Develop a network security plan

Assignment Help Management Information Sys
Reference no: EM131866806 , Length: 3

Assignment Requirements

You have been working as a technology associate in the information systems department at Corporation Techs for more than two months now.

Corporation Techs' information technology (IT) department is setting up a new network in a remote office for an engineering firm. The network requires several groups:

Project Management, Engineering, Drafting, and Architecture. The office is being set up near the project site and therefore, is separate from the main office. Further, several key employees will need access to the main office and remote office computer services.

A network security and Virtual Private Network (VPN) plan is needed to connect it all together.

The network should segment for the four major groups with VPN access allowed by specific remote workers into each group.

Tasks

Develop a network security plan, basic topology, and VPN plan for this remote office. The security plan should keep the main office and its digital assets safe in case of a failure at the remote office.

Remote Office

Required Resources

Submission Requirements

Format: Microsoft Word

Font: Arial, Size 12, Double-Space

Citation Style: APA

Length: 3-4 pages

Spelling and Grammar count

Reference no: EM131866806

Questions Cloud

Create a wireframe for each ofthe changes : Create a wireframe (or more if needed) for each ofthe changes, to effectively illustrate how you are recommending the interface should bedifferent.
Describe the types of people who chose to immigrate : Describe the types of people who chose to immigrate to North America from England in the 17th century. What were the biggest reasons for their decision to make
George washington and fugitive slaves : Discuss three issues that are raised in the George Washington and Fugitive slaves?
What ways was this war different from the previous wars : In what ways was this war different from the previous wars - particularly WWI?
Develop a network security plan : Develop a network security plan, basic topology, and VPN plan for this remote office. The security plan should keep the main office and its digital assets safe.
Italy and germany participated in particularly aggressive : Leading up to WWII, Japan, Italy and Germany participated in particularly aggressive acts. How did these decisions create the conditions for the upcoming global
Use of native american mascots should not be banned : The use of Native American mascots should not be banned. Over the last 10 years, many Native American tribes have pursued legal action against sports teams.
Discuss methods for improving vpn performance : Discuss methods for improving VPN performance and establishing stability of VPN connections.
Define ethical consideration behind maintaining dress policy : An employee is hired by Dream Massage to be a massage therapist. She is hired as an independent contractor and, therefore, receives no tax withholding.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Explain any challenges related to use of data to prevent

Explain at least three ways in which law enforcement may utilize data from crime mapping to prevent and/or address crime.Explain any challenges related to the use of this data to prevent or address crime.Explain how crime mapping as a technological s..

  Ups compare and contrast the management style at your

ups compare and contrast the management style at your organization with the management style at an organization that

  Describe the data breach incident

Write a three to five (3-5) page paper on your selected case in which you: Describe the data breach incident and the primary causes of the data breach

  What factors contributed to linking these stakeholders

What factors contributed to linking these stakeholders with the city of Kelsey through information technology?What factors are taken into consideration when determining needs for software?What are the benefits and risks of implementing information te..

  Create a work breakdown structure

Create a Work Breakdown Structure (WBS) that includes all project tasks (hierarchically grouped) and durations.Establish task precedence relationships.Show milestones and deliverables.

  Important information about technology trends

Important information about technology trends - establish the identity of previously unidentified persons. 2-3 pages. Please include your references.

  Determine whether or not the human resources management

use the internet to research a publicly traded company in the united states that has undergone a merger or acquisition

  Provide a historical example that would be found going back

Provide a historical example that would be found going back several decades. Learning from the past is a great way to succeed in the future.

  Determine the expected length of the queue

Determine the expected length of the queue and the expected time in the system.- compare results when the fill-up criterion is one-quarter full with the results in part a.

  How the attacks affected risk management in organizations

Explain how the attacks affected risk management in organizations and have prompted an increased justification for recovery-based objectives, initiatives, and expenditures.

  Websites and analyze at least two policy papers

Go to Websites and analyze at least two policy papers or reports published by a government agency or a think tank that address a current issue

  Who should lead a security team

How has computer security evolved into modern information security? Who should lead a security team? Should the approach to security be more managerial?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd