How to set up a secure network infrastructure

Assignment Help Management Information Sys
Reference no: EM131929621

Assignment Instruction

You have been hired as part of the networking team at UMUC. After completing orientation and training, your manager calls you into a meeting to discuss your first project.

The university has recently leased a single building in Adelphi, Maryland. The building will house faculty and administrative offices, classrooms, a library, and computer labs.

Security is important for UMUC, as the university must protect students' and employees' data, as well as any intellectual property that UMUC has on its servers and computers.

As a result, IT management would like to take the time to review proposals on how best to move forward on security issues.

As a junior network engineer, you have been asked to prepare a network proposal on how to set up a secure network infrastructure in the newly leased building to support university operations.

The network proposal will require three submissions covering network design, network addressing and security, and network customization and optimization.

Please use the following points

1) Network Design

2) Network Addressing and Security

3) Network Customization and Optimization

Reference no: EM131929621

Questions Cloud

What is the purpose of utility theory : What is the purpose of utility theory? Briefly discuss how a utility function can be assessed. What is a standard gamble, and how is it used in determining.
Determining the percent of all scores fall between : 1) The diameters of bolts produced by a certain machine are normally distributed with a mean of 0.30 inches and a standard deviation of 0.01 inches.
How is a utility curve used in selecting the best decision : How is a utility curve used in selecting the best decision for a particular problem? What is a risk seeker? What is a risk avoider?
Done without financial calculator : What is the price of a 3-year government bond that pays a 10% annual coupon and has a $1000 face value? Done without financial calculator
How to set up a secure network infrastructure : The network proposal will require three submissions covering network design, network addressing and security, and network customization and optimization.
What is your new idea for making the process better : What is your new idea for making the process better? Define what quality healthcare means from the perspective of Public health?
Discuss investment options for a small inheritance : Debbie Gibson is considering three investment options for a small inheritance that she has just received-stocks, bonds, and money market.
How do their students actually feel about the intervention : How do their students actually feel about the intervention? How do students view influence of intervention on their learning inside and outside of classroom?
What option should debbie choose : After reading about economic predictions, Debbie Gibson has assigned the probability that the economy will be strong, average, and weak at 0.2, 0.35, and 0.45.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Why cyber security exists and how it benefits the society

Why cyber security exists and how it benefits the society, describe operational risks and their sources. Describe product liability and the role of the government in acquisition and procurement of cyber security products and services.

  The open group architecture framework

Explain the framework's strengths and weaknesses. You should find at least two examples of organizations that have used the framework.

  Explain the business aspect ingredients of drivers

Explain the business aspect ingredients of drivers, directions, network operations, structures, and models. Use examples to illustrate.

  Analyze the potential security concerns

Analyze the potential security concerns, and identify what you believe to be the greatest concerns in terms of vulnerabilities. Explain your desired method(s).

  How well your continuous improvement plan has been completed

A high-level textural overview of the continuous improvement plan is provided? Examples of procedural documentation is provided and aligned with the illustration and high-level text? An implementation plan has been developed that is an accurate refle..

  Briefly describe the objective of the project

IT 270 IT Project Management Assignment. Video Store Project - Case Study Description. Briefly describe the objective of the project

  Write proposal for an ict strategic planning process for uem

Write a proposal for an ICT strategic planning process for UEM. The diagram(s) should be included where possible to explicitly show the IT strategic planning process that could enhance the use of information systems and improve the learning proces..

  What are protective barriers and what should they entail

What are protective barriers and what should they entail? What mitigation procedures can be used to ensure the resiliency of protective barriers?

  Compute the average number of patients in a queue

Compute the average number of patients in a queue. -  Compute the probability of zero units in the system. -Compute the system utilization rate.

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Describe threats that specifically target confidentiality

Describe threats that specifically target confidentiality on a data system. Do not limit yourself to the textbook for answers, and use external resources to support your conclusion.7. What are the components of two-factor authentication ? Provide exa..

  Explain how it might be applied in the work environment

Explain how it might be applied in the work environment. Discuss the potential benefits of adding this new technology. Discuss the potential drawbacks of adding this new technology.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd