Explain where you would place each of the critical servers

Assignment Help Computer Engineering
Reference no: EM133568697

Discussion Post: Internal Resources

In this discussion, you will address a business problem related to intranet security. For your initial post, you will assess 10 business-critical servers that need to send and accept traffic from the Internet and determine where on the network they should be put. Your organization has a network segmented into two subnets, both of which have a firewall. Subnet One is the Intranet and it connects to Subnet Two using a router. Subnet Two connects to the Internet via a border router. Consider the risks associated with a presence on the Internet, and examine the firewall architecture in order to determine the best placement for each critical server. Explain where you would place each of the critical servers listed below on the network, providing a rationale for your choices. Be sure to include information on how the chosen locations will secure the essential business services provided by each critical server.

Critical Servers

1) Web server with home portal
2) Customer database server
3) Mail server
4) Chat server
5) Intrusion detection system
6) Customer registration server
7) Server with marketing campaign material for the organization
8) Intranet website
9) VPN server
10) Mail archive server.

Reference no: EM133568697

Questions Cloud

Identify one active community organization civic engagement : identify one active community organization's civic engagement in terms of assisting individuals with accessing their rights under the Constitution.
Discuss your plans after you leave nova : Discuss your plans after you leave NOVA and why earning your degree or certificate from NOVA is going to be useful to you.
What were two socio-structural factors : What were two socio-structural factors, noted in the article, that you found insightful? Utilize critical thinking skills to explain how those are considerable
What is the impact of the speech in the video : What is the impact of the speech in the video? How do they impact social change? What does this mean for social work practice?
Explain where you would place each of the critical servers : Explain where you would place each of the critical servers listed below on the network, providing a rationale for your choices.
How has the arrest rate for violent crimes changed : How has the arrest rate for violent crimes changed from 2010 to 2020? How does this compare to the adult arrest rates for violent crimes?
Create a diagram that illustrates your intranet setup : Create a diagram that illustrates your intranet setup and your Internet connection. Consider the potential vulnerabilities of your current network setup.
What ways have equal education efforts ha been successful : what ways have equal education efforts ha been successful or unsuccessful? What are the persistent obstacles to equal educational opportunities?
Determine how new devices changed the network design : Determine how new devices changed the network design and affected configuration settings to include sensors used to monitor the network.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Provide a rough estimate of the number of physical machines

Provide a rough estimate of the number of physical machines that can be virtualized in a host machine for a typical data center environment.

  Identify forensic evidence in android user data

Identify Forensic Evidence in Android User Data, take a screenshot of Step #19 showing the recovered contact information from the Android phone.

  Draw a swimlane diagram for the given activity

Identify the classes and their attributes from the given paragraph and Draw a Class diagram for the given database. The diagram must show all classes

  Question 1 explain the terms technique and tool and then

question 1 explain the terms technique and tool and then describe some of the techniques and tools that you used in

  Find a set of criteria for assessment of video clips

find a set of criteria for assessment of video clips suitable for inclusion in Multimedia presentations over the web. Discuss your choices and where they differ from choices you would make for a CD presentation.

  Discuss a response strategy for malware outbreaks

Which of the following is the most suitable as a response strategy for malware outbreaks

  How does encryption relate to national defense

How does encryption relate to national defense? What is the state of encryption debate today? How much of an effect did September 11, 2001, have on this debate?

  Implement a prototype

KIT205 Data Structures and Algorithms - Assignment 1: Data Structures Implement basic program functionality for a console driven application - Implement and test a linked list to store years

  Write a recursive descent subprogram

Write a recursive descent subprogram that corresponds to the following EBNF production (taken from the specification of Java).

  Implement the bubblesort algorithm

Write a one-tape deterministic Turing machineusing JFLAP to implement the BubbleSort algorithm.

  Compare what the two datasets offer

Articulate the meaning of the data (its representativeness and phenomenon) and thoroughly examine the physical properties (type, size, condition) noting down.

  Write a python program to compute the fibonacci numbers

Write a python program to compute the Fibonacci numbers F8, F28, F48. What are the three values? What is the total number of additions needed by your program? Provide your answers as well as your source code.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd