Develop a network design to meet the requirements

Assignment Help Computer Network Security
Reference no: EM132239413

Question: Telecommunications

Case Assignment (part A - 80 points)

Need: 4 pages with references and report

The Acme Corporation is a new startup that wishes to sale their new phone to the public called Acmephone, a more secure version of the phone to business organizations, called the Acmephone B+, and highly secure version of the phone, called the Acmephone G+, to the government. Due to the fear of corporate espionage and government security requirements, there are many security concerns that must be addressed. As a security professional, you have been employed todesign a network infrastructure for their two campuses located in Atlanta and Cincinnati based upon the following specifications:

1. There needs to be a constant connection between the two locations that can carry at least 50 Mbps of data.

2. Each facility has three floors. The buildings are rectangular with each floor being 350'x350'.

3. There will be 200 network connections on each floor with an additional 100 network connections in the data centers located on the third floor of each building.

4. The primary data center will be located at the Atlanta location.

5. There will be a failover data center at the Cincinnati location.

6. Each location should be protected from intrusions that are not limited to state change attacks.

7. The Atlanta location will house the two secure development teams. As such, it will need the most security. To further complicate the design, there will be database servers and the corporate Web servers housed at that location as well.

8. There will be database servers located at the Cincinnati site.

9. The servers must have redundancy.

10. The solution must have a plan to verify security measures.

Your job is to develop a network design to meet the requirements above.

1. You should submit a network drawing listing the network's topology including any necessary hardware.

2. You should list any recommended cable.

3. You can recommend wiring closets wherever you need them.

4. You should recommend ways to assure that you are not getting attacked.

5. You should build traps to stop attackers.

6. You should recommend any WAN or wireless technologies.

7. You should recommend any technology needed in the data center for high availability.

8. Justify your recommendations.

Reference no: EM132239413

Questions Cloud

Create pivot table in new worksheet showing neighborhoods : Create a pivot table in a new worksheet showing top 20 neighborhoods in residential population that displays the sum of occupied residential units
How contracts were formed and terms of contracts : Describe how (or if) the contracts were formed and the terms of the contracts.
How the knowledge have been applied in a practical manner : Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of the course "Telecommunication and network.
Abstract for health and safety quality management system : Provide an abstract for a health and safety quality management system with issues covering quality assurance, preventing customer dissatisfaction,
Develop a network design to meet the requirements : Your job is to develop a network design to meet the requirements above. You should submit a network drawing listing the network's topology including.
Issues covering quality assurance : Provide an abstract for a health and safety quality management system with issues covering quality assurance, preventing customer dissatisfaction,
How the attack was conducted : Using WORD, write an ORIGINAL brief essay of 300 words or more: Write a brief explanation of how you might have defended against that specific attack.
Determine what you think the other party will propose : Explain your demands, determine what you think the other party will propose, determine your concessions, assess whether you think they would yield easily.
Meeting based upon your success with operational forecasting : Your boss has asked you to speak at the quarterly board meeting based upon your success with operational forecasting.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Identify an assessment of risks associated with collection

Identify and provide an assessment of the risks associated with collection, processing, and storage of confidential client information.

  What is the total number of public key

An organization has 100 members. It is desired that each member of the organization be able to communicate securely with any other member, without any other member being able to decrypt their messages.

  Summarize two key information security practices

Summarize two key information security practices you recommend the company implement. Provide supporting examples/research/justification for your two recommended information security practices. Use appropriate terminology learned from the informa..

  What are the advantages and disadvantages of using rodc

Describe a minimum of two circumstances or situation where the use of RODC would be warranted. What considerations need to be planned for the implementation and placement of a RODC? What are the advantages and disadvantages of using RODC?

  Summarize how virtualization works

Summarize how virtualization works, what it can be used for, what the security flaws are, and why the security issues associated withvirtualization might be of concern.

  Discuss about the digital signatures

Determine two (2) types of organizations that should not use digital signatures and add them to your post.

  What are three ways to harden windows servers

What are three ways to harden Windows Servers? What resources can you check to see if you your systems and applications have vulnerabilities?

  What are the common tools used for denial of service

What are the common tools used for denial of service and How does a SQL injection attack take place

  Identify and discuss vulnerabilities and threats

Identify and discuss vulnerabilities and threats - develop a prioritized strategy to deal with the 3 or 4 most serious threats and vulnerabilities

  Describe briefly the different types of network messages

Describe briefly the different types of network messages. Briefly explain how you know that the host computer was placed on the correct subnet.

  Common information security concepts at the apprentice level

Write about common information security concepts at the apprentice level. Your summary must include an analysis that addresses strategic fit

  Draw network diagram of this network including ip addresses

Draw a network diagram of this network including IP addresses - Describe how the attack may have occurred with sufficient information to explain how a hacker could carry out the attack. Ensure you include references.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd