Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Telecommunications - Case Assignment
The Acme Corporation is a new startup that wishes to sale their new phone to the public called Acmephone, a more secure version of the phone to business organizations, called the Acmephone B+, and highly secure version of the phone, called the Acmephone G+, to the government. Due to the fear of corporate espionage and government security requirements, there are many security concerns that must be addressed. As a security professional, you have been employed to design a network infrastructure for their two campuses located in Atlanta and Cincinnati based upon the following specifications:
1. There needs to be a constant connection between the two locations that can carry at least 50 Mbps of data.2. Each facility has three floors. The buildings are rectangular with each floor being 350'x350'.3. There will be 200 network connections on each floor with an additional 100 network connections in the data centers located on the third floor of each building.4. The primary data center will be located at the Atlanta location.5. There will be a failover data center at the Cincinnati location.6. Each location should be protected from intrusions that are not limited to state change attacks. 7. The Atlanta location will house the two secure development teams. As such, it will need the most security. To further complicate the design, there will be database servers and the corporate Web servers housed at that location as well.8. There will be database servers located at the Cincinnati site.9. The servers must have redundancy.10. The solution must have a plan to verify security measures.
Your job is to develop a network design to meet the requirements above. 1. You should submit a network drawing listing the network's topology including any necessary hardware. 2. You should list any recommended cable.3. You can recommend wiring closets wherever you need them.4. You should recommend ways to assure that you are not getting attacked.5. You should build traps to stop attackers.6. You should recommend any WAN or wireless technologies.7. You should recommend any technology needed in the data center for high availability.8. Justify your recommendations.
Verified Expert
In the given task the there is network in which database server and web server are present. In other hand there is branch network but branch having only database server. So for the given network design is required. security implementation is required and company wanted to trap attacker so that source of attack can be known. DMZ is recommended for the given assignment to provide security. and server redundancy is created for providing high availability.
1. potential malicious attacksthree specific potential malicious attacks that could be carried out against the
You are required to design the network you would recommend and how it would be configured - Design a Modern Network for a Private High School.
The Air Force maintains enormous amounts of data on engine failure times. A particular engine has experienced a failure pattern whose failure rate function.
Do you support net neutrality? Why or Why not?How many bits (not bytes) are there in a 10 page text document?- What services do they provide and what pricing plans do they have for residential users?
What is a bottleneck and how can you locate one? - Describe three ways to improve network performance on the server?
Explain how a Trojan horse works.- Compare and contrast symmetric and asymmetric encryption.- Describe how symmetric encryption and decryption work.
There is an organisation which is primarily e-commerce business. It is going through a major transformation because of its expansion.
COIT20261 Network Routing and Switching (Term 1, 2017) Assignment. Define the terms and discuss the relationship between Autonomous Systems
Explain the importance of communication protocols. Identify the protocols in your design and provide rationale for your decision. Define the overall network architecture. Explain the usefulness of a traffic analysis.
Post a summary of an article about the investigation of wireless devices and the article link. What is the most important item to take away from the article?
What are some of the major strategies and risks behind implementing cloud computing programs in today's technology filled world?
Analyse and discuss the significance of internetworking for contemporary organisations - Draw architectural internetworking design for the business in Netsim.
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd