Firewall selection and placement

Assignment Help Basic Computer Science
Reference no: EM133049505

Firewall Selection and Placement

bThe senior network architect at Corporation Techs has informed you that the existing border firewall is old and needs to be replaced. He recommends designing a demilitarized zone (DMZ) to increase network perimeter security. He also wants to increase the security of network authentication, replacing the current username and password approach.

Tasks

Perform the following tasks:

1. Research and select firewalls for the Corporation Techs network.

a. Describe each firewall, why you selected it, and where it should be placed for maximum effectiveness.

b. Address network, server, and workstation firewalls.

2. Describe a plan for creating a DMZ, and explain how it makes the network more secure.

3. Research network authentication and create a high-level plan for secure authentication to internal network resources.

4. Create a draft report detailing all information as supportive documentation.

5. Cite sources, where appropriate.

Reference no: EM133049505

Questions Cloud

What are the journal entries : There was one sale of inventory with a cost of $30,000 and a selling price of $45,000. What are the journal entries
Explain the business for ultimate success : Describe the four parts to the marketing mix and how they are best utilized by today's business for ultimate success.
Explain how the data were created : Explain how the data were created. Determine weaknesses/areas of improvement in the data. Identify what research is based off this data.
Demonstrating social responsibility : Give at least two examples of organizations (non-profits, educational institutions, government entities, or businesses) that use social media as part of their s
Firewall selection and placement : Research and select firewalls for the Corporation Techs network. Address network, server, and workstation firewalls.
New behaviour management strategy : When monitoring how effective a new behaviour management strategy is, it is important to record how children are responding to the strategy
What is the present value of an ordinary annuity : What is the present value of an ordinary annuity of $ 2,000 per year at a discount rate of 5% for 10 years
Explain systematic and unsystematic risks : (i) Briefly explain how as an Investment analyst apply these two theories that is Modern Portfolio theory and Capital Asset Pricing Model
Feasibility study and cost-benefit analysis : Distinguish between a feasibility study and a cost-benefit analysis.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd