and advantages by new technologies?
Identify the validity and reliability reported statistics : Write a 750-1,000-word paper about your selected article. Be sure to include the following in your paper: Identify the validity and reliability reported.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Supply chain channel and distribution methodssupply chain

supply chain channel and distribution methodssupply chain management is an important part of a companys distribution

  The solution to customer relationship managementnick

the solution to customer relationship managementnick pirrone vp of sales and marketing for steeltime inc. recently

  Compare and contrast the different vendors

Compare and contrast the three different vendors

  Describes the organization you are targeting

Summarizes your findings from IANA Whois, Sam Spade Utility, Traceroute, Nslookup, and Google hacking research.Includes information on servers and security countermeasures.Evaluates your public domain information findings.

  How relational data solution be applied to current business

Write a two-page executive summary for your boss explaining how a relational data solution can be applied to a current business problem or area for improvement. Assume that your boss knows nothing about relational database theory. The goal of this..

  Abstract on crowdsourcing

For your midterm, you are to write an abstract on crowdsourcing. Background: Today it is not unusual to see entrepreneurs rely on the crowd to seek financial assistance to support their business idea instead of going to a traditional financial inve..

  Compare the two products and recommend one for the business

Use Internet resources or the Ashford University Library to identify two competing security products such as antivirus software, firewall, anti-spyware, or any hardware. For each product, describe its capabilities, target business uses, and costs ..

  Describe the steps in the procurement process

Describe the steps in the procurement process. What are the possible variations to this process?

  Develop a comprehensive network design document

Discuss about the Network Design Executive PowerPoint Presentation . Develop a comprehensive network design document. Use technology and information resources to research issues in network architecture and analysis.

  Implementing a new collaborative planning process

Justify implementing a new collaborative planning process and Provide suggestions on how to keep the hospital supplied during a disaster.

  How many servers total are needed

The Windows Server 2012 operating system should be used for all aspects of the solution. How many servers total are needed? Which roles will be combined

  Describe the different format for the etl

Our database folks have suggested we use a different format for the ETL if I'm so interested in growth.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd