Develop a network design to meet the requirements given

Assignment Help Management Information Sys
Reference no: EM132029951

Telecommunications

Network Security Plan Project Assignment

The Acme Corporation is a new startup that wishes to sell their new phone to the public called Acmephone, a more secure version of the phone to business organizations, called the Acmephone B+, and highly secure version of the phone, called the Acmephone G+,  to the government.

Due to the fear of corporate espionage and government security requirements, there are many security concerns that must be addressed.

As a security professional, you have been employed to design a network infrastructure for their two campuses located in Atlanta and Cincinnati based upon the following specifications:

1. There needs to be a constant connection between the two locations that can carry at least 50 Mbps of data.

2. Each facility has three floors. The buildings are rectangular with each floor being 350'x350'.

3. There will be 200 network connections on each floor with an additional 100 network connections in the data centers located on the third floor of each building.

4. The primary data center will be located at the Atlanta location.

5. There will be a failover data center at the Cincinnati location.

6. Each location should be protected from intrusions that are not limited to state change attacks.

7. The Atlanta location will house the two secure development teams. As such, it will need the most security. To further complicate the design, there will be database servers and the corporate Web servers housed at that location as well.

8. There will be database servers located at the Cincinnati site.

9. The servers must have redundancy.

10. The solution must have a plan to verify security measures.

Your job is to develop a network design to meet the requirements above.

1. You should submit a network drawing listing the network's topology including any necessary hardware.

2. You should list any recommended cable.

3. You can recommend wiring closets wherever you need them.

4. You should recommend ways to assure that you are not getting attacked.

5. You should build traps to stop attackers.

6. You should recommend any WAN or wireless technologies.

7. You should recommend any technology needed in the data center for high availability.

8. Justify your recommendations.

Paper formatting requirements:

Your paper must be submitted as a Microsoft Word document with double spacing, 12- point Times New Roman font, and one-inch margins.

You should have at least 10 pages, not including Title and Reference pages.

Please include appropriate diagrams and images for your network security plan.

All academic sources must be cited using the latest APA  guidelines. Section and Sub-section headings should be used throughout the paper.

For in-text citations, the citation needs to go inside the end of the sentence. For example: This is my sentence on APA formatting (APA, 2016).

For references, this list should start on a new page at the end of your document with a hanging indent (the title of the page should be References). You do not need to include the retrieved date. Here are some examples:

Smyth, A. M., Parker, A. L., & Pease, D. L. (2002). A study of enjoyment of peas.

Journal of Abnormal Eating, 8(3), 120-125.

Bernstein, M. (2002). 10 tips on writing the living Web. A List Apart: For People Who

Make Websites, 149. De Huff, E. W. (n.d.). Taytay's tales: Traditional Pueblo Indian tales. University of  Pennsylvania.

Start your paragraph with an indent (tab).

Use section and sub-section headings

Reference no: EM132029951

Questions Cloud

Project risk has been properly considered : They are mutually exclusive and project risk has been properly considered in the NPV analysis.
How kinetic energy is transferred to potential energy : Discuss giving examples and relevant calculations with equations, how kinetic energy is transferred to potential energy or vice versa.
How much must you deposit each year to obtain your goal : To pay for your child's education you wish to have accumulated $14,000 at the end of 10 years. To do this you plan to deposit an equal amount into the bank.
Determine the amount of cost in the raw materials : Determine the amount of cost in the Raw Materials, Work in Process, and Finished Goods inventory accounts as the date of the tornado touchdown
Develop a network design to meet the requirements given : The Acme Corporation is a new startup that wishes to sell their new phone to the public called Acmephone, a more secure version of the phone.
Favorite rocket-powered sled out to a wide field : After a big snowfall, you take your favorite rocket-powered sled out to a wide field. The field is 183 m across, and you know that your sled accelerates
What is a passive activity : What is a Passive Activity? Why is there an active rental exception? How do you carry over/allocate rental losses? Why were these rules adopted?
Should you buy the stock or not : A particular stock sells for $30. The stock's beta is 1.25, the risk-free rate is 4%, and the expected return on the market portfolio is 10%.
What is the shape of the path of motion : How is an object moving before the centripetal force is acting on it? What is the shape of the path of motion, velocity, and force issues?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd